USA media coverage.
November 11, 2025
Enterprises struggle to control cloud misconfiguration issues. Why?
CSO MagazineSeptember 13, 2025
Industrial and Manufacturing Systems Face Cyber Espionage Like Attacks via DELMIA Apriso Flaw
TechNaduSeptember 26, 2025
Cisco's Wave of Actively Exploited Zero-Day Bugs Targets Firewalls, IOS
Dark ReadingSeptember 25, 2025
CVE-Genie Raises The Stakes in the Vulnerability Management Race
ReversingLabsSeptember 22, 2025
Qualys: Security Risk Assessment and Resource Allocation
e-Channel NewsSeptember 30, 2025
Broadcom Fixes Three High-Severity VMware Bugs
SC MagazineOctober 1, 2025
New UK NCSC Guidance a Game-Changer for OT Security
Secure World MagazineOctober 1, 2025
Broadcom Issues Patches for VMware NSX and vCenter Security Flaws
Infosecurity MagazineAugust 21, 2025
Erlang/OTP SSH Exploits Spiked After April Patch
Gov InfoSecurityAugust 21, 2025
Russian State-Sponsored Threat Actors Exploit an Unpatched Cisco Vulnerability Globally, FBI Warns
TechNaduAugust 22, 2025
CISA Warns of Apple Zero-Day Used in Targeted Cyberattacks
The RecordAugust 26, 2025
Qualys CEO On Offering An ‘Alternative To Platformization’ In Security
CRNAugust 26, 2025
Critical Erlang/OTP SSH Flaw Actively Exploited, OT Networks in Crosshairs
Security BuzzAugust 27, 2025
Hackers Observed Patching Leveraged Linux Exploit
Security MagazineAugust 28, 2025
Embedded Software Security Is Seismically Shifting, Report Shows
Secure World MagazineSeptember 4, 2025
Exploited Vulnerabilities: TP-Link Bug, WhatsApp Zero-Day Added to List
SC MagazineSeptember 5, 2025
WhatsApp Flaw Added to CISA’s Known Exploited Vulnerabilities Catalog
Security MagazineJuly 22, 2025
SharePoint Exploits Impact 100 Entities, Google Says Some Hacks Are Tied to Chinese Hackers
TechNaduJuly 22, 2025
Chinese Actors Behind Microsoft SharePoint Attacks
Channel FuturesJuly 26, 2025
HeroDevs: $125 Million Strategic Growth Raised From PSG
Pulse 2.0July 29, 2025
Auto-Color RAT Exploits SAP NetWeaver Vulnerability in Stealthy Attacks
TechNaduAugust 4, 2025
Pentagon Snub Rattles Cybersecurity Conference Circuit
The Wall Street JournalAugust 5, 2025
Qualys, AppOmni, More Debut New Solutions At Black Hat
CRNAugust 5, 2025
Qualys, AppOmni, More Debut New Solutions At Black Hat
Channel FuturesAugust 5, 2025
Black Hat USA 2025 – Summary of Vendor Announcements (Part 1)
SecurityWeekAugust 8, 2025
Endpoint Security and Network Monitoring News for the Week of August 8th
Solutions ReviewJuly 8, 2025
CISA Adds Four Older CVEs to Known Exploited Vulnerabilities List
SC MagazineJuly 8, 2025
Microsoft Patches 137 CVEs in July, But No Zero-Days
Dark ReadingJuly 15, 2025
CISA Flags Four Actively Exploited Vulnerabilities—Some Nearly a Decade Old
Security BuzzJuly 17, 2025
Web Browser AI Hack Attacks Confirmed — What You Need To Know
ForbesJuly 22, 2025
Microsoft Patches SharePoint Flaws as Hackers Rush to Exploit Them
Security BoulevardJuly 24, 2025
Microsoft’s Incomplete SharePoint Patch Led to Global Exploits by China-Linked Hackers
CSO MagazineJuly 24, 2025
EXCLUSIVE: How Tech Giants are Fueling Major League Cricket's American Dream | Major League Cricket, 2025
July 30, 2025
SAP NetWeaver Vulnerability Used in Auto-Color Malware Attack on US Firm
HackreadJune 25, 2025
SAP GUI Flaws Expose Sensitive Data via Weak or No Encryption
CSO MagazineJune 25, 2025
SAP GUI Input History Found Vulnerable to Weak Encryption
June 25, 2025
Researchers Uncover Weak Encryption in SAP User Interface for Windows and Java
Dark ReadingJune 25, 2025
Researchers Uncover Weak Encryption in SAP User Interface for Windows and Java
Silicon AngleJune 24, 2025
Demystifying Cyber Risk: How Qualys is Transforming Security Leadership
Cyber Defense MagazineJune 23, 2025
New Vulnerabilities in Linux Core Dump Handlers Expose Password Hashes
Security BuzzJune 20, 2025
Linux flaws chain allows Root access across major distributions
Security AffairsJune 19, 2025
New Linux Flaws Enable Full Root Access via PAM and Udisks Across Major Distributions
The Hacker NewsJune 18, 2025
GodFather Malware Upgraded to Hijack Legitimate Mobile Apps
June 18, 2025
‘GodFather’ Malware Hijacks Banking Apps, Leverages Advanced Virtualization for Account Takeover
TechNaduJune 18, 2025
Linux Security: New Flaws Allow Root Access, CISA Warns of Old Bug Exploitation
Security WeekJune 18, 2025
New Linux udisks flaw lets attackers get root on major Linux distros
Bleeping ComputerJune 17, 2025
Novel TokenBreak Attack Method Can Bypass LLM Security Features
Security BoulevardJune 12, 2025
The 60,000-plus blind spots your security tools are likely skipping
SC MagazineJune 9, 2025
Silicon Valley And Hollywood Identities Invest In San Francisco Unicorns Cricket Franchise
ForbesJune 6, 2025
New Chrome, Edge Warning—Update Browser By June 26 Deadline
ForbesJune 4, 2025
Put ROCs before SOCs, Qualys tells public sector
Computer WeeklyJune 2, 2025
Linux Crash Reporting Flaws (CVE-2025-5054, 4598) Expose Password Hashes
HackreadJune 2, 2025
Critical Linux Vulnerabilities Risk Password Hash Theft Worldwide
Security BoulevardJune 2, 2025
Millions Of Linux Passwords At Risk From 2 Critical Vulnerabilities
ForbesMay 30, 2025
Linux Crash Dump Flaws Expose Passwords, Encryption Keys
Gov InfoSecurityMay 29, 2025
What The LockBit Data Breach Reveals About Its Inner Workings
Security MagazineMay 28, 2025
Qualys TRU Uncovers Fileless PowerShell Loader Delivering Remcos RAT
Security BuzzMay 21, 2025
A new leak has exposed the internal operations of the ransomware giant LockBit
SC MagazineMay 21, 2025
Additional LockBit secrets uncovered by data leak
SC MagazineMay 20, 2025
Inside LockBit: New Leak Exposes Ransomware Giant's Operations
Secure World MagazineMay 20, 2025
Tenable Adds Third-Party Connectors to Exposure Management Platform
Dark ReadingMay 16, 2025
Fileless PowerShell Loader Deploys Remcos RAT
Gov InfoSecurityMay 16, 2025
Hackers Actively Exploiting PowerShell to Evade Antivirus & EDR
CyberSecurity NewsMay 16, 2025
Updated Remcos RAT Deployed in Fileless Intrusion
SC MagazineMay 16, 2025
Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
The Hacker NewsMay 15, 2025
Qualys CEO on Cybersecurity Risks: Tech Disruptors
BloombergMay 15, 2025
PowerShell-Based Loader Deploys Remcos RAT in New Fileless Attack
May 15, 2025
Fileless Remcos RAT Attack Evades Antivirus Using PowerShell Scripts
HackreadMay 15, 2025
Stealth RAT Uses a PowerShell Loader For Fileless Attacks
CSO OnlineMay 15, 2025
Offensive Security Skills: What Cybersecurity Pros Need to Know
Dice InsightsMay 13, 2025
Exploitable Storage and Backup Vulnerabilities
Solutions ReviewMay 13, 2025
What your tools miss at 2:13 AM: How gen AI attack chains exploit telemetry lag – Part 2
VentureBeatMay 13, 2025
Zero-Day Suspected in SAP NetWeaver Attacks
Security BuzzMay 12, 2025
The industry speaks: International Anti-ransomware Day 2025
Cyber DailyMay 12, 2025
Ransomware Won’t Knock—It’ll Kick Down the Firewall: Are You Ready?
May 9, 2025
Endpoint Security and Network Monitoring News for the Week of May 9th: SonicWall, Cyware, Barracuda and More
Solutions ReviewMay 9, 2025
Qualys Expands mROC Partner Alliance
Channel Vision MagMay 7, 2025
Global Managed Service Providers Embrace Qualys' Risk Operations Center (ROC) Strategy Delivering Business-Aligned Cyber Risk Management
VMblogMay 6, 2025
Exploring Cyber Threat Intelligence with April Lenhard | RSAC Conference 2025
TechstrongMay 6, 2025
This is What Happens When Security Stops Chasing Threats and Starts Managing Risk | A Brand Story with Rich Seiersen from Qualys | An On Location RSAC Conference 2025 Brand Story
ITSP MagazineMay 6, 2025
Critical 9.8 Langflow RCE bug added to CISA vulnerability list
SC MagazineMay 2, 2025
Unpatched Erlang SSH Vulnerability Opens Door to Full System Takeover
Security BuzzMay 2, 2025
Endpoint Security and Network Monitoring News for the Week of May 2nd: Palo Alto Networks, IBM, Vectra AI, and More
Solutions ReviewApril 1, 2025
World Backup Day: A Clarion Call for Cyber Resilience
Secure World MagazineApril 18, 2025
Bill Introduced to Extend the Cybersecurity Information Sharing Act
Security MagazineApril 23, 2025
Changes to CVE program are a call to action on your AppSec strategy
Security BoulevardApril 25, 2025
SAP Patches Zero Day Rated 10.0 in NetWeaver
SC MagazineApril 30, 2025
Diligent, Cloudflare, and Qualys Team Up to Demystify Cyber Risk for the Boardroom
Enterprise Security TechMay 2, 2025
Cybersecurity Skill Sets Require AI Knowledge and a Lot More
Dice InsightsMay 1, 2025
RSA Conference 2025: The Top News and Announcements
Solutions ReviewApril 26, 2025
Ep1138: Operationalizing Cyber Risk with Sumedh Thakar
April 21, 2025
Extension to Federal Information Sharing Cybersecurity Law Introduced Ahead of September Expiration Date
CPO MagazineApril 22, 2025
Dangerous New 2FA, Crypto, Password Infostealer Update Confirmed
ForbesApril 23, 2025
Verizon's 2025 DBIR: Threats Are Faster, Smarter, and More Personal
April 25, 2025
Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks
Security MagazineApril 28, 2025
Qualys Adds Tool to Automate Audit Workflows
Security BoulevardApril 29, 2025
RSA Conference: New Huntress, Qualys Offers, Malwarebytes Channel Initiatives
Channel FuturesApril 29, 2025
RSA Conference 2025 Announcement Summary (Day 2) - SecurityWeek
Security WeekMarch 21, 2025
It's Time to Update Chrome ASAP - Again! - To Fix This Critical Flaw
ZDNETMarch 28, 2025
New Ubuntu Linux security bypasses require manual mitigations
Bleeping ComputerApril 1, 2025
World Backup Day: A Clarion Call for Cyber Resilience
SecureWorldApril 2, 2025
Mayuresh Ektare from Qualys Addresses Risk Operations Center, Human Errors, and Vulnerability Management to Mitigate Threats
TechNaduApril 11, 2025
2025 Tax Season Alert: Cybersecurity Experts Warn of AI-Powered Tax Scams and How to Protect Yourself
VMblogMarch 11, 2025
Cyber Leaders Weigh in on Proposed Vulnerability Disclosure Policy
Security MagazineMarch 11, 2025
Reflections on International Women’s Day: Celebrating leadership, diversity and empowerment
Security Info WatchMarch 7, 2025
A Chinese Espionage Group is Targeting the IT Supply Chain
Security MagazineMarch 7, 2025
Celebrating International Women's Day 2025 with Tech Leaders Across the Industry
VMblogMarch 6, 2025
Silk Typhoon Targets IT Supply Chain in Evolving Cyber Campaign
Security BuzzMarch 6, 2025
Should Contractors Disclose Vulnerabilities to Get Government Work?
SC MagazineMarch 6, 2025
Federal Contractor Cybersecurity Vulnerability Reduction Act Passes in U.S. House
SecureWorldMarch 3, 2025
China's Silk Typhoon APT Shifts to IT Supply Chain Attacks
Dark ReadingMarch 3, 2025
Black Basta Leak Offers Glimpse Into Group’s Inner Workings
Security WeekMarch 3, 2025
Ransomware access playbook: What Black Basta’s leaked logs reveal
CSO OnlineMarch 2, 2025
Ransomware Gang Leak Shows Stolen Passwords And 2FA Codes Driving Attacks
ForbesFebruary 27, 2025
MITRE Caldera Security Advisory Warns of Maximum Severity Flaw
Security MagazineFebruary 27, 2025
Generative AI Shows Promise for Faster Triage of Vulnerabilities
Dark ReadingFebruary 26, 2025
Leaked Black Basta Ransomware Chat Logs Reveal Inner Workings and Internal Conflicts
The Hacker NewsFebruary 26, 2025
Go Beyond Vulnerabilities For Your AppSec: Here's Why It's Essential
Security BoulevardFebruary 25, 2025
Overcoming Critical AI Security Risks Uncovered in DeepSeek-R1
Cybersecurity InsidersFebruary 25, 2025
Max Severity RCE Vuln in All Versions of MITRE Caldera
Dark ReadingFebruary 21, 2025
CEO Outlook 2025
CRNFebruary 20, 2025
The 20 Coolest Security Operations, Risk And Threat Intelligence Of 2025: The Security 100
CRNFebruary 19, 2025
Qualys Identifies Critical Vulnerabilities that Enable DDoS, MITM Attacks
Security BuzzFebruary 19, 2025
OpenSSH Patches Vulnerabilities Allowing MitM, DoS Attacks
Security WeekFebruary 18, 2025
OpenSSH fixes flaws that enable man-in-the-middle, DoS attacks
CSOFebruary 18, 2025
OpenSSH Flaws Could Enable Man-in-the-Middle Attacks, Denial of Service
SC MagazineFebruary 18, 2025
Critical OpenSSH Vulnerabilities Expose Users to MITM and DoS Attacks
HackreadFebruary 18, 2025
New OpenSSH Flaws Expose SSH Servers to MiTM and DoS Attacks
Bleeping ComputerFebruary 18, 2025
New OpenSSH Flaws Enable Man-in-the-Middle and DoS Attacks — Patch Now
The Hacker NewsFebruary 18, 2025
OpenSSH vulnerabilities could pose huge threat to businesses everywhere
Tech RadarFebruary 18, 2025
Proof-of-Concept Exploits Published for 2 New OpenSSH Bugs
Data Breach TodayFebruary 18, 2025
Proof-of-Concept Exploits Published for 2 New OpenSSH Bugs
BankInfoSecurityFebruary 18, 2025
Proof-of-Concept Exploits Published for 2 New OpenSSH Bugs
Gov InfoSecurityFebruary 18, 2025
New OpenSSH Flaws Enable Man-in-the-Middle and DoS Attacks — Patch Now
CyberSecurity NewsFebruary 12, 2025
7 Best Vulnerability Scanning Tools & Software for 2025
eSecurity PlanetFebruary 12, 2025
Suspicious file analysis: Enhance your SOC to fight sophisticated attacks
ReversingLabsFebruary 10, 2025
Patch Tuesday: Microsoft Fixes 63 Bugs with 2 Zero-Days
HackreadFebruary 10, 2025
Security Researchers Warn of New Risks in DeepSeek AI App
BankInfoSecurityFebruary 10, 2025
Security Researchers Warn of New Risks in DeepSeek AI App
Gov InfoSecurityFebruary 10, 2025
Qualys Puts the Power of ROC into MSSPs’ Hands
MSSP AlertFebruary 10, 2025
The Gately Report: More Services, Certifications Coming for Qualys Partners
Channel FuturesFebruary 7, 2025
Qualys Introduces Managed Risk Operation Center (mROC) Partner Alliance to Scale Cyber Risk Services
VMblogFebruary 7, 2025
Dilip Bachwani on Analyzing DeepSeek with TotalAI
TechstrongFebruary 6, 2025
Qualys TotalAppSec Strengthens Application Risk Management
Security BoulevardFebruary 6, 2025
DeepSeek-R1 LLM Fails Over Half of Jailbreak Attacks in Security Analysis
HackreadFebruary 6, 2025
MSSP Market Update: Judy Security, Strike Graph Partner for NIST Compliance
MSSP AlertFebruary 6, 2025
Qualys Introduces Managed Risk Operation Center Partner Alliance to Scale Cyber Risk Services
Disaster Recovery JournalFebruary 6, 2025
Qualys Unveils TotalAppSec
Global Security MagFebruary 5, 2025
Channel Brief: Qualys Launches TotalAppSec Solution
Channele2eFebruary 5, 2025
Qualys introduces Managed Risk Operation Center (mROC) Partner Alliance
Security Info WatchFebruary 5, 2025
DeepSeek AI Model Riddled With Security Vulnerabilities
Security BoulevardFebruary 5, 2025
Secure by Design and Secure by Default: You Need Both to Boost AppSec
Security BoulevardFebruary 4, 2025
Bots Now Dominate the Web, and That’s a Problem
Tech News WorldFebruary 3, 2025
Qualys, Inc. Introduces TotalAppSec To Help Organizations Track And Reduce Cyber Risks
IT Security WireFebruary 3, 2025
Qualys Unveils TotalAppSec: New Comprehensive Application Risk Management Solution
CIO InfluenceFebruary 3, 2025
Qualys unveils TotalAppSec, a comprehensive application risk management solution
Security Info WatchJanuary 21, 2025
New Mirai Variant Targets Flaws in Cameras and Routers
BankInfoSecurityJanuary 21, 2025
New Mirai Variant Targets Flaws in Cameras and Routers
Gov InfoSecurityJanuary 21, 2025
Mirai Botnet Spinoffs Unleash Global Wave of DDoS Attacks
Dark ReadingJanuary 21, 2025
New Mirai Variant Murdoc_Botnet Launches DDoS Attacks via IoT Exploits
HackreadJanuary 21, 2025
Mirai Variant Murdoc_Botnet Exploits AVTECH IP Cameras and Huawei Routers
The Hacker NewsJanuary 17, 2025
Critical Flaws in Veeam Service Provider Console Demand Urgent Action
Security BuzzJanuary 21, 2025
New Mirai Variant ‘Murdoc_Botnet’ Targets AVTECH Cameras and Huawei Routers
Silicon AngleJanuary 21, 2025
Cyber Insights 2025: Attack Surface Management
Security WeekJanuary 15, 2025
Stop Wasting Money on Ineffective Threat Intelligence: 5 Mistakes to Avoid
CSOJanuary 14, 2025
Microsoft Reveals macOS Vulnerability That Allowed System Integrity Protection Bypass
Silicon AngleJanuary 14, 2025
Apple Bug Allows Root Protections Bypass Without Physical Access
Dark ReadingJanuary 14, 2025
New Bug Lets Attackers Bypass macOS System Integrity Protection
SC MagazineJanuary 8, 2025
Do Not Click—New Gmail, Outlook, Apple Mail Warning For Billions
ForbesJanuary 7, 2025
Moxa Patches Two Flaws in its OT Devices, One a Critical RCE
SC MagazineJanuary 7, 2025
What Companies Need to Help Secure AI
CIO DiveJanuary 7, 2025
What companies need to help secure AI
Cybersecurity DiveJanuary 7, 2025
Russian Hackers Turn Trusted Online Stores Into Phishing Pages
CSOJanuary 6, 2025
New PhishWP Plugin on Russian Forum Turns Sites into Phishing Pages
HackreadJanuary 6, 2025
New PhishWP Plugin Enables Sophisticated Payment Page Scams
InfosecurityJanuary 6, 2025
WordPress Plugin Exploited to Turn Legitimate Sites Into Phishing Traps
Security BoulevardFollow us on social media