USA media coverage.

Browse media coverage


Media inquiries

Rachel Winship
Qualys
+1 800 745 4355[email protected]

Global media contacts Arrow Right

November 11, 2025

Enterprises struggle to control cloud misconfiguration issues. Why?

CSO Magazine
September 13, 2025

Industrial and Manufacturing Systems Face Cyber Espionage Like Attacks via DELMIA Apriso Flaw

TechNadu
September 26, 2025

Cisco's Wave of Actively Exploited Zero-Day Bugs Targets Firewalls, IOS

Dark Reading
September 25, 2025

CVE-Genie Raises The Stakes in the Vulnerability Management Race

ReversingLabs
September 22, 2025

Qualys: Security Risk Assessment and Resource Allocation

e-Channel News
September 30, 2025

Broadcom Fixes Three High-Severity VMware Bugs

SC Magazine
October 1, 2025

New UK NCSC Guidance a Game-Changer for OT Security

Secure World Magazine
October 1, 2025

Broadcom Issues Patches for VMware NSX and vCenter Security Flaws

Infosecurity Magazine
August 21, 2025

Erlang/OTP SSH Exploits Spiked After April Patch

Gov InfoSecurity
August 21, 2025

Russian State-Sponsored Threat Actors Exploit an Unpatched Cisco Vulnerability Globally, FBI Warns

TechNadu
August 22, 2025

CISA Warns of Apple Zero-Day Used in Targeted Cyberattacks

The Record
August 26, 2025

Qualys CEO On Offering An ‘Alternative To Platformization’ In Security

CRN
August 26, 2025

Critical Erlang/OTP SSH Flaw Actively Exploited, OT Networks in Crosshairs

Security Buzz
August 27, 2025

Hackers Observed Patching Leveraged Linux Exploit

Security Magazine
August 28, 2025

Embedded Software Security Is Seismically Shifting, Report Shows

Secure World Magazine
September 4, 2025

Exploited Vulnerabilities: TP-Link Bug, WhatsApp Zero-Day Added to List

SC Magazine
September 5, 2025

WhatsApp Flaw Added to CISA’s Known Exploited Vulnerabilities Catalog

Security Magazine
July 22, 2025

SharePoint Exploits Impact 100 Entities, Google Says Some Hacks Are Tied to Chinese Hackers

TechNadu
July 22, 2025

Chinese Actors Behind Microsoft SharePoint Attacks

Channel Futures
July 26, 2025

HeroDevs: $125 Million Strategic Growth Raised From PSG

Pulse 2.0
July 29, 2025

Auto-Color RAT Exploits SAP NetWeaver Vulnerability in Stealthy Attacks

TechNadu
August 4, 2025

Pentagon Snub Rattles Cybersecurity Conference Circuit

The Wall Street Journal
August 5, 2025

Qualys, AppOmni, More Debut New Solutions At Black Hat

CRN
August 5, 2025

Qualys, AppOmni, More Debut New Solutions At Black Hat

Channel Futures
August 5, 2025

Black Hat USA 2025 – Summary of Vendor Announcements (Part 1)

SecurityWeek
August 8, 2025

Endpoint Security and Network Monitoring News for the Week of August 8th

Solutions Review
July 8, 2025

CISA Adds Four Older CVEs to Known Exploited Vulnerabilities List

SC Magazine
July 8, 2025

Microsoft Patches 137 CVEs in July, But No Zero-Days

Dark Reading
July 15, 2025

CISA Flags Four Actively Exploited Vulnerabilities—Some Nearly a Decade Old

Security Buzz
July 17, 2025

Web Browser AI Hack Attacks Confirmed — What You Need To Know

Forbes
July 22, 2025

Microsoft Patches SharePoint Flaws as Hackers Rush to Exploit Them

Security Boulevard
July 24, 2025

Microsoft’s Incomplete SharePoint Patch Led to Global Exploits by China-Linked Hackers

CSO Magazine
July 24, 2025

EXCLUSIVE: How Tech Giants are Fueling Major League Cricket's American Dream | Major League Cricket, 2025

July 30, 2025

SAP NetWeaver Vulnerability Used in Auto-Color Malware Attack on US Firm

Hackread
June 25, 2025

SAP GUI Flaws Expose Sensitive Data via Weak or No Encryption

CSO Magazine
June 25, 2025

SAP GUI Input History Found Vulnerable to Weak Encryption

June 25, 2025

Researchers Uncover Weak Encryption in SAP User Interface for Windows and Java

Dark Reading
June 25, 2025

Researchers Uncover Weak Encryption in SAP User Interface for Windows and Java

Silicon Angle
June 24, 2025

Demystifying Cyber Risk: How Qualys is Transforming Security Leadership

Cyber Defense Magazine
June 23, 2025

New Vulnerabilities in Linux Core Dump Handlers Expose Password Hashes

Security Buzz
June 20, 2025

Linux flaws chain allows Root access across major distributions

Security Affairs
June 19, 2025

New Linux Flaws Enable Full Root Access via PAM and Udisks Across Major Distributions

The Hacker News
June 18, 2025

GodFather Malware Upgraded to Hijack Legitimate Mobile Apps

June 18, 2025

‘GodFather’ Malware Hijacks Banking Apps, Leverages Advanced Virtualization for Account Takeover

TechNadu
June 18, 2025

Linux Security: New Flaws Allow Root Access, CISA Warns of Old Bug Exploitation

Security Week
June 18, 2025

New Linux udisks flaw lets attackers get root on major Linux distros

Bleeping Computer
June 17, 2025

Novel TokenBreak Attack Method Can Bypass LLM Security Features

Security Boulevard
June 12, 2025

The 60,000-plus blind spots your security tools are likely skipping

SC Magazine
June 9, 2025

Silicon Valley And Hollywood Identities Invest In San Francisco Unicorns Cricket Franchise

Forbes
June 6, 2025

New Chrome, Edge Warning—Update Browser By June 26 Deadline

Forbes
June 4, 2025

Put ROCs before SOCs, Qualys tells public sector

Computer Weekly
June 2, 2025

Linux Crash Reporting Flaws (CVE-2025-5054, 4598) Expose Password Hashes

Hackread
June 2, 2025

Critical Linux Vulnerabilities Risk Password Hash Theft Worldwide

Security Boulevard
June 2, 2025

Millions Of Linux Passwords At Risk From 2 Critical Vulnerabilities

Forbes
May 30, 2025

Linux Crash Dump Flaws Expose Passwords, Encryption Keys

Gov InfoSecurity
May 29, 2025

What The LockBit Data Breach Reveals About Its Inner Workings

Security Magazine
May 28, 2025

Qualys TRU Uncovers Fileless PowerShell Loader Delivering Remcos RAT

Security Buzz
May 21, 2025

A new leak has exposed the internal operations of the ransomware giant LockBit

SC Magazine
May 21, 2025

Additional LockBit secrets uncovered by data leak

SC Magazine
May 20, 2025

Inside LockBit: New Leak Exposes Ransomware Giant's Operations

Secure World Magazine
May 20, 2025

Tenable Adds Third-Party Connectors to Exposure Management Platform

Dark Reading
May 16, 2025

Fileless PowerShell Loader Deploys Remcos RAT

Gov InfoSecurity
May 16, 2025

Hackers Actively Exploiting PowerShell to Evade Antivirus & EDR

CyberSecurity News
May 16, 2025

Updated Remcos RAT Deployed in Fileless Intrusion

SC Magazine
May 16, 2025

Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks

The Hacker News
May 15, 2025

Qualys CEO on Cybersecurity Risks: Tech Disruptors

Bloomberg
May 15, 2025

PowerShell-Based Loader Deploys Remcos RAT in New Fileless Attack

May 15, 2025

Fileless Remcos RAT Attack Evades Antivirus Using PowerShell Scripts

Hackread
May 15, 2025

Stealth RAT Uses a PowerShell Loader For Fileless Attacks

CSO Online
May 15, 2025

Offensive Security Skills: What Cybersecurity Pros Need to Know

Dice Insights
May 13, 2025

Exploitable Storage and Backup Vulnerabilities

Solutions Review
May 13, 2025

What your tools miss at 2:13 AM: How gen AI attack chains exploit telemetry lag – Part 2

VentureBeat
May 13, 2025

Zero-Day Suspected in SAP NetWeaver Attacks

Security Buzz
May 12, 2025

The industry speaks: International Anti-ransomware Day 2025

Cyber Daily
May 12, 2025

Ransomware Won’t Knock—It’ll Kick Down the Firewall: Are You Ready?

May 9, 2025

Endpoint Security and Network Monitoring News for the Week of May 9th: SonicWall, Cyware, Barracuda and More

Solutions Review
May 9, 2025

Qualys Expands mROC Partner Alliance

Channel Vision Mag
May 7, 2025

Global Managed Service Providers Embrace Qualys' Risk Operations Center (ROC) Strategy Delivering Business-Aligned Cyber Risk Management

VMblog
May 6, 2025

Exploring Cyber Threat Intelligence with April Lenhard | RSAC Conference 2025

Techstrong
May 6, 2025

This is What Happens When Security Stops Chasing Threats and Starts Managing Risk | A Brand Story with Rich Seiersen from Qualys | An On Location RSAC Conference 2025 Brand Story

ITSP Magazine
May 6, 2025

Critical 9.8 Langflow RCE bug added to CISA vulnerability list

SC Magazine
May 2, 2025

Unpatched Erlang SSH Vulnerability Opens Door to Full System Takeover

Security Buzz
May 2, 2025

Endpoint Security and Network Monitoring News for the Week of May 2nd: Palo Alto Networks, IBM, Vectra AI, and More

Solutions Review
April 1, 2025

World Backup Day: A Clarion Call for Cyber Resilience

Secure World Magazine
April 18, 2025

Bill Introduced to Extend the Cybersecurity Information Sharing Act

Security Magazine
April 23, 2025

Changes to CVE program are a call to action on your AppSec strategy

Security Boulevard
April 25, 2025

SAP Patches Zero Day Rated 10.0 in NetWeaver

SC Magazine
April 30, 2025

Diligent, Cloudflare, and Qualys Team Up to Demystify Cyber Risk for the Boardroom

Enterprise Security Tech
May 2, 2025

Cybersecurity Skill Sets Require AI Knowledge and a Lot More

Dice Insights
May 1, 2025

RSA Conference 2025: The Top News and Announcements

Solutions Review
April 26, 2025

Ep1138: Operationalizing Cyber Risk with Sumedh Thakar

April 21, 2025

Extension to Federal Information Sharing Cybersecurity Law Introduced Ahead of September Expiration Date

CPO Magazine
April 22, 2025

Dangerous New 2FA, Crypto, Password Infostealer Update Confirmed

Forbes
April 23, 2025

Verizon's 2025 DBIR: Threats Are Faster, Smarter, and More Personal

April 25, 2025

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Security Magazine
April 28, 2025

Qualys Adds Tool to Automate Audit Workflows

Security Boulevard
April 29, 2025

RSA Conference: New Huntress, Qualys Offers, Malwarebytes Channel Initiatives

Channel Futures
April 29, 2025

RSA Conference 2025 Announcement Summary (Day 2) - SecurityWeek

Security Week
March 21, 2025

It's Time to Update Chrome ASAP - Again! - To Fix This Critical Flaw

ZDNET
March 28, 2025

New Ubuntu Linux security bypasses require manual mitigations

Bleeping Computer
April 1, 2025

World Backup Day: A Clarion Call for Cyber Resilience

SecureWorld
April 2, 2025

Mayuresh Ektare from Qualys Addresses Risk Operations Center, Human Errors, and Vulnerability Management to Mitigate Threats

TechNadu
April 11, 2025

2025 Tax Season Alert: Cybersecurity Experts Warn of AI-Powered Tax Scams and How to Protect Yourself

VMblog
March 11, 2025

Cyber Leaders Weigh in on Proposed Vulnerability Disclosure Policy

Security Magazine
March 11, 2025

Reflections on International Women’s Day: Celebrating leadership, diversity and empowerment

Security Info Watch
March 7, 2025

A Chinese Espionage Group is Targeting the IT Supply Chain

Security Magazine
March 7, 2025

Celebrating International Women's Day 2025 with Tech Leaders Across the Industry

VMblog
March 6, 2025

Silk Typhoon Targets IT Supply Chain in Evolving Cyber Campaign

Security Buzz
March 6, 2025

Should Contractors Disclose Vulnerabilities to Get Government Work?

SC Magazine
March 6, 2025

Federal Contractor Cybersecurity Vulnerability Reduction Act Passes in U.S. House

SecureWorld
March 3, 2025

China's Silk Typhoon APT Shifts to IT Supply Chain Attacks

Dark Reading
March 3, 2025

Black Basta Leak Offers Glimpse Into Group’s Inner Workings

Security Week
March 3, 2025

Ransomware access playbook: What Black Basta’s leaked logs reveal

CSO Online
March 2, 2025

Ransomware Gang Leak Shows Stolen Passwords And 2FA Codes Driving Attacks

Forbes
February 27, 2025

MITRE Caldera Security Advisory Warns of Maximum Severity Flaw

Security Magazine
February 27, 2025

Generative AI Shows Promise for Faster Triage of Vulnerabilities

Dark Reading
February 26, 2025

Leaked Black Basta Ransomware Chat Logs Reveal Inner Workings and Internal Conflicts

The Hacker News
February 26, 2025

Go Beyond Vulnerabilities For Your AppSec: Here's Why It's Essential

Security Boulevard
February 25, 2025

Overcoming Critical AI Security Risks Uncovered in DeepSeek-R1

Cybersecurity Insiders
February 25, 2025

Max Severity RCE Vuln in All Versions of MITRE Caldera

Dark Reading
February 21, 2025

CEO Outlook 2025

CRN
February 20, 2025

The 20 Coolest Security Operations, Risk And Threat Intelligence Of 2025: The Security 100

CRN
February 19, 2025

Qualys Identifies Critical Vulnerabilities that Enable DDoS, MITM Attacks

Security Buzz
February 19, 2025

OpenSSH Patches Vulnerabilities Allowing MitM, DoS Attacks

Security Week
February 18, 2025

OpenSSH fixes flaws that enable man-in-the-middle, DoS attacks

CSO
February 18, 2025

OpenSSH Flaws Could Enable Man-in-the-Middle Attacks, Denial of Service

SC Magazine
February 18, 2025

Critical OpenSSH Vulnerabilities Expose Users to MITM and DoS Attacks

Hackread
February 18, 2025

New OpenSSH Flaws Expose SSH Servers to MiTM and DoS Attacks

Bleeping Computer
February 18, 2025

New OpenSSH Flaws Enable Man-in-the-Middle and DoS Attacks — Patch Now

The Hacker News
February 18, 2025

OpenSSH vulnerabilities could pose huge threat to businesses everywhere

Tech Radar
February 18, 2025

Proof-of-Concept Exploits Published for 2 New OpenSSH Bugs

Data Breach Today
February 18, 2025

Proof-of-Concept Exploits Published for 2 New OpenSSH Bugs

BankInfoSecurity
February 18, 2025

Proof-of-Concept Exploits Published for 2 New OpenSSH Bugs

Gov InfoSecurity
February 18, 2025

New OpenSSH Flaws Enable Man-in-the-Middle and DoS Attacks — Patch Now

CyberSecurity News
February 12, 2025

7 Best Vulnerability Scanning Tools & Software for 2025

eSecurity Planet
February 12, 2025

Suspicious file analysis: Enhance your SOC to fight sophisticated attacks

ReversingLabs
February 10, 2025

Patch Tuesday: Microsoft Fixes 63 Bugs with 2 Zero-Days

Hackread
February 10, 2025

Security Researchers Warn of New Risks in DeepSeek AI App

BankInfoSecurity
February 10, 2025

Security Researchers Warn of New Risks in DeepSeek AI App

Gov InfoSecurity
February 10, 2025

Qualys Puts the Power of ROC into MSSPs’ Hands

MSSP Alert
February 10, 2025

The Gately Report: More Services, Certifications Coming for Qualys Partners

Channel Futures
February 7, 2025

Qualys Introduces Managed Risk Operation Center (mROC) Partner Alliance to Scale Cyber Risk Services

VMblog
February 7, 2025

Dilip Bachwani on Analyzing DeepSeek with TotalAI

Techstrong
February 6, 2025

Qualys TotalAppSec Strengthens Application Risk Management

Security Boulevard
February 6, 2025

DeepSeek-R1 LLM Fails Over Half of Jailbreak Attacks in Security Analysis

Hackread
February 6, 2025

MSSP Market Update: Judy Security, Strike Graph Partner for NIST Compliance

MSSP Alert
February 6, 2025

Qualys Introduces Managed Risk Operation Center Partner Alliance to Scale Cyber Risk Services

Disaster Recovery Journal
February 6, 2025

Qualys Unveils TotalAppSec

Global Security Mag
February 5, 2025

Channel Brief: Qualys Launches TotalAppSec Solution

Channele2e
February 5, 2025

Qualys introduces Managed Risk Operation Center (mROC) Partner Alliance

Security Info Watch
February 5, 2025

DeepSeek AI Model Riddled With Security Vulnerabilities

Security Boulevard
February 5, 2025

Secure by Design and Secure by Default: You Need Both to Boost AppSec

Security Boulevard
February 4, 2025

Bots Now Dominate the Web, and That’s a Problem

Tech News World
February 3, 2025

Qualys, Inc. Introduces TotalAppSec To Help Organizations Track And Reduce Cyber Risks

IT Security Wire
February 3, 2025

Qualys Unveils TotalAppSec: New Comprehensive Application Risk Management Solution

CIO Influence
February 3, 2025

Qualys unveils TotalAppSec, a comprehensive application risk management solution

Security Info Watch
January 21, 2025

New Mirai Variant Targets Flaws in Cameras and Routers

BankInfoSecurity
January 21, 2025

New Mirai Variant Targets Flaws in Cameras and Routers

Gov InfoSecurity
January 21, 2025

Mirai Botnet Spinoffs Unleash Global Wave of DDoS Attacks

Dark Reading
January 21, 2025

New Mirai Variant Murdoc_Botnet Launches DDoS Attacks via IoT Exploits

Hackread
January 21, 2025

Mirai Variant Murdoc_Botnet Exploits AVTECH IP Cameras and Huawei Routers

The Hacker News
January 17, 2025

Critical Flaws in Veeam Service Provider Console Demand Urgent Action

Security Buzz
January 21, 2025

New Mirai Variant ‘Murdoc_Botnet’ Targets AVTECH Cameras and Huawei Routers

Silicon Angle
January 21, 2025

Cyber Insights 2025: Attack Surface Management

Security Week
January 15, 2025

Stop Wasting Money on Ineffective Threat Intelligence: 5 Mistakes to Avoid

CSO
January 14, 2025

Microsoft Reveals macOS Vulnerability That Allowed System Integrity Protection Bypass

Silicon Angle
January 14, 2025

Apple Bug Allows Root Protections Bypass Without Physical Access

Dark Reading
January 14, 2025

New Bug Lets Attackers Bypass macOS System Integrity Protection

SC Magazine
January 8, 2025

Do Not Click—New Gmail, Outlook, Apple Mail Warning For Billions

Forbes
January 7, 2025

Moxa Patches Two Flaws in its OT Devices, One a Critical RCE

SC Magazine
January 7, 2025

What Companies Need to Help Secure AI

CIO Dive
January 7, 2025

What companies need to help secure AI

Cybersecurity Dive
January 7, 2025

Russian Hackers Turn Trusted Online Stores Into Phishing Pages

CSO
January 6, 2025

New PhishWP Plugin on Russian Forum Turns Sites into Phishing Pages

Hackread
January 6, 2025

New PhishWP Plugin Enables Sophisticated Payment Page Scams

Infosecurity
January 6, 2025

WordPress Plugin Exploited to Turn Legitimate Sites Into Phishing Traps

Security Boulevard

Follow us on social media