Qualys in the news.
Discover what we're up to as the leading provider of network security and compliance solutions.
See what we're up to
Press
Qualys Announces Fourth Quarter and Full Year 2025 Financial Results
February 5, 2026Qualys to Report Fourth Quarter 2025 Financial Results on February 5, 2026
January 22, 2026Qualys Announces Third Quarter 2025 Financial Results
November 4, 2025Qualys Appoints Bradford L. Brooks to its Board of Directors
November 3, 2025Qualys to Report Third Quarter 2025 Financial Results on November 4, 2025
October 21, 2025ROCon Houston 2025: Qualys Expands Enterprise TruRisk Management (ETM) with Built-in Agentic AI Fabric to Include Identity Security, Industry-Specific Threat Prioritization, and Exploit Validation
October 15, 2025Qualys Achieves FedRAMP High Authorization for Comprehensive Risk Management Platform
August 27, 2025
Blog
How Security Tool Misuse Is Reshaping Cloud Compromise
February 19, 2026New: AI-Powered Patch Reliability Scoring—Predict Patch Impact Before You Deploy
February 18, 2026Qualys Recognized as a Leader in the 2026 Forrester Wave™ for CNAPP
February 17, 2026Active Directory Attacks Demystified: Pass-the-Hash (PtH), Pass-the-Ticket (PtT), and Beyond
February 12, 2026Microsoft and Adobe Patch Tuesday, February 2026 Security Update Review
February 10, 2026TruConfirm: Autonomous, Agent-Led, Safe Exploit Validation for Real-World Risk Reduction
February 4, 2026Mutagen Astronomy: From Discovery to CISA Recognition—A Seven-Year Journey
February 2, 2026
Coverage
Enterprises struggle to control cloud misconfiguration issues. Why?
November 11, 2025 - CSO MagazineOntinue Warns Attackers Are Abusing Nezha Monitoring Tool as Stealthy Remote Access Trojan
December 22, 2025 - SiliconANGLEMonitoring Tool Nezha Abused For Stealthy Post-Exploitation Access
December 22, 2025 - Infosecurity MagazineHackers Abuse Popular Monitoring Tool Nezha as a Stealth Trojan
December 22, 2025 - HackreadLegitimate Nezha Monitoring Tool Abused as a Powerful RAT, Providing Complete Control Over Compromised Hosts
December 22, 2025 - TechNaduThe Great Cyber Budget Boom: 99% of Leaders Are Increasing Spend
December 18, 2025 - Secure World MagazineReport: AI is Rewriting Software Faster Than It Can Be Secured
December 17, 2025 - SecureWorld
Follow us on social media
