USA media coverage.

Browse media coverage


Media inquiries

Rachel Winship
Qualys
+1 800 745 4355[email protected]

Global media contacts Arrow Right

December 30, 2024

Decade-Old Vulnerabilities in Ubuntu's 'needrestart' Utility Exposed

Security Buzz
December 27, 2024

Deepfakes, Quantum Attacks Loom Over APAC in 2025

Dark Reading
December 27, 2024

2025 Cybersecurity Predictions: Not Getting Easier; But There is Hope

SecureWorld
December 26, 2024

Emerging Threats & Vulnerabilities to Prepare for in 2025

Dark Reading
December 20, 2024

New Warning As Self-Deleting Cyberattack Targets Windows, Mac

Forbes
December 19, 2024

Orgs Scramble to Fix Actively Exploited Bug in Apache Struts 2

Dark Reading
December 18, 2024

More task focus, the rise of AI whisperers and improved observability -- AI predictions for 2025

BetaNews
December 18, 2024

From Mandate to Milestone: How the OMB Memo 22-09 Redefines Federal Cyber Risk Management

Government Technology
December 18, 2024

Old Exploits, New Threats: How SmokeLoader Continues to Haunt Vulnerable Systems

Security Buzz
December 17, 2024

The 14 Best Vulnerability Scanning Tools in 2025

Security Boulevard
December 17, 2024

Top 10 Network Security Monitoring Tools

Security Boulevard
December 17, 2024

LW ROUNDTABLE — How 2024’s cyber threats will transform the security landscape in 2025

Security Boulevard
December 17, 2024

27 DDoS-for-Hire Operations Shut Down by Law Enforcement

Security Magazine
December 12, 2024

Law Enforcement Takes Down ‘DDoS-for-Hire’ Sites in Operation PowerOFF

SC Magazine
December 10, 2024

Top Dynamic Application Security Testing (DAST) Tools for 2025

Security Boulevard
December 8, 2024

2024 Pinnacle Awards Winner: Qualys’ Sumedh Thakar

Washington Exec
December 9, 2024

Russian hacktivists target oil, gas and water sectors worldwide

SC Magazine
December 5, 2024

Bypass Bug Revives Critical N-Day in Mitel MiCollab

Dark Reading
December 5, 2024

Critical Vulnerabilities Found in Veeam Service Provider Console

Security Buzz
December 4, 2024

Veeam Patches Bugs in VSPC, One Leading to Remote Code Execution

SC Magazine
December 4, 2024

CISA Warns of Zyxel Firewall Vulnerability Exploited in Attacks

Security Week
December 2, 2024

Do You Know What Software Is Running in Your Environment?

CyberWire
December 2, 2024

Critical Vulnerability Found in Zabbix Network Monitoring Tool

Security Week
December 1, 2024

2024 Pinnacle Awards Winners Revealed

Washington Exec
November 26, 2024

More Than 2,000 Palo Alto Networks Firewalls Compromised

Security Magazine
November 25, 2024

2000 Un-Patched Palo Alto Firewalls Exploited Via PAN-OS Vulnerabilities

Security Buzz
November 22, 2024

Easily Exploitable Linux needrestart Utility Flaws Allow Root Access

Linux Security
November 22, 2024

2K Palo Alto Un-Patched Firewalls Hacked Despite Warnings

SC Magazine
November 22, 2024

Microsoft Highlights Security Exposure Management at Ignite

Dark Reading
November 22, 2024

In Other News: Nvidia Fixes Critical Flaw, Chinese Linux Backdoor, New Details in WhatsApp-NSO Lawsuit

SecurityWeek
November 20, 2024

Ubuntu affected by 10-year-old flaws in needrestart package

SC Magazine
November 20, 2024

2025 Cybersecurity Predictions by Experts

Global Security Mag
November 20, 2024

Decades-Old Security Vulnerabilities Found in Ubuntu's Needrestart Package

The Hacker News
November 19, 2024

Pinnacle Award Finalist Sumedh Thakar: ‘With Passion and Tenacity, You Can Achieve Anything’

Washington Exec
November 19, 2024

Ubuntu Linux impacted by decade-old 'needrestart' flaw that gives root

Bleeping Computer
November 19, 2024

Microsoft to offer hackers millions in Zero Day Quest event

TechTarget
November 19, 2024

Helldown Ransomware Evolves to Target VMware Systems via Linux

SC Magazine
November 18, 2024

BackBox 2025 Predictions: The Future IS Cyber Resilience

VMblog
November 18, 2024

Report Unveils Cybersecurity Leaks in U.S. Drinking Water Systems

SecureWorld
November 15, 2024

Drinking Water Systems for 26M Americans Face High Cybersecurity Risks

SC Magazine
November 14, 2024

Major cyber attacks and data breaches of 2024

Security Boulevard
November 13, 2024

Amazon's Latest Data Breach a Ripple Effect of MOVEit

SecureWorld
December 4, 2024

A New Era of Federal Cybersecurity Will Begin With Automated Patching to Meet CISA and FISMA Guidelines

GovLoop
November 13, 2024

Qualys’ Barbara Huelskamp: Working to narrow the workforce, gender gaps

SC Media
November 13, 2024

SC Women in IT Security

SC Media
November 12, 2024

Tricked By a CAPTCHA: How Cybercriminals are Using Fake Verifications to Steal Sensitive Data

Security Buzz
November 12, 2024

Microsoft’s November Patch Tuesday Fixes 91 Vulnerabilities, 4 Zero-Days

Hackread
November 5, 2024

Tor and Tails Team Up for Better Online Privacy Protections

Linux Insider
October 30, 2024

WhiteRabbitNeo: High-Powered Potential of Uncensored AI Pentesting for Attackers and Defenders

Security Week
October 29, 2024

Black Basta Group Using QR Codes in Teams Chats for Initial Access

MSSP Alert
October 24, 2024

Prometei' Botnet Spreads Its Cryptojacker Worldwide

Dark Reading
October 15, 2024

Jetpack Patches Critical Bug That Exposed Data on 27M WordPress Sites

SC Magazine
October 9, 2024

Qualys Debuts Industry's First Risk Operations Center (ROC) in the Cloud

VMblog
October 10, 2024

Qualys Unfurls Risk Operations Center Platform

Security Boulevard
October 9, 2024

Qualys Partners Get New Risk Operations Center

Channel Futures
October 8, 2024

Apple Releases macOS Patch to Fix Compatibility Issues with Security Tools

SC Magazine
October 8, 2024

Security Leaders Discuss the New Vulnerability Added to CISA’s Catalog

Security Magazine
October 4, 2024

Ivanti Confirms Exploitation of an Old Critical Vuln

BankInfoSecurity
October 4, 2024

Ivanti Confirms Exploitation of an Old Critical Vuln

Gov InfoSecurity
October 2, 2024

NIST's Security Flaw Database Still Backlogged with 17K+ Unprocessed Bugs. Not Great

The Register
October 21, 2024

The Weaponization-Remediation Crisis: Closing the Gap to Secure U.S. Critical Infrastructure and Systems

GovLoop
September 26, 2024

National Cybersecurity Strategy Hinges on Federal Coordination, Cyber Risk Management

CPO Magazine
September 19, 2024

Sequoia Update for macOS ‘Broke’ Popular Security Tools

SC Magazine
September 19, 2024

Upgrading to MacOS Sequoia? Here's Why You May Want To Hold Off

ZDNET
September 19, 2024

Apple’s macOS Sequoia Release Causing Issues For EDR Tools: Reports

CRN
September 22, 2024

How AI-informed cybersecurity and risk management strategies can empower federal agencies to tackle complex cyber threats

Federal News Network
September 10, 2024

US Presidential Debate Targeted by Disinformation Threats

Channele2e
September 26, 2024

Warnings on High Severity Linux Printing System Vulnerabilities

SC Magazine
September 10, 2024

Hackers Have Sights Set on Four Microsoft Vulnerabilities, CISA Warns

The Record
September 9, 2024

Microsoft September 2024 Patch Tuesday Fixes 79 Flaws, Including 4 Zero-Days

Hackread
September 9, 2024

Microsoft Discloses 4 Zero-Days in September Update

Dark Reading
September 9, 2024

Disinformation Reigns Ahead of Harris-Trump Presidential Debate

SC Magazine
September 5, 2024

A new malware named “Voldemort” may be a cyber espionage campaign

Security Magazine
September 2, 2024

EPSS and vulnerability management: New scoring system shows promise

Security Boulevard
September 2, 2024

White House Takes Aim at Internet Security

The Wall Street Journal
August 30, 2024

New Voldemort Malware Uses Google Sheets to Target Key Sectors Globally

Hackread
August 29, 2024

Voldemort' Malware Curses Orgs Using Global Tax Authorities

Dark Reading
August 28, 2024

Over 500,000 Members of Texas Credit Union Affected by Data Breach

SecureWorld
August 28, 2024

Breach Exposed Information of More Than 500,000 Credit Union Members

Security Magazine
August 28, 2024

Do cybersecurity certifications still deliver? Experts share 6 key insights

Security Boulevard
August 26, 2024

MOVEit Hack Exposed Personal Data of Half Million TDECU Users

Info Security
August 26, 2024

TDECU Data Breach: 500,000+ Members Affected by MOVEit Exploit

Hackread
August 25, 2024

Texas Dow Employees Credit Union Notifies 500,000 of MOVEit Breach

SC Magazine
August 20, 2024

Backdoor in RFID Cards for Offices, Hotels Can Lead to Instant Cloning

Security Boulevard
August 18, 2024

FedRAMP Modernization Guide Still Contains Gaps, Expert Says

Gov InfoSecurity
August 18, 2024

FedRAMP Modernization Guide Still Contains Gaps, Expert Says

Bank Info Security
July 16, 2024

Void Banshee Group Used ‘Windows Relic’ IE in Phishing Campaign

Security Boulevard
August 8, 2024

Report reveals 10% increase in the exploitation of old CVEs

Security Magazine
August 5, 2024

How risk prioritization and automation can shape the future of federal cybersecurity

Federal News Network
July 10, 2024

Void Banshee Group Used ‘Windows Relic’ IE in Phishing Campaign

Security Boulevard
July 10, 2024

Global Intel Agencies Accuse China of Rampant Government Network Hacking

SecureWorld
July 7, 2024

Supreme Court Ruling Threatens the Framework of Cybersecurity Regulation

SecurityWeek
July 2, 2024

Friend or Foe? AI's Complicated Role in Cybersecurity

Dark Reading
July 1, 2024

Linux Users Beware: New OpenSSH Vulnerability Could Lead to System Takeover

Techopedia
July 1, 2024

Over 14M servers may be vulnerable to OpenSSH's regreSSHion RCE flaw. Here's what you need to do

ZDNET
June 30, 2024

Critical OpenSSH vulnerability could affect millions of servers

TechTarget
June 30, 2024

Researchers uncover rare, difficult-to-exploit OpenSSH vulnerability

Cyberscoop
June 30, 2024

Urgent: Patch Fixed, Reintroduced OpenSSH Bug, Says Qualys

Data Breach Today
June 30, 2024

Urgent: Patch Fixed, Reintroduced OpenSSH Bug, Says Qualys

InfoRiskToday
June 30, 2024

Urgent: Patch Fixed, Reintroduced OpenSSH Bug, Says Qualys

HealthcareInfoSecurity
June 30, 2024

Urgent: Patch Fixed, Reintroduced OpenSSH Bug, Says Qualys

Gov InfoSecurity
June 30, 2024

Urgent: Patch Fixed, Reintroduced OpenSSH Bug, Says Qualys

BankInfoSecurity
June 27, 2024

Cyberattack Rate Surges as Novel Malware Growth Accelerates

Security Boulevard
June 25, 2024

GAO Urges Action to Address Critical Cybersecurity Challenges Facing U.S.

Security Boulevard
June 24, 2024

Cloud-based worm now spews ransomware and cryptominer gloom

SC Media
June 24, 2024

Securing the Clean Energy Cyber Supply Chain: U.S. DOE's New Framework

SecureWorld
June 23, 2024

LockBit Ransomware Gang Claims Breach of U.S. Federal Reserve

SecureWorld
June 19, 2024

Top 15 Vulnerability Management Tools for Your Business

Security Boulevard
June 2, 2024

Agency Leaders Call Cybersecurity ‘Kitchen Table’ Topic

GovCIO
June 16, 2024

FedRAMP Modernization: Transforming Federal Cybersecurity Through Automation and Risk Management

GovLoop
June 2, 2024

Agency Leaders Call Cybersecurity ‘Kitchen Table’ Topic

GovCIO
June 13, 2024

Chinese Threats Aim for Government Sector

Security Boulevard
June 11, 2024

Black Basta Ransomware Suspected of Exploiting Windows Zero-Day Flaw

SecureWorld
June 11, 2024

Black Basta exploits patched Windows privilege escalation bug

SC Media
June 11, 2024

Rockwell's ICS Directive Comes as Critical Infrastructure Risk Peaks

Dark Reading
June 11, 2024

Why Malware Matters Most: 6 Ways to Foil Software Threats Faster

ReversingLabs
June 11, 2024

Why Malware Matters Most: 6 Ways to Foil Software Threats Faster

Security Boulevard
June 11, 2024

Black Basta Ransomware Suspected of Exploiting Windows 0-day Before Patch

Hackread
June 10, 2024

How to combat cyber threats and secure democracy in the digital age

Federal Times
June 4, 2024

People’s lives are at risk,’: Ascension ransomware attack going on nearly three weeks”.

NBC Austin
June 4, 2024

Ascension electronic health records restored after ransomware attack

NBC Austin
June 3, 2024

9 Best Practices for Leveraging Threat Intelligence in Your Security Operations

ReversingLabs
June 3, 2024

9 Best Practices for Leveraging Threat Intelligence in Your Security Operations

Security Boulevard
June 3, 2024

MIT Report Spotlights Triple Threat Fueling Data Breach Tsunami

SecureWorld
June 2, 2024

Cybersecurity Automation in Healthcare Program Launched by HHS Agency

Security Boulevard
May 29, 2024

Okta says Customer Identity Cloud prone to credential-stuffing attacks

SC Media
May 30, 2024

Okta alerts customers against new credential-stuffing attacks

CSO
May 15, 2024

Interview: Nayeem Islam On The Need For Vulnerability Scanning “At All Times”

Expert Insights
May 27, 2024

People’s lives are at risk,’: Ascension ransomware attack going on nearly three weeks

NBC Austin
May 21, 2024

SEC’s $10 Million Fine of NYSE Owner Shows Focus on Cyber Disclosures

The Wall Street Journal
May 22, 2024

Energy Dept. CISO Paints Sobering Portrait of Cyber Readiness

MeriTalk
May 21, 2024

NSA Aims to Boost Cybersecurity for Small Defense Contractors

MeriTalk
May 20, 2024

Qualys expands Enterprise TruRisk Platform capabilities for the government sector

Security Info Watch
May 19, 2024

Securing the 2024 election: a cyber expert weighs in

FOX5
May 20, 2024

NGA Official Wary on AI Risk Management Impacts

MeriTalk
May 21, 2024

Rockwell to customers: Remove public-facing ICS devices from internet

SC Media
May 21, 2024

EPA Issues Urgent Alert for Water Utilities to Enhance Cyber Defenses

SecureWorld
May 20, 2024

Qualys Enterprise TruRisk Platform Now Accelerates Federal Agency’s Zero-Trust Journey with Automated Compliance for OMB M-24-04 and CISA BOD 23-01

Global Security Mag
May 20, 2024

Qualys launches CyberSecurity Asset Management 3.0

intelligent ciso
May 9, 2024

Enterprise Cyber Risk: Overcoming the Issue of Siloed Tools

Bank Info Security
May 14, 2024

CISA's 'vulnrichment' aims to fix the NVD

ReversingLabs
May 14, 2024

CISA’s ‘vulnrichment’ aims to fix the NVD

Security Boulevard
May 14, 2024

Microsoft fixes exploited Qakbot-delivering 0-day in May Patch Tuesday

SC Media
May 9, 2024

All in a week’s events: The AI juggernaut hits cybersecurity, open source and IT infrastructure

Silicon Angle
May 9, 2024

Is CISA's Secure by Design Pledge Toothless?

Dark Reading
May 12, 2024

Here’s What 20 Top Cybersecurity CEOs And CTOs Were Saying At RSA Conference 2024

CRN
May 7, 2024

It May be Time to Review Your Cyber Hygiene

Security Magazine
May 9, 2024

Five Companies That Came To Win This Week

CRN
May 7, 2024

10 Cybersecurity Companies Making Moves At RSAC 2024

CRN
May 9, 2024

We Asked 14 Top Cybersecurity Experts And Leaders What They Are Most Excited About. Here’s What They Told Us.

Expert Insights
May 6, 2024

Enterprise Cyber Risk: Overcoming the Issue of Siloed Tools

Bank Info Security
May 7, 2024

Day Two At RSAC 2024: Insights From Bugcrowd, Huntress, Qualys, And Forescout

Expert Insights
May 2, 2024

Verizon 2024 Data Breach Report shows the risk of the human element

Security Magazine
May 5, 2024

‘Secure by Design’: Career Opportunities for Tech, Security Pros

Dice Insights
May 5, 2024

MSSP Market News: Fastly, CyberProof, Google Cloud, Tidal Cyber

MSSP Alert
May 2, 2024

State-Sponsored North Korean Hackers Penetrated South Korean Defense Companies, Stole Sensitive Technical Data

CPO Magazine
May 1, 2024

MSSP Market News: Fortinet, BlackBerry, Qualys

MSSP Alert
May 1, 2024

Flaw in R Creates Supply Chain Security Risks

The New Stack
April 28, 2024

Experts weigh in on Omni Hotel ransomware incident

Security Magazine
April 28, 2024

Experts weigh in on the MITRE nation-state cyberattack

Security Magazine
April 30, 2024

NIST Updated Its Cybersecurity Framework. What Does That Mean for Agencies?

FedTech Magazine
April 30, 2024

Verizon’s 2024 Data Breach Investigations Report: 5 key takeaways

SC Magazine
April 29, 2024

DHS: AI-Enhanced Nuclear and Chemical Threats Are Risk to US

Gov InfoSecurity
April 29, 2024

Federal agencies need to rethink culture in the fight against ransomware

NextGov
April 24, 2024

North Korean Hackers Intensify Cyberattacks on South's Arms Industry

SecureWorld
April 25, 2024

Military Tank Manual, 2017 Zero-Day Anchor Latest Ukraine Cyberattack

Dark Reading
April 24, 2024

Nation-State Hackers Leverage Zero-Day Vulnerabilities to Penetrate MITRE Cybersecurity Research Network

CPO Magazine
April 21, 2024

Addressing GAO's Findings on National Cyber Risk Management Gaps

Federal News Network
April 18, 2024

How Unified Attack Surface Management Future Proofs Fed Cyberspace

Federal Times
April 17, 2024

Hacking the Floodgates: US Dams Face Growing Cyber Threats

Gov InfoSecurity
April 16, 2024

Brute-force attacks surge worldwide, warns Cisco Talos

SC Magazine
April 11, 2024

CISA's Malware Analysis Platform Could Foster Better Threat Intel

Dark Reading
April 12, 2024

Week that Was for 04.13.24

CyberWire
April 11, 2024

Report finds that only 5% of businesses have a cyber expert

Security Magazine
April 10, 2024

A vulnerability in Linux distributions may allow unauthorized access

Security Magazine
April 9, 2024

After BlackCat, RansomHub tries to Extort Change Healthcare

Medical Buyer
April 8, 2024

Daily Briefing for 04.09.24

CyberWire
April 7, 2024

Change Healthcare Investigates Potential Leak of Patient Data

HIPAA Journal
April 7, 2024

Change Healthcare breach data may be in hands of new ransomware group

SC Magazine
April 3, 2024

‘Latrodectus’ uses sandbox evasion techniques to launch malicious payloads

SC Magazine
April 4, 2024

New Latrodectus Downloader Malware Linked to IcedID and Qbot Creators

Hackread
April 2, 2024

NIST Proposes Public-Private Group to Help with NVD Backlog

Security Boulevard
April 3, 2024

Malicious Latrodectus Downloader Picks Up Where QBot Left Off

Dark Reading
April 2, 2024

Ransomware, Junk Bank Accounts: Cyber Threats Proliferate in Vietnam

Dark Reading
April 1, 2024

NIST Wants Help Digging Out of Its NVD Backlog

Dark Reading
April 1, 2024

Government agencies collaborate on a guide to address DDoS attacks

Security Magazine
March 31, 2024

XZ Utils Backdoor Implanted in Carefully Executed, Multiyear Supply Chain Attack

Dark Reading
March 31, 2024

Cybersecurity Industry Starts Picking Through Malicious XZ Utils Code 

Security Boulevard
March 27, 2024

World Backup Day 2024 on March 31 

Disaster Recovery Journal
March 27, 2024

EPA Warns US Water Systems Vulnerable to a Disruptive Cyber Attack, State Governors Must Do More

CPO Magazine
March 26, 2024

Expert Commentary: World Backup Day

GLOBAL SECURITY MAG
March 26, 2024

Flaw in Ray AI framework potentially leaks sensitive data of workloads

SC Media
March 27, 2024

Critical infrastructure may be the subject of disruptive cyberattacks

Security Magazine
March 25, 2024

The Gately Report: Trustwave Partners Get Help Starting Cybersecurity Journeys

Channel Futures
March 26, 2024

CISA, FBI Release Comprehensive DDoS Guidance Amid Rising Attacks

SecureWorld
March 20, 2024

NIST's Vuln Database Downshifts, Prompting Questions About Its Future

Dark Reading
March 17, 2024

UnitedHealth Begins Testing Restored Change Healthcare Claims Platform

The Wall Street Journal
March 17, 2024

The Path to Stronger Cyber Defenses: A Blueprint for State and Local Governments

CPO Magazine
March 12, 2024

NIST Cybersecurity Framework 2.0: What Tech Professionals Need to Know

Dice Insights
March 12, 2024

March Patch Tuesday: Microsoft Fixes Two Critical Hyper-V Flaws

SC Magazine
March 11, 2024

Microsoft Discloses Critical Hyper-V Flaws in Low-Volume Patch Update

Dark Reading
March 11, 2024

5 Things To Know On Microsoft’s ‘Patch Tuesday’ for March 2024

CRN
March 5, 2024

NIST CSF 2.0: Better Risk Management for the New Era of Supply Chain Security

ReversingLabs
March 5, 2024

NIST Unveils Cybersecurity Framework 2.0 with Key Upgrades

SecureWorld
March 4, 2024

National Institute of Standards and Technology (NIST) has released its Cybersecurity Framework (CSF) 2.0 

Channel Futures
March 1, 2024

ConnectWise ScreenConnect Vulnerabilities: What CIOs Need to Know

InformationWeek
February 29, 2024

All SBOMs Are Not Created Equal: How to Make Them Actionable

ReversingLabs
February 29, 2024

Industry Reactions to NIST Cybersecurity Framework 2.0: Feedback Friday

SecurityWeek
February 29, 2024

BlackCat Eats into Its Nine Lives, Threatens More Attacks on Hospitals

SecureWorld
February 29, 2024

NIST Makes it Official: Governance is a Critical Part of Cybersecurity

Cybersecurity Dive
February 27, 2024

NIST Publishes Cybersecurity Framework 2.0: 3 Key Takeaways

SC Magazine
February 27, 2024

Half of IT Leaders Identify IoT as Security Weak Point

Infosecurity
February 20, 2024

20 Coolest Security Operations, Risk And Threat Intelligence Of 2023: The Security 100

CRN
February 20, 2024

CEO Outlook: Sumedh Thakar, President & CEO, Qualys 

CRN
February 19, 2024

6 Best Cloud Security Companies & Vendors in 2024

eSecurity Planet
February 16, 2024

In the evolving cyberwar, China aims to take down our critical infrastructure

SC Magazine
February 15, 2024

Microsoft Exchange Server Flaw Exploited as a Zero-Day Bug 

Dark Reading
February 15, 2024

Microsoft and OpenAI swept AI chat logs to find hackers. Expect that to become the norm.

NextGov
February 14, 2024

Valentine’s Day Scams Woo the Lonely-Hearted

Security Boulevard
February 13, 2024

Attackers Exploit Microsoft Security-Bypass Zero-Day Bugs

Dark Reading
February 9, 2024

Qualys Introduces TotalCloud 2.0 with TruRisk Insights to Eliminate Cyber Risk in Cloud and SaaS Applications 

Database Trends and Applications
February 12, 2024

CISA and other US agencies release advisory on PRC threat actor

Security Magazine
February 12, 2024

CISA and Fortinet Warns of New FortiOS Zero-Day Flaws 

Hackread
February 9, 2024

‘Critical’ Fortinet FortiOS Vulnerability Seeing Exploitation: CISA 

CRN
February 8, 2024

New HijackLoader Variant Evades Detection, Enhances Persistence  

SC Media
February 7, 2024

MSSP Market News: ZeroFox, Clearwater, 1stResponder, Qualys 

MSSP Alert
February 7, 2024

Qualys Unveils TotalCloud 2.0

DevOps Digest
February 7, 2024

Qualys Unveils TotalCloud 2.0 

Global Security Mag
February 5, 2024

How the SEC's Rules on Cybersecurity Incident Disclosure Are Exploited 

Dark Reading
January 31, 2024

More Ivanti VPN Zero-Days Fuel Attack Frenzy as Patches Finally Roll

Dark Reading
January 31, 2024

Two new Ivanti bugs discovered as CISA warns of hackers bypassing mitigations

The Record
January 31, 2024

One of two new high-severity bugs in Ivanti exploited in the wild

SC Media
January 31, 2024

GNU C Library Vulnerability Leads to Full Root Access

SecurityWeek
January 31, 2024

Critical Flaws Found in GNU C Library, Major Linux Distros at Risk

Hackread
January 31, 2024

New Glibc Flaw Grants Attackers Root Access on Major Linux Distros

The Hacker News
January 29, 2024

Orange Cyberdefense Expands Partnership with Qualys

Global Security Mag
January 29, 2024

Orange Cyberdefense Expands Partnership with Qualys, Strengthening Managed Cybersecurity Portfolio to Deliver an End-to-End Vulnerability Intelligence Service

VMblog
January 30, 2024

New Linux glibc flaw lets attackers get root on major distros

Bleeping Computer
January 24, 2024

6 Best Vulnerability Management Software & Systems in 2024

eSecurity Planet
January 29, 2024

MSSP Market News: Qualys, Orange Cyberdefense, Commvault

MSSP Alert
January 22, 2024

Atlassian Confluence Server RCE attacks underway from 600+ IPs

The Register
January 19, 2024

ColdRiver threat group targeting critical infrastructure with backdoor attacks

SC Media
January 22, 2024

The 20 Coolest Cloud Security Companies Of The 2024 Cloud 100

CRN
January 17, 2024

Lock Down the Software Supply Chain With 'Secure by Design'

Dark Reading
January 16, 2024

Androxgh0st malware hackers creating large botnet, CISA and FBI warn

The Record
January 17, 2024

Improving Supply Chain Security, Resiliency

InformationWeek
January 16, 2024

What Will It Take to Adopt Secure by Design Principles?

InformationWeek
January 10, 2024

Microsoft fixes 48 bugs in January Patch Tuesday, none of them zero-days

SC Media
January 9, 2024

Patch Now: Critical Windows Kerberos Bug Bypasses Microsoft Security

Dark Reading
January 9, 2024

Russian Agents Hacking Residential Surveillance Cameras to Gather Intel in Ukraine

CPO Magazine
January 4, 2024

Why red-teaming is crucial to the success of Biden’s executive order on AI

Federal News Network
January 4, 2024

CISA Warns of Exploited Vulnerabilities in Chrome and Excel Parsing Library

Hackread
January 5, 2024

Russia Hacked Residential Cameras in Ukraine to Spy on Air Defense, Critical Infrastructure

SecurityWeek
January 4, 2024

Ukraine: Russia hacked webcams to aid missile, drone strikes on Kyiv

SC Media
January 4, 2024

Ep. 118 An update on Zero Trust for the Federal Government

Federal Tech Podcast
January 4, 2024

The State of Container Security: 5 Key Steps to Locking Down Your Releases

Security Boulevard
January 4, 2024

The State of Container Security: 5 Key Steps to Locking Down Your Releases

ReversingLabs
January 3, 2024

CISA Warns Federal Agencies of Exploited Google Chrome and Open-Source Vulnerabilities

The Record
January 3, 2024

CISA Adds Excel, Chrome Flaws to Its Exploited Vulnerabilities Catalog

SC Magazine
January 2, 2024

Emsisoft: Ban Ransom Payments to Stop Ransomware Attacks

Channel Futures

Follow us on social media