USA media coverage.
-
December 29, 2023
Qualys CEO on Global Cloud Demand, Rising Cyber Risks, and AI
CNBC
-
December 22, 2023
Google Flags 8th Chrome Zero-Day of the Year
Gov InfoSecurity
-
December 22, 2023
Google Flags 8th Chrome Zero-Day of the Year
Bank Info Security
-
December 22, 2023
Google Flags 8th Chrome Zero-Day of the Year
DataBreachToday
-
December 22, 2023
Google Releases Eighth Zero-Day Patch of 2023 for Chrome
Dark Reading
-
December 21, 2023
Qualys Releases Annual Review of CVEs in 2023
Focus on IT
-
December 21, 2023
Google Releases Emergency Patches for Eighth Chrome Zero-Day of 2023
SC Magazine
-
December 20, 2023
Slow Patching Exacts a Price
The Wall Street Journal
-
December 20, 2023
Top cybersecurity predictions of 2024
Security Magazine
-
December 20, 2023
Cybersecurity Predictions for 2024: 5 Trends to Watch
Dice Insights
-
December 20, 2023
How States Help Municipalities Build Their Cyber Defenses
Dark Reading
-
December 19, 2023
1 in 4 high-risk CVEs are exploited within 24 hours of going public
SC Media
-
December 19, 2023
Report: Attackers Move Lightning Fast to Capitalize on Vulnerabilities
SecureWorld
-
December 19, 2023
Report Says CISA is Failing to Identify High-Risk Exploits
Gov InfoSecurity
-
December 19, 2023
Majority of 2023’s critical cyberattacks stemmed from fewer than 1% of vulnerabilities
SiliconANGLE
-
December 18, 2023
Cloudflare report: Log4j remains top target for attacks in 2023
CSO
-
December 15, 2023
Patch Now: Exploit Activity Mounts for Dangerous Apache Struts 2 Bug
Dark Reading
-
December 15, 2023
China's Cyber Intrusions a Looming Threat to U.S. Critical Infrastructure
SecureWorld
-
December 14, 2023
CISA Cites Modest Progress in Reducing CVEs
Security Boulevard
-
December 13, 2023
Microsoft Gives Admins a Reprieve With Lighter-Than-Usual Patch Update
Dark Reading
-
December 12, 2023
Critical Struts 2 flaw could result in remote code execution, says Apache
SC Media
-
December 11, 2023
The Gately Report: Qualys Partners Getting New Channel Program in Early 2024
Channel Futures
-
December 11, 2023
For CISOs in 2024, “Efficiency” Will Be the Keyword
VMblog
-
December 8, 2023
Apple: 2.5B Records Exposed, Marking Staggering Surge in Data Breaches
Dark Reading
-
December 8, 2023
Trojan-Proxy Based on macOS Piggybacks on Cracked Software
SC Magazine
-
December 7, 2023
Proxy Trojan Targets macOS Users for Traffic Redirection
Dark Reading
-
December 6, 2023
2024 Cybersecurity Predictions: Insights from Industry Experts
GLOBAL SECURITY MAG
-
December 1, 2023
Top 9 Cybersecurity Trends in 2024
Techopedia
-
November 30, 2023
Latest severe Chrome bug prompts CISA warning
The Record
-
November 29, 2023
Google Patches Another Chrome Zero-Day as Browser Attacks Mount
Dark Reading
-
November 29, 2023
Cyber Attack on Ardent Health Closes 3 of Its 30 Emergency Rooms
SecureWorld
-
November 29, 2023
Google rolls out emergency update for Chrome after critical vulnerability found
Silicon Angle
-
November 22, 2023
Flaw in Apache ActiveMQ Exposes Linux Systems to Kinsing Malware
Infosecurity
-
November 21, 2023
Don't let CVEs distract you: Shift your AppSec team's focus to malware
ReversingLabs
-
November 21, 2023
Kinsing malware exploits critical Apache ActiveMQ flaw to mine crypto
SC Media
-
November 21, 2023
CISA orders federal agencies to patch Looney Tunables Linux bug
Bleeping Computer
-
November 21, 2023
Don’t let CVEs distract you: Shift your AppSec team’s focus to malware
Security Boulevard
-
November 21, 2023
CISA, NSA Issue Supply Chain Security Guidance Report
DevOps.com
-
November 16, 2023
CSA Launches First Zero Trust Certification
Infosecurity
-
November 15, 2023
CISA adds three Microsoft Patch Tuesday bugs to vulnerability list
The Record
-
November 14, 2023
Microsoft Zero-Days Allow Defender Bypass, Privilege Escalation
Dark Reading
-
November 13, 2023
Cyber risk is business risk: Qualys Enterprise TruRisk Platform sets new industry standard
Help Net Security
-
November 10, 2023
Morgan Stanley Cybersecurity Director: Teams Need to Focus on Four Rs
Security Boulevard
-
November 9, 2023
Cybersecurity Analyst Degree: What You Need to Know
Dice Insights
-
November 8, 2023
Qualys Unveils Risk Management Platform
Security Boulevard
-
November 7, 2023
CVSS 4.0 Offers Significantly More Patching Context
Dark Reading
-
November 7, 2023
CVSS 4.0 Offers Significantly More Patching Context
Dark Reading
-
November 6, 2023
Kinsing Cyberattackers Debut 'Looney Tunables' Cloud Exploits
Dark Reading
-
November 2, 2023
CVSS 4.0 keys-in on threat intelligence metrics and OT, ICS and IoT
SC Magazine
-
October 31, 2023
ServiceNow Misconfiguration Went Unexploited, But Still Cause for Concern
SC Magazine
-
October 31, 2023
Malware mealkits, and other commodity criminal tools
CyberWire
-
October 31, 2023
Qualys Announces TruRisk, FixIT and ProtectIT Packages in AWS Marketplace
Global Security Mag
-
October 31, 2023
Qualys Announces TruRisk, FixIT and ProtectIT Packages in AWS Marketplace
VMblog
-
October 27, 2023
Cisco Security Bugs: How Network Managers Can Keep Track
Networking Computer
-
October 26, 2023
VMware Warns of Critical Vulnerability Affecting vCenter Server Product
The Record
-
October 25, 2023
Virtual Alarm: VMware Issues Major Security Advisory
Dark Reading
-
October 25, 2023
Salt Security: OAuth Implementation Flaw Could Lead to Account Takeover
Security Boulevard
-
October 25, 2023
Grammarly says it corrected sign-in vulnerabilities after alert from cyber researchers
The Record
-
October 24, 2023
Flaws in OAuth’s social sign-in could have put billions of users at risk
SC Magazine
-
October 23, 2023
Microsoft Vulnerabilities Top CISA’s List of Ransomware-Linked CVEs
Security Boulevard
-
October 23, 2023
What the Cisco IOS XE zero-day reveals about potential risk management blind spots
SC Magazine
-
October 20, 2023
Cisco IOS XE Attacks: 7 Biggest Unanswered Questions
CRN
-
October 18, 2023
More Than 34,000 Cisco Devices Compromised Via IOS XE Vulnerability: Researchers
CRN
-
October 17, 2023
Why Cisco IOS XE Attacks Are Setting Off Alarm Bells
CRN
-
October 16, 2023
Cisco: Hackers targeting zero-day found in internet-exposed routers
The Record
-
October 16, 2023
New Cisco Web UI Vulnerability Exploited by Attackers
Hackread
-
October 16, 2023
Cisco zero-day bug allows router hijacking and is being actively exploited
The Register
-
October 16, 2023
Active Exploitation Discovered in Cisco IOS XE Software, Devices Vulnerable
Channel Futures
-
October 16, 2023
Cisco IOS XE Vulnerability: Here’s What To Know
CRN
-
October 16, 2023
What federal agencies can learn from the MGM and Caesars cyberattacks
Federal Times
-
October 12, 2023
How to Scan Your Environment for Vulnerable Versions of Curl
Dark Reading
-
October 11, 2023
Nasty bug discovered in widely used Linux utility curl, and patches already rolled out
ZDNET
-
October 11, 2023
GNOME Libcue Flaw is a Risk to Linux Systems
Security Boulevard
-
October 11, 2023
From chaos to cadence: Celebrating two decades of Microsoft's Patch Tuesday
The Register
-
October 10, 2023
Attacks on NetScaler Gateways aim for user credentials
SC Media
-
October 9, 2023
Looney Tunables' Linux Flaw Sees Snowballing Proof-of-Concept Exploits
Dark Reading
-
October 9, 2023
GNOME Linux systems exposed to RCE attacks via file downloads
Bleeping Computer
-
October 9, 2023
Maintainers Warn of Vulnerability Affecting Foundational Open-Source Tool
The Record
-
October 6, 2023
THIS WEEK IN SECURITY: LOONEY TUNABLES, NOT A 0-DAY*, AND CURL WARNING
Hackaday
-
October 6, 2023
Linux Distributions Impacted by High-Severity Glibc Bug
Decipher
-
October 6, 2023
MULTIPLE EXPERTS RELEASED EXPLOITS FOR LINUX LOCAL PRIVILEGE ESCALATION FLAW LOONEY TUNABLES
Security Affairs
-
October 5, 2023
Patch Now: This Serious Linux Vulnerability Affects Nearly All Distributions
ZDNET
-
October 5, 2023
Malicious code execution likely with high-severity Linux bug
SC Media
-
October 4, 2023
‘Looney Tunables’ Linux Vulnerability Could Allow Threat Actors to Run Malicious Code
Silicon Angle
-
October 4, 2023
Qualys Discovers Critical Linux Flaw ‘Looney Tunables’
Tech News World
-
October 4, 2023
Looney Tunables Exploit Gives Hackers Root Access To Linux, That's All Folks
Hot Hardware
-
October 4, 2023
Looney Tunables' Bug Opens Millions of Linux Systems to Root Takeover
Dark Reading
-
October 4, 2023
Qualys Discovers Critical Linux Flaw ‘Looney Tunables’
Linux Insider
-
October 4, 2023
Severe Glibc Privilege Escalation Vulnerability Impacts Major Linux Distributions
Security Week
-
October 4, 2023
Looney Tunables: New Linux Flaw Enables Privilege Escalation on Major Distributions
The Hacker News
-
October 3, 2023
Linux Vulnerability Exposes Millions of Systems to Attack
Hackread
-
October 3, 2023
New 'Looney Tunables' Linux Bug Gives Root on Major Distros
Bleeping Computer
-
September 28, 2023
Department of Defense overhauls cyber strategy: Experts weigh in
Security Magazine
-
September 27, 2023
MOVEit Bug’s Ripple Effect Still Unfolding
Decipher
-
September 26, 2023
ShadowSyndicate suspected of being RaaS affiliate to several ransomware families
SC Media
-
September 26, 2023
EPSS vs. CVSS: Exploit prediction could change the game on software risk management
Security Boulevard
-
September 21, 2023
BlueVoyant Partners with Qualys to launch comprehensive vulnerability identification service - Visibl for Qualys
ITWire
-
September 19, 2023
BlueVoyant, Qualys Partner for Vulnerability Management
MSSP Alert
-
September 17, 2023
Probe Reveals Previously Secret Israeli Spyware That Infects Targets via Ads
The Register
-
September 14, 2023
Pro Take: MGM Casino Hack Shows Challenge in Defending Connected Tech
The Wall Street Journal
-
September 13, 2023
What Is Vulnerability Management? Everything You Should Know
Enterprise Networking Planet
-
September 13, 2023
The Gately Report: Egnyte Partners Getting New Opportunities with Generative AI
Channel Futures
-
September 13, 2023
CISA Issues Alert to Secure iPhones Against Pegasus Spyware Zero-Days
SecureWorld
-
September 12, 2023
Top 10 IT Asset Discovery Tools
Enterprise Talk
-
September 8, 2023
Apple issues 2 CVEs to patch zero-day flaws used to deliver Pegasus spyware
SC Magazine
-
September 8, 2023
Microsoft vulnerabilities make up 75% of top 20 exploited list
SDxCentral
-
September 1, 2023
Industry Reactions to Qakbot Botnet Disruption: Feedback Friday
SecurityWeek
-
August 29, 2023
FBI Dismantles Qakbot Botnet in Landmark Cyber Op
SecureWorld
-
August 24, 2023
Cloud insecurity: leaving the keys in the door?
Security Insights
-
August 21, 2023
CISA Warns of Citrix ShareFile Vulnerability
Channel Futures
-
August 18, 2023
4 of the Biggest Vulnerabilities Talked About During Black Hat 2023
InformationWeek
-
August 17, 2023
CISA Alert Warns of Citrix ShareFile Transfer Vulnerability
SecureWorld
-
August 17, 2023
Qualys Offers Threat Forecast For Cloud, and Tips For Reducing Cloud Risks
Dark Reading
-
August 17, 2023
CISA adds Citrix ShareFile flaw to the KEV catalog
SC Media
-
August 15, 2023
New US Initiatives Aim To Better Defend Against Cyberattacks
Tech News World
-
August 14, 2023
Microsoft, cloud security under the microscope with federal cyber review
Cybersecurity Dive
-
August 11, 2023
Bugs in Codesys V3 SDK could cause RCE, DoS attacks on industrial facilities
SC Media
-
August 10, 2023
Black Hat USA: Cybersecurity Concerns Amid Big Techs’ AI, ChatGPT ‘Race’
Channel Futures
-
August 10, 2023
20 Hottest New Cybersecurity Tools At Black Hat 2023
CRN
-
August 9, 2023
Joint Advisory Warns of Threat From IDOR Vulnerabilities
Security Boulevard
-
August 8, 2023
Misconfigurations in major cloud offerings examined
SC Media
-
August 7, 2023
Research Eyes Misconfiguration Issues At Google, Amazon and Microsoft Cloud
TechRepublic
-
August 3, 2023
Phishing Campaign Exploited Salesforce Flaw to Attack Facebook Users
Security Boulevard
-
August 3, 2023
Attackers Chain Salesforce and Facebook Flaws to Launch Phishing Attacks
SC Media
-
August 3, 2023
These Are the Top Five Cloud Security Risks, Qualys Says
SecurityWeek
-
August 2, 2023
Report Reveals Alarming Cloud Misconfiguration and Exposed Assets
Enterprise Security Tech
-
August 2, 2023
Managed Security Services Provider (MSSP) Market News: 2 August 2023
MSSP Alert
-
August 2, 2023
Qualys Report: Cloud Misconfiguration Critical Issue in Cloud Security Environments
Channel Futures
-
August 2, 2023
Mazars, Qualys to Expand Managed Cybersecurity Services
Channel Vision Mag
-
August 1, 2023
Experts Sound Alarm on Critical Cloud Security Risks
SecureWorld
-
August 1, 2023
Qualys Research Finds 57% of Azure and 60% of Google Cloud Deployments Fail CIS Benchmarks
VMblog
-
August 1, 2023
Cloud Tech Debt Puts Millions of Apps at Risk, Says New Report
Infosecurity
-
August 1, 2023
Over half of Azure and Google Cloud deployments fail CIS benchmarks
BetaNews
-
July 24, 2023
Qualys CEO on Vulnerability, Patch Management Needs of SMBs
Gov InfoSecurity
-
July 24, 2023
Qualys CEO on Vulnerability, Patch Management Needs of SMBs
BankInfoSecurity
-
July 18, 2023
Exploited 0-days, an incomplete fix, and a botched disclosure: Infosec snafu reigns
Ars Technica
-
July 11, 2023
Managed Security Services Provider (MSSP) Market News: 10 July 2023
MSSP Alert
-
July 11, 2023
How EPSS 3.0 is an improvement over previous versions of the threat assessment system
CSO
-
June 28, 2023
Hundreds of federal network devices fail new CISA security requirements
SC Media
-
June 20, 2023
What The Board Needs To Know
The Wall Street Journal
-
May 15, 2023
2023 SC Awards Finalists: Best Risk/Policy Management Solution
SC Media
-
April 28, 2023
Cowbell Delivers Qualys External Attack Surface Management Intelligence Feed
MSSP Alert
-
April 28, 2023
Qualys and Cowbell Expand Partnership
Cyber Risk Leaders
-
April 28, 2023
5 Channel Partner & MSP News Updates for 27 April 2023
Channel E2E
-
April 21, 2023
CISA warns of OS Command Injection vulnerability in INEA ME RTU hardware
Industrial Cyber
-
April 12, 2023
Data-backed insights for future-proof cybersecurity strategies
Help Net Security
-
April 12, 2023
Microsoft (& Apple) Patch Tuesday, April 2023 Edition
Krebs on Security
-
April 12, 2023
Windows CLFS Vulnerability Used for Ransomware Attacks
E Security Planet
-
April 11, 2023
CISA adds Microsoft, Apple bugs to exploited vulnerabilities catalog
The Record
-
April 6, 2023
Best Practices to Pass an IT Security Audit
Bank Info Security
-
March 28, 2023
Qualys Threat Research Unit (TRU) Launches 2023 TruRisk Research Report
VMblog
-
March 28, 2023
Managed Security Services Provider (MSSP) Market News: 28 March 2023
MSSP Alert
-
March 27, 2023
Next-Gen CISO: The Custodian of Digital Trust
Bank Info Security
-
March 23, 2023
More victims emerge from Fortra GoAnywhere zero-day attacks
TechTarget
-
March 20, 2023
CISA kicks off ransomware vulnerability pilot to help spot ransomware-exploitable flaws
CSO
-
March 16, 2023
Old Threats, New Access: The Danger of Old Vulnerabilities
Solutions Review
-
March 16, 2023
Microsoft Outlook Warning: Critical New Email Exploit Triggers Automatically—Update Now
Forbes
-
March 13, 2023
Cloud Security Market Q&A With Parag Bajaria of Qualys
Datamation
-
March 10, 2023
5 steps to gain control of vulnerability management for your enterprise
VentureBeat
-
March 9, 2023
Best Enterprise Vulnerability Scanning Vendors
eSecurity Planet
-
March 2, 2023
Vulnerability Management: Definition, Process & Tools
E Security Planet
-
March 1, 2023
Wire19’s listing of top 100 CIOs of IT organizations in the US
Wire19
-
February 14, 2023
Qualys extends cloud security support to include macOS devices
SC Media
-
February 9, 2023
Qualys Expands Cloud Platform for Both Large Enterprises and Small/Medium Businesses Looking to Prioritize and Reduce Risk
AiThority
-
February 6, 2023
OpenSSH Releases Patch for New Pre-Auth Double Free Vulnerability
The Hacker News
-
February 1, 2023
Qualys Releases FedRAMP-Ready Cybersecurity Platform
MSSP Alert
-
February 1, 2023
Qualys Introduces GovCloud
DevOps Digest
-
February 1, 2023
Qualys Introduces GovCloud, a FedRAMP Ready (High Impact Level) Cybersecurity Platform
AiThority
-
January 31, 2023
The 20 Coolest Cloud Security Companies Of The 2023 Cloud 100
CRN
-
January 23, 2023
Threat Actors Turn to Sliver as Open Source Alternative to Popular C2 Frameworks
The Hacker News
-
January 18, 2023
Open Source 2022 Wins and Losses
Linux Insider
-
January 17, 2023
5 Vulnerability Scanning Case Studies
Datamation
-
January 13, 2023
Microsoft Releases a High January Patchload for the Second Year
Spiceworks
-
January 12, 2023
CISA adds recently-announced Microsoft zero-day to exploited vulnerability catalog
The Record
-
January 11, 2023
Microsoft Patch Tuesday Fixes 11 Critical Vulnerabilities, One Zero-Day
E Security Planet
-
January 11, 2023
Microsoft Issues January 2023 Patch Tuesday Updates, Warns of Zero-Day Exploit
The Hacker News
-
January 10, 2023
12 Top Vulnerability Management Tools for 2023
E Security Planet
-
January 9, 2023
Security Teams Failing to Address Open Source Vulnerabilities
Security Boulevard
-
January 5, 2023
Blind Eagle Hackers Return with Refined Tools and Sophisticated Infection Chain
The Hacker News
-
January 4, 2023
New malware campaign using stolen bank info as phishing bait
SC Media
-
January 4, 2023
Attackers use stolen banking data as phishing lure to deploy BitRAT
CSO
-
January 4, 2023
Cyber Security Headlines: FTX founder pleads not guilty, LA housing authority cyberattack, Ukrainian vishing operation bust
CISO Series
-
January 4, 2023
BitRat Malware Gnaws at Victims With Bank Heist Data
Dark Reading
-
January 3, 2023
BitRAT malware campaign uses stolen bank data for phishing
Bleeping Computer
-
January 3, 2023
Hackers Using Stolen Bank Information to Trick Victims into Downloading BitRAT Malware
The Hacker News