Qualys Blog

Qualys Security Blog Expert network security guidance and news

  • Elevate Cyber Defense with Qualys Advanced Hunting
    by Ganesh Vetal on November 26, 2024 at 7:17 pm

    Introduction In today’s cyber threat landscape, proactive approaches such as threat hunting have become key in any organization’s defense strategy, identifying and tackling threats before they become an incident. That is why Qualys is delighted to introduce Advanced Hunting, our threat-hunting functionality in the Endpoint Detection and Response (EDR) platform that allows security teams to

  • AI Under the Microscope—What’s Changed in the OWASP Top 10 for LLMs 2025
    by Saeed Abbasi on November 25, 2024 at 11:22 pm

    As AI continues to evolve, so do the threats and vulnerabilities that surround Large Language Models (LLMs). The OWASP Top 10 for LLM Applications 2025 introduces critical updates that reflect the rapid changes in how these models are applied in real-world scenarios. While the list includes carryovers from the 2023 version, several entries have been

  • Qualys TRU Uncovers Five Local Privilege Escalation Vulnerabilities in needrestart
    by Saeed Abbasi on November 19, 2024 at 4:12 pm

    The Qualys Threat Research Unit (TRU) has identified five Local Privilege Escalation (LPE) vulnerabilities within the needrestart component, which is installed by default on Ubuntu Server. These vulnerabilities can be exploited by any unprivileged user to gain full root access without requiring user interaction. The identified flaws have been assigned the CVE identifiers CVE-2024-48990, CVE-2024-48991,

  • Best Practices for Cloud Compliance
    by Shilpa Gite on November 14, 2024 at 7:33 pm

    Introduction In today’s data-driven landscape, businesses are embracing cloud computing technology for its efficiency and scalability. A Cloud Security Alliance (CSA) report revealed that 98% of organizations worldwide use cloud services. Yet, more than 1/3rd of those organizations may not be using key security frameworks like CSA’s CCM and CAIQ, which raises questions about how

  • Microsoft and Adobe Patch Tuesday, November 2024 Security Update Review
    by Diksha Ojha on November 12, 2024 at 7:59 pm

    Microsoft has released its November 2024 Patch Tuesday updates, targeting various vulnerabilities that could impact users and organizations worldwide. From zero-day threats to key product patches, here’s what’s crucial to apply this month. Here’s a breakdown of the updates and how they impact your security posture. Microsoft Patch Tuesday for November 2024 Microsoft Patch’s Tuesday,

  • Elevate Your Container Security with QScanner in 2025
    by Saket Sharad on November 7, 2024 at 5:53 pm

    Securing container images is more important than ever in the dynamic world of cloud-native technologies. Organizations have long utilized reliable solutions from Qualys to scan their images, ensuring applications run smoothly and securely. These tools have played a crucial role in maintaining the integrity of systems across various environments. But what if securing your container

  • Qualys Web Application Scanning (WAS) Recognized as a Leader in 2024 GigaOm Radar Report for Application Security Testing (AST)
    by Kunal Modasiya on November 5, 2024 at 7:59 pm

    In the ever-evolving cybersecurity landscape, securing web applications and APIs is no longer an option—it’s a necessity. As organizations face increasingly complex threats, ensuring the integrity of these digital assets has become paramount. However, it’s easy to feel overwhelmed by the sheer volume of threats and the complexity of the solutions required to mitigate them.

  • Announcing TotalCloud Attack Path, Cloud Workflow Automation, and 3-Step Simplified User Onboarding for Qualys TotalCloud CNAPP
    by Kunal Modasiya on October 31, 2024 at 4:01 pm

    The shift of business applications and infrastructure to the cloud has heightened the need for security teams to manage cyber risks comprehensively, ensuring visibility and control across diverse cloud environments. As organizations increasingly adopt multi-cloud environments, they often find themselves grappling with a fragmented landscape of siloed, acronym-driven point solutions. This disjointed approach leaves cloud

  • Qualys VMDR & Core Apps Revamped: Ultimate Cyber Defense Partnership for Streamlined Vulnerability Management with ITSM 
    by Himanshu Kathpal on October 29, 2024 at 2:29 pm

    Introducing the  Revamped VMDR & Core Apps Qualys has the dynamic duo of ServiceNow Apps – The Qualys Core App and Qualys VMDR App – that help you close the gap between IT and Security teams, making vulnerability management and ticketing workflows seamless and eliminating manual spreadsheet-based workflows. We announced these apps in June 2022

  • Unmasking Lumma Stealer: Analyzing Deceptive Tactics with Fake CAPTCHA
    by Vishwajeet Kumar on October 21, 2024 at 4:49 am

    Summary Lumma Stealer is an information-stealing malware available through a Malware-as-a-Service (MaaS). It specializes in stealing sensitive data such as passwords, browser information, and cryptocurrency wallet details. The attacker has advanced its tactics, moving from traditional phishing to fake CAPTCHA verification, exploiting legitimate software to deliver Lumma Stealer. These deceptive delivery methods make Lumma Stealer

Share Websitecyber