USA media coverage.
-
November 13, 2024
Qualys’ Barbara Huelskamp: Working to narrow the workforce, gender gaps
SC Media
-
November 13, 2024
SC Women in IT Security
SC Media
-
November 12, 2024
Tricked By a CAPTCHA: How Cybercriminals are Using Fake Verifications to Steal Sensitive Data
Security Buzz
-
November 12, 2024
Microsoft’s November Patch Tuesday Fixes 91 Vulnerabilities, 4 Zero-Days
Hackread
-
November 5, 2024
Tor and Tails Team Up for Better Online Privacy Protections
Linux Insider
-
October 30, 2024
WhiteRabbitNeo: High-Powered Potential of Uncensored AI Pentesting for Attackers and Defenders
Security Week
-
October 29, 2024
Black Basta Group Using QR Codes in Teams Chats for Initial Access
MSSP Alert
-
October 24, 2024
Prometei' Botnet Spreads Its Cryptojacker Worldwide
Dark Reading
-
October 21, 2024
The Weaponization-Remediation Crisis: Closing the Gap to Secure U.S. Critical Infrastructure and Systems
GovLoop
-
October 15, 2024
Jetpack Patches Critical Bug That Exposed Data on 27M WordPress Sites
SC Magazine
-
October 10, 2024
Qualys Unfurls Risk Operations Center Platform
Security Boulevard
-
October 9, 2024
Qualys Debuts Industry's First Risk Operations Center (ROC) in the Cloud
VMblog
-
October 9, 2024
Qualys Partners Get New Risk Operations Center
Channel Futures
-
October 8, 2024
Apple Releases macOS Patch to Fix Compatibility Issues with Security Tools
SC Magazine
-
October 8, 2024
Security Leaders Discuss the New Vulnerability Added to CISA’s Catalog
Security Magazine
-
October 4, 2024
Ivanti Confirms Exploitation of an Old Critical Vuln
BankInfoSecurity
-
October 4, 2024
Ivanti Confirms Exploitation of an Old Critical Vuln
Gov InfoSecurity
-
October 2, 2024
NIST's Security Flaw Database Still Backlogged with 17K+ Unprocessed Bugs. Not Great
The Register
-
September 27, 2024
Warnings on High Severity Linux Printing System Vulnerabilities
SC Magazine
-
September 27, 2024
National Cybersecurity Strategy Hinges on Federal Coordination, Cyber Risk Management
CPO Magazine
-
September 23, 2024
How AI-informed cybersecurity and risk management strategies can empower federal agencies to tackle complex cyber threats
Federal News Network
-
September 20, 2024
Sequoia Update for macOS ‘Broke’ Popular Security Tools
SC Magazine
-
September 20, 2024
Upgrading to MacOS Sequoia? Here's Why You May Want To Hold Off
ZDNET
-
September 20, 2024
Apple’s macOS Sequoia Release Causing Issues For EDR Tools: Reports
CRN
-
September 11, 2024
US Presidential Debate Targeted by Disinformation Threats
Channele2e
-
September 11, 2024
Hackers Have Sights Set on Four Microsoft Vulnerabilities, CISA Warns
The Record
-
September 10, 2024
Microsoft September 2024 Patch Tuesday Fixes 79 Flaws, Including 4 Zero-Days
Hackread
-
September 10, 2024
Microsoft Discloses 4 Zero-Days in September Update
Dark Reading
-
September 10, 2024
Disinformation Reigns Ahead of Harris-Trump Presidential Debate
SC Magazine
-
September 6, 2024
A new malware named “Voldemort” may be a cyber espionage campaign
Security Magazine
-
September 3, 2024
EPSS and vulnerability management: New scoring system shows promise
Security Boulevard
-
September 3, 2024
White House Takes Aim at Internet Security
The Wall Street Journal
-
August 31, 2024
New Voldemort Malware Uses Google Sheets to Target Key Sectors Globally
Hackread
-
August 30, 2024
Voldemort' Malware Curses Orgs Using Global Tax Authorities
Dark Reading
-
August 29, 2024
Over 500,000 Members of Texas Credit Union Affected by Data Breach
SecureWorld
-
August 29, 2024
Breach Exposed Information of More Than 500,000 Credit Union Members
Security Magazine
-
August 29, 2024
Do cybersecurity certifications still deliver? Experts share 6 key insights
Security Boulevard
-
August 27, 2024
MOVEit Hack Exposed Personal Data of Half Million TDECU Users
Info Security
-
August 27, 2024
TDECU Data Breach: 500,000+ Members Affected by MOVEit Exploit
Hackread
-
August 26, 2024
Texas Dow Employees Credit Union Notifies 500,000 of MOVEit Breach
SC Magazine
-
August 21, 2024
Backdoor in RFID Cards for Offices, Hotels Can Lead to Instant Cloning
Security Boulevard
-
August 19, 2024
FedRAMP Modernization Guide Still Contains Gaps, Expert Says
Gov InfoSecurity
-
August 19, 2024
FedRAMP Modernization Guide Still Contains Gaps, Expert Says
Bank Info Security
-
August 9, 2024
Report reveals 10% increase in the exploitation of old CVEs
Security Magazine
-
August 6, 2024
How risk prioritization and automation can shape the future of federal cybersecurity
Federal News Network
-
July 17, 2024
Void Banshee Group Used ‘Windows Relic’ IE in Phishing Campaign
Security Boulevard
-
July 11, 2024
Void Banshee Group Used ‘Windows Relic’ IE in Phishing Campaign
Security Boulevard
-
July 11, 2024
Global Intel Agencies Accuse China of Rampant Government Network Hacking
SecureWorld
-
July 8, 2024
Supreme Court Ruling Threatens the Framework of Cybersecurity Regulation
SecurityWeek
-
July 3, 2024
Friend or Foe? AI's Complicated Role in Cybersecurity
Dark Reading
-
July 2, 2024
Linux Users Beware: New OpenSSH Vulnerability Could Lead to System Takeover
Techopedia
-
July 2, 2024
Over 14M servers may be vulnerable to OpenSSH's regreSSHion RCE flaw. Here's what you need to do
ZDNET
-
July 1, 2024
Critical OpenSSH vulnerability could affect millions of servers
TechTarget
-
July 1, 2024
Researchers uncover rare, difficult-to-exploit OpenSSH vulnerability
Cyberscoop
-
July 1, 2024
Urgent: Patch Fixed, Reintroduced OpenSSH Bug, Says Qualys
Data Breach Today
-
July 1, 2024
Urgent: Patch Fixed, Reintroduced OpenSSH Bug, Says Qualys
InfoRiskToday
-
July 1, 2024
Urgent: Patch Fixed, Reintroduced OpenSSH Bug, Says Qualys
HealthcareInfoSecurity
-
July 1, 2024
Urgent: Patch Fixed, Reintroduced OpenSSH Bug, Says Qualys
Gov InfoSecurity
-
July 1, 2024
Urgent: Patch Fixed, Reintroduced OpenSSH Bug, Says Qualys
BankInfoSecurity
-
June 28, 2024
Cyberattack Rate Surges as Novel Malware Growth Accelerates
Security Boulevard
-
June 26, 2024
GAO Urges Action to Address Critical Cybersecurity Challenges Facing U.S.
Security Boulevard
-
June 25, 2024
Cloud-based worm now spews ransomware and cryptominer gloom
SC Media
-
June 25, 2024
Securing the Clean Energy Cyber Supply Chain: U.S. DOE's New Framework
SecureWorld
-
June 24, 2024
LockBit Ransomware Gang Claims Breach of U.S. Federal Reserve
SecureWorld
-
June 20, 2024
Top 15 Vulnerability Management Tools for Your Business
Security Boulevard
-
June 17, 2024
FedRAMP Modernization: Transforming Federal Cybersecurity Through Automation and Risk Management
GovLoop
-
June 14, 2024
Chinese Threats Aim for Government Sector
Security Boulevard
-
June 12, 2024
Black Basta Ransomware Suspected of Exploiting Windows Zero-Day Flaw
SecureWorld
-
June 12, 2024
Black Basta exploits patched Windows privilege escalation bug
SC Media
-
June 12, 2024
Rockwell's ICS Directive Comes as Critical Infrastructure Risk Peaks
Dark Reading
-
June 12, 2024
Why Malware Matters Most: 6 Ways to Foil Software Threats Faster
ReversingLabs
-
June 12, 2024
Why Malware Matters Most: 6 Ways to Foil Software Threats Faster
Security Boulevard
-
June 12, 2024
Black Basta Ransomware Suspected of Exploiting Windows 0-day Before Patch
Hackread
-
June 11, 2024
How to combat cyber threats and secure democracy in the digital age
Federal Times
-
June 5, 2024
People’s lives are at risk,’: Ascension ransomware attack going on nearly three weeks”.
NBC Austin
-
June 5, 2024
Ascension electronic health records restored after ransomware attack
NBC Austin
-
June 4, 2024
9 Best Practices for Leveraging Threat Intelligence in Your Security Operations
ReversingLabs
-
June 4, 2024
9 Best Practices for Leveraging Threat Intelligence in Your Security Operations
Security Boulevard
-
June 4, 2024
MIT Report Spotlights Triple Threat Fueling Data Breach Tsunami
SecureWorld
-
June 3, 2024
Agency Leaders Call Cybersecurity ‘Kitchen Table’ Topic
GovCIO
-
June 3, 2024
Agency Leaders Call Cybersecurity ‘Kitchen Table’ Topic
GovCIO
-
June 3, 2024
Cybersecurity Automation in Healthcare Program Launched by HHS Agency
Security Boulevard
-
May 31, 2024
Okta alerts customers against new credential-stuffing attacks
CSO
-
May 30, 2024
Okta says Customer Identity Cloud prone to credential-stuffing attacks
SC Media
-
May 28, 2024
People’s lives are at risk,’: Ascension ransomware attack going on nearly three weeks
NBC Austin
-
May 23, 2024
Energy Dept. CISO Paints Sobering Portrait of Cyber Readiness
MeriTalk
-
May 22, 2024
SEC’s $10 Million Fine of NYSE Owner Shows Focus on Cyber Disclosures
The Wall Street Journal
-
May 22, 2024
NSA Aims to Boost Cybersecurity for Small Defense Contractors
MeriTalk
-
May 22, 2024
Rockwell to customers: Remove public-facing ICS devices from internet
SC Media
-
May 22, 2024
EPA Issues Urgent Alert for Water Utilities to Enhance Cyber Defenses
SecureWorld
-
May 21, 2024
Qualys expands Enterprise TruRisk Platform capabilities for the government sector
Security Info Watch
-
May 21, 2024
NGA Official Wary on AI Risk Management Impacts
MeriTalk
-
May 21, 2024
Qualys Enterprise TruRisk Platform Now Accelerates Federal Agency’s Zero-Trust Journey with Automated Compliance for OMB M-24-04 and CISA BOD 23-01
Global Security Mag
-
May 21, 2024
Qualys launches CyberSecurity Asset Management 3.0
intelligent ciso
-
May 20, 2024
Securing the 2024 election: a cyber expert weighs in
FOX5
-
May 16, 2024
Interview: Nayeem Islam On The Need For Vulnerability Scanning “At All Times”
Expert Insights
-
May 15, 2024
CISA's 'vulnrichment' aims to fix the NVD
ReversingLabs
-
May 15, 2024
CISA’s ‘vulnrichment’ aims to fix the NVD
Security Boulevard
-
May 15, 2024
Microsoft fixes exploited Qakbot-delivering 0-day in May Patch Tuesday
SC Media
-
May 13, 2024
Here’s What 20 Top Cybersecurity CEOs And CTOs Were Saying At RSA Conference 2024
CRN
-
May 10, 2024
Enterprise Cyber Risk: Overcoming the Issue of Siloed Tools
Bank Info Security
-
May 10, 2024
All in a week’s events: The AI juggernaut hits cybersecurity, open source and IT infrastructure
Silicon Angle
-
May 10, 2024
Is CISA's Secure by Design Pledge Toothless?
Dark Reading
-
May 10, 2024
Five Companies That Came To Win This Week
CRN
-
May 10, 2024
We Asked 14 Top Cybersecurity Experts And Leaders What They Are Most Excited About. Here’s What They Told Us.
Expert Insights
-
May 8, 2024
It May be Time to Review Your Cyber Hygiene
Security Magazine
-
May 8, 2024
10 Cybersecurity Companies Making Moves At RSAC 2024
CRN
-
May 8, 2024
Day Two At RSAC 2024: Insights From Bugcrowd, Huntress, Qualys, And Forescout
Expert Insights
-
May 7, 2024
Enterprise Cyber Risk: Overcoming the Issue of Siloed Tools
Bank Info Security
-
May 6, 2024
‘Secure by Design’: Career Opportunities for Tech, Security Pros
Dice Insights
-
May 6, 2024
MSSP Market News: Fastly, CyberProof, Google Cloud, Tidal Cyber
MSSP Alert
-
May 3, 2024
Verizon 2024 Data Breach Report shows the risk of the human element
Security Magazine
-
May 3, 2024
State-Sponsored North Korean Hackers Penetrated South Korean Defense Companies, Stole Sensitive Technical Data
CPO Magazine
-
May 2, 2024
MSSP Market News: Fortinet, BlackBerry, Qualys
MSSP Alert
-
May 2, 2024
Flaw in R Creates Supply Chain Security Risks
The New Stack
-
May 1, 2024
NIST Updated Its Cybersecurity Framework. What Does That Mean for Agencies?
FedTech Magazine
-
May 1, 2024
Verizon’s 2024 Data Breach Investigations Report: 5 key takeaways
SC Magazine
-
April 30, 2024
DHS: AI-Enhanced Nuclear and Chemical Threats Are Risk to US
Gov InfoSecurity
-
April 30, 2024
Federal agencies need to rethink culture in the fight against ransomware
NextGov
-
April 29, 2024
Experts weigh in on Omni Hotel ransomware incident
Security Magazine
-
April 29, 2024
Experts weigh in on the MITRE nation-state cyberattack
Security Magazine
-
April 26, 2024
Military Tank Manual, 2017 Zero-Day Anchor Latest Ukraine Cyberattack
Dark Reading
-
April 25, 2024
North Korean Hackers Intensify Cyberattacks on South's Arms Industry
SecureWorld
-
April 25, 2024
Nation-State Hackers Leverage Zero-Day Vulnerabilities to Penetrate MITRE Cybersecurity Research Network
CPO Magazine
-
April 22, 2024
Addressing GAO's Findings on National Cyber Risk Management Gaps
Federal News Network
-
April 19, 2024
How Unified Attack Surface Management Future Proofs Fed Cyberspace
Federal Times
-
April 18, 2024
Hacking the Floodgates: US Dams Face Growing Cyber Threats
Gov InfoSecurity
-
April 17, 2024
Brute-force attacks surge worldwide, warns Cisco Talos
SC Magazine
-
April 13, 2024
Week that Was for 04.13.24
CyberWire
-
April 12, 2024
CISA's Malware Analysis Platform Could Foster Better Threat Intel
Dark Reading
-
April 12, 2024
Report finds that only 5% of businesses have a cyber expert
Security Magazine
-
April 11, 2024
A vulnerability in Linux distributions may allow unauthorized access
Security Magazine
-
April 10, 2024
After BlackCat, RansomHub tries to Extort Change Healthcare
Medical Buyer
-
April 9, 2024
Daily Briefing for 04.09.24
CyberWire
-
April 8, 2024
Change Healthcare Investigates Potential Leak of Patient Data
HIPAA Journal
-
April 8, 2024
Change Healthcare breach data may be in hands of new ransomware group
SC Magazine
-
April 5, 2024
New Latrodectus Downloader Malware Linked to IcedID and Qbot Creators
Hackread
-
April 4, 2024
‘Latrodectus’ uses sandbox evasion techniques to launch malicious payloads
SC Magazine
-
April 4, 2024
Malicious Latrodectus Downloader Picks Up Where QBot Left Off
Dark Reading
-
April 3, 2024
NIST Proposes Public-Private Group to Help with NVD Backlog
Security Boulevard
-
April 3, 2024
Ransomware, Junk Bank Accounts: Cyber Threats Proliferate in Vietnam
Dark Reading
-
April 2, 2024
NIST Wants Help Digging Out of Its NVD Backlog
Dark Reading
-
April 2, 2024
Government agencies collaborate on a guide to address DDoS attacks
Security Magazine
-
April 1, 2024
XZ Utils Backdoor Implanted in Carefully Executed, Multiyear Supply Chain Attack
Dark Reading
-
April 1, 2024
Cybersecurity Industry Starts Picking Through Malicious XZ Utils Code
Security Boulevard
-
March 28, 2024
World Backup Day 2024 on March 31
Disaster Recovery Journal
-
March 28, 2024
EPA Warns US Water Systems Vulnerable to a Disruptive Cyber Attack, State Governors Must Do More
CPO Magazine
-
March 27, 2024
Expert Commentary: World Backup Day
GLOBAL SECURITY MAG
-
March 27, 2024
Critical infrastructure may be the subject of disruptive cyberattacks
Security Magazine
-
March 26, 2024
Flaw in Ray AI framework potentially leaks sensitive data of workloads
SC Media
-
March 26, 2024
CISA, FBI Release Comprehensive DDoS Guidance Amid Rising Attacks
SecureWorld
-
March 25, 2024
The Gately Report: Trustwave Partners Get Help Starting Cybersecurity Journeys
Channel Futures
-
March 21, 2024
NIST's Vuln Database Downshifts, Prompting Questions About Its Future
Dark Reading
-
March 18, 2024
UnitedHealth Begins Testing Restored Change Healthcare Claims Platform
The Wall Street Journal
-
March 18, 2024
The Path to Stronger Cyber Defenses: A Blueprint for State and Local Governments
CPO Magazine
-
March 13, 2024
NIST Cybersecurity Framework 2.0: What Tech Professionals Need to Know
Dice Insights
-
March 13, 2024
March Patch Tuesday: Microsoft Fixes Two Critical Hyper-V Flaws
SC Magazine
-
March 12, 2024
Microsoft Discloses Critical Hyper-V Flaws in Low-Volume Patch Update
Dark Reading
-
March 12, 2024
5 Things To Know On Microsoft’s ‘Patch Tuesday’ for March 2024
CRN
-
March 6, 2024
NIST CSF 2.0: Better Risk Management for the New Era of Supply Chain Security
ReversingLabs
-
March 5, 2024
NIST Unveils Cybersecurity Framework 2.0 with Key Upgrades
SecureWorld
-
March 4, 2024
National Institute of Standards and Technology (NIST) has released its Cybersecurity Framework (CSF) 2.0
Channel Futures
-
March 1, 2024
ConnectWise ScreenConnect Vulnerabilities: What CIOs Need to Know
InformationWeek
-
February 29, 2024
All SBOMs Are Not Created Equal: How to Make Them Actionable
ReversingLabs
-
February 29, 2024
Industry Reactions to NIST Cybersecurity Framework 2.0: Feedback Friday
SecurityWeek
-
February 29, 2024
BlackCat Eats into Its Nine Lives, Threatens More Attacks on Hospitals
SecureWorld
-
February 29, 2024
NIST Makes it Official: Governance is a Critical Part of Cybersecurity
Cybersecurity Dive
-
February 27, 2024
NIST Publishes Cybersecurity Framework 2.0: 3 Key Takeaways
SC Magazine
-
February 27, 2024
Half of IT Leaders Identify IoT as Security Weak Point
Infosecurity
-
February 20, 2024
20 Coolest Security Operations, Risk And Threat Intelligence Of 2023: The Security 100
CRN
-
February 20, 2024
CEO Outlook: Sumedh Thakar, President & CEO, Qualys
CRN
-
February 19, 2024
6 Best Cloud Security Companies & Vendors in 2024
eSecurity Planet
-
February 16, 2024
In the evolving cyberwar, China aims to take down our critical infrastructure
SC Magazine
-
February 15, 2024
Microsoft Exchange Server Flaw Exploited as a Zero-Day Bug
Dark Reading
-
February 15, 2024
Microsoft and OpenAI swept AI chat logs to find hackers. Expect that to become the norm.
NextGov
-
February 14, 2024
Valentine’s Day Scams Woo the Lonely-Hearted
Security Boulevard
-
February 13, 2024
Attackers Exploit Microsoft Security-Bypass Zero-Day Bugs
Dark Reading
-
February 12, 2024
CISA and other US agencies release advisory on PRC threat actor
Security Magazine
-
February 12, 2024
CISA and Fortinet Warns of New FortiOS Zero-Day Flaws
Hackread
-
February 9, 2024
Qualys Introduces TotalCloud 2.0 with TruRisk Insights to Eliminate Cyber Risk in Cloud and SaaS Applications
Database Trends and Applications
-
February 9, 2024
‘Critical’ Fortinet FortiOS Vulnerability Seeing Exploitation: CISA
CRN
-
February 8, 2024
New HijackLoader Variant Evades Detection, Enhances Persistence
SC Media
-
February 7, 2024
MSSP Market News: ZeroFox, Clearwater, 1stResponder, Qualys
MSSP Alert
-
February 7, 2024
Qualys Unveils TotalCloud 2.0
DevOps Digest
-
February 7, 2024
Qualys Unveils TotalCloud 2.0
Global Security Mag
-
February 5, 2024
How the SEC's Rules on Cybersecurity Incident Disclosure Are Exploited
Dark Reading
-
January 31, 2024
More Ivanti VPN Zero-Days Fuel Attack Frenzy as Patches Finally Roll
Dark Reading
-
January 31, 2024
Two new Ivanti bugs discovered as CISA warns of hackers bypassing mitigations
The Record
-
January 31, 2024
One of two new high-severity bugs in Ivanti exploited in the wild
SC Media
-
January 31, 2024
GNU C Library Vulnerability Leads to Full Root Access
SecurityWeek
-
January 31, 2024
Critical Flaws Found in GNU C Library, Major Linux Distros at Risk
Hackread
-
January 31, 2024
New Glibc Flaw Grants Attackers Root Access on Major Linux Distros
The Hacker News
-
January 30, 2024
New Linux glibc flaw lets attackers get root on major distros
Bleeping Computer
-
January 29, 2024
Orange Cyberdefense Expands Partnership with Qualys
Global Security Mag
-
January 29, 2024
Orange Cyberdefense Expands Partnership with Qualys, Strengthening Managed Cybersecurity Portfolio to Deliver an End-to-End Vulnerability Intelligence Service
VMblog
-
January 29, 2024
MSSP Market News: Qualys, Orange Cyberdefense, Commvault
MSSP Alert
-
January 24, 2024
6 Best Vulnerability Management Software & Systems in 2024
eSecurity Planet
-
January 22, 2024
Atlassian Confluence Server RCE attacks underway from 600+ IPs
The Register
-
January 22, 2024
The 20 Coolest Cloud Security Companies Of The 2024 Cloud 100
CRN
-
January 19, 2024
ColdRiver threat group targeting critical infrastructure with backdoor attacks
SC Media
-
January 17, 2024
Lock Down the Software Supply Chain With 'Secure by Design'
Dark Reading
-
January 17, 2024
Improving Supply Chain Security, Resiliency
InformationWeek
-
January 16, 2024
Androxgh0st malware hackers creating large botnet, CISA and FBI warn
The Record
-
January 16, 2024
What Will It Take to Adopt Secure by Design Principles?
InformationWeek
-
January 10, 2024
Microsoft fixes 48 bugs in January Patch Tuesday, none of them zero-days
SC Media
-
January 9, 2024
Patch Now: Critical Windows Kerberos Bug Bypasses Microsoft Security
Dark Reading
-
January 9, 2024
Russian Agents Hacking Residential Surveillance Cameras to Gather Intel in Ukraine
CPO Magazine
-
January 5, 2024
Russia Hacked Residential Cameras in Ukraine to Spy on Air Defense, Critical Infrastructure
SecurityWeek
-
January 4, 2024
Why red-teaming is crucial to the success of Biden’s executive order on AI
Federal News Network
-
January 4, 2024
CISA Warns of Exploited Vulnerabilities in Chrome and Excel Parsing Library
Hackread
-
January 4, 2024
Ukraine: Russia hacked webcams to aid missile, drone strikes on Kyiv
SC Media
-
January 4, 2024
Ep. 118 An update on Zero Trust for the Federal Government
Federal Tech Podcast
-
January 4, 2024
The State of Container Security: 5 Key Steps to Locking Down Your Releases
Security Boulevard
-
January 4, 2024
The State of Container Security: 5 Key Steps to Locking Down Your Releases
ReversingLabs
-
January 3, 2024
CISA Warns Federal Agencies of Exploited Google Chrome and Open-Source Vulnerabilities
The Record
-
January 3, 2024
CISA Adds Excel, Chrome Flaws to Its Exploited Vulnerabilities Catalog
SC Magazine
-
January 2, 2024
Emsisoft: Ban Ransom Payments to Stop Ransomware Attacks
Channel Futures