Qualys Blog

Qualys Security Blog Expert network security guidance and news

  • Agent Grant: From Identity Signals to Measurable Risk Reduction
    by Indrani Das on January 7, 2026 at 7:27 am

    Executive Summary Identity is now the #1 attack surface. Agent Grant in Qualys ETM Identity uses agentic AI to measure and reduce identity risk across AD, Entra, Okta & other cloud IdPs/IDaaS. It operationalizes identity risk by turning messy Active Directory & identity-risk signals into validated, prioritized, and closed-loop actions with proof of risk removed.

  • Cloud Agent in 2025: A Year of Scale, Security, and Smarter Visibility
    by Spencer Brown on January 6, 2026 at 4:59 pm

    As we move into 2026, 2025 stands out as a defining year for the Qualys Cloud Agent. In 2025, Cloud Agent delivered deeper visibility into running systems and applications, stronger security controls, expanded support across operating systems and architectures, and meaningful platform modernization. Adoption increased by 18% year over year, driven by organizations standardizing on a single, lightweight agent

  • Your Guide to PCI DSS 4.0.1 Web Application and API Controls with a Simplified Path to Compliance
    by Asma Zubair on December 19, 2025 at 9:01 pm

    Executive Summary PCI DSS 4.0.1 compliance mandates stricter security controls for web applications and APIs. Key updates include maintaining an inventory of custom software (PCI 6.3.2) and managing payment page scripts to prevent skimming attacks (PCI 6.4.3). Organizations must also adopt risk-based vulnerability prioritization (PCI 11.3.1.1), perform authenticated internal vulnerability scans (PCI 11.3.1.2), implement mechanisms

  • ShadyPanda: The Silent Browser Takeover Threat and How Qualys TruRisk Eliminate Helps You Stop It
    by Lavish Jhamb on December 17, 2025 at 6:00 pm

    Executive Summary ShadyPanda has exploited trusted browser extensions to compromise millions of users, illustrating how legitimate software can unexpectedly become harmful. Qualys TruRisk Eliminate empowers organizations to identify risky behaviors, prioritize real threats, and eliminate malicious components before attackers exploit them. How Browser Extensions Have Become a New Blind Spot Browser extensions are part of everyday

  • Navigating Change: Evolving Your Exposure Management Strategy in a Post-Kenna World with Qualys
    by Kaustubh Jagtap on December 17, 2025 at 12:15 am

    Key Takeaways Cisco recently announced the end-of-sale for its Vulnerability Management solution (formerly Kenna Security). For security teams that have relied on Kenna as the vulnerability aggregation engine powering their risk-based prioritization, this moment is less about replacing a tool and more about rethinking how vulnerability programs should work in 2026. The truth is, Cisco

  • Scale AI Securely with Qualys TotalAI’s Streamlined Onboarding, Deeper Risk Detection, and Compliance-Ready Reporting
    by Asma Zubair on December 11, 2025 at 5:00 pm

    Executive Summary Enterprises are entering a phase where AI systems function as decision engines that shape customer interactions, operational workflows, and business outcomes. This creates a new class of risk that is behavioral, contextual, and dynamic, driven by how models interpret instructions, handle data, and adapt within distributed environments. Security teams need a framework that

  • React2Shell: Decoding CVE-2025-55182 – The Silent Threat in React Server Components
    by Kaustubh Jagtap on December 11, 2025 at 7:41 am

    On December 3, 2025, a critical remote code execution (RCE) vulnerability, dubbed “React2Shell,” was disclosed, impacting React Server Components and frameworks like Next.js. The flaw, CVE-2025-55182, could lead to full server takeover and is rated CVSS 10.0. It is under active exploitation, has been added to the CISA KEV, and organizations should take immediate steps

  • Microsoft and Adobe Patch Tuesday, December 2025 Security Update Review
    by Diksha Ojha on December 9, 2025 at 7:59 pm

    As the year winds down, Microsoft Patch Tuesday in December arrives with essential fixes and enhancements to close vulnerabilities and boost performance. Here’s a quick breakdown of what you need to know. Microsoft Patch Tuesday for December 2025 This month’s release addresses 72 vulnerabilities, including three critical and 55 important-severity vulnerabilities.  In this month’s updates, Microsoft has addressed three zero-day vulnerabilities. One of them was exploited, and two were publicly disclosed.  Microsoft has addressed 15 vulnerabilities in Microsoft Edge (Chromium-based) in this month’s updates.  Microsoft

  • Active Exploitation of 7-Zip RCE Vulnerability Shows Why Manual Patching is No Longer an Option 
    by Mohd Anas Khan on December 4, 2025 at 3:25 pm

    A critical remote code execution (RCE) vulnerability in 7-Zip (CVE-2025-11001) is now being actively exploited. The issue stems from improper handling of symbolic links within crafted ZIP files. When a malicious archive is extracted, 7-Zip may write files outside the intended directory, allowing an attacker to overwrite system files or execute arbitrary code with the

  • The Future of Cloud Security: A New Act for Cyber Risk Operations
    by Kunal Modasiya on November 24, 2025 at 9:09 pm

    Qualys, the leader in Cyber Risk Operations, is proud to be recognized in Latio Tech’s 2025 Cloud Security Market Report as a leader in both CTEM and the Cloud Security Ecosystem. This acknowledgement by Latio Tech reinforces the strength of our strategy—anchored by the industry’s first Risk Operations Center (ROC), which defines the future of

Share Websitecyber
We are an ethical website cyber security team and we perform security assessments to protect our clients.