Qualys in the news.
Discover what we're up to as the leading provider of network security and compliance solutions.
See what we're up to
Press
Qualys Announces First Quarter 2026 Financial Results
May 5, 2026Qualys and Converge Launch Joint Offering, Lowering Insurance Premiums for Organizations with Proven Cyber Risk Reduction through Enterprise TruRisk Management
May 5, 2026Qualys to Report First Quarter 2026 Financial Results on May 5, 2026
April 22, 2026Qualys Debuts Industry’s First AI Agent for Safe Exploit Validation and Autonomous Remediation
March 23, 2026Media Alert: Qualys Extends Major Partner Status with San Francisco Unicorns Through 2027, Championing the Growth of U.S. Cricket
March 9, 2026Qualys Announces Fourth Quarter and Full Year 2025 Financial Results
February 5, 2026Qualys to Report Fourth Quarter 2025 Financial Results on February 5, 2026
January 22, 2026
Blog
Dirty Frag: Using the Page Caches as an Attack Surface
May 9, 2026Before the Breach, There Was a Test Environment
May 6, 2026Qualys TotalAI Achieves FedRAMP Moderate (FedRAMP Certified Class C) Authorization
May 5, 2026Converge Connect: Unlock Lower Premiums with Proven Qualys Security
May 5, 2026Handling the Vulnerability Surge in the Post-Mythos Era
May 1, 2026Don’t Wait for a Patch. Mitigate RedSun Zero-Day Risk in Microsoft Defender Today
April 22, 2026Oracle Critical Patch Update, April 2026 Security Update Review
April 22, 2026
Coverage
Ontinue Warns Attackers Are Abusing Nezha Monitoring Tool as Stealthy Remote Access Trojan
December 22, 2025 - SiliconANGLEMonitoring Tool Nezha Abused For Stealthy Post-Exploitation Access
December 22, 2025 - Infosecurity MagazineHackers Abuse Popular Monitoring Tool Nezha as a Stealth Trojan
December 22, 2025 - HackreadLegitimate Nezha Monitoring Tool Abused as a Powerful RAT, Providing Complete Control Over Compromised Hosts
December 22, 2025 - TechNaduThe Great Cyber Budget Boom: 99% of Leaders Are Increasing Spend
December 18, 2025 - Secure World MagazineReport: AI is Rewriting Software Faster Than It Can Be Secured
December 17, 2025 - SecureWorldThe Imperative of Software Supply Chain Security: AI-Generated Code Risks, Secure SDLC Practices, and SBOM Validation
December 17, 2025 - TechNadu
Follow us on social media
