Qualys Security Blog Expert network security guidance and news
- The Future of Cloud Security: A New Act for Cyber Risk Operationsby Kunal Modasiya on November 24, 2025 at 9:09 pm
Qualys, the leader in Cyber Risk Operations, is proud to be recognized in Latio Tech’s 2025 Cloud Security Market Report as a leader in both CTEM and the Cloud Security Ecosystem. This acknowledgement by Latio Tech reinforces the strength of our strategy—anchored by the industry’s first Risk Operations Center (ROC), which defines the future of
- From Vision to Value: Gartner® Identifies Qualys as 2025 Magic Quadrant™ Leader in Exposure Assessment Platformsby Kunal Modasiya on November 24, 2025 at 5:16 pm
Why Was Qualys Named a Leader in Exposure Assessment Platforms? We’re proud to share that Qualys has been named a Leader in the 2025 Gartner® Magic Quadrant™ for Exposure Assessment Platforms. We believe this recognition reflects our forward-thinking vision and the proven value of the Qualys Enterprise TruRisk Platform in helping organizations manage cyber risk.
- Zero-Day Zero: The AI Attack That Just Ended the Era of the Forgiving Internetby Saeed Abbasi on November 24, 2025 at 4:00 pm
Why the Exploit Window Has Collapsed and How CISOs Must Pivot to Survive For decades, cybersecurity was a game of time. We banked on the buffer between a vulnerability’s disclosure and its widespread exploitation. We relied on the forgiving internet, where human attackers needed days or weeks to weaponize code, giving us breathing room to
- GenAI: Harness the Power, Eliminate the Risk — A Practical Playbook for Securing AI from Day Oneby Asma Zubair on November 20, 2025 at 9:36 pm
Enterprises everywhere are racing to leverage AI to gain sharper insights, automate workflows, and deliver richer customer experiences. Based on an assessment conducted by Bain & Company, generative AI adoption is soaring, with 95% of US companies using it, up 12 percentage points in just a year. Similarly, an EY survey found that 48% of
- What is Patch Management Automation and Why It Mattersby Eran Livne on November 19, 2025 at 7:20 am
Executive Summary Environments rarely stay as orderly as they begin. New workloads, faster releases, and growing attack surfaces stretch manual patching beyond its limits. The real risk emerges in the widening gap between spotting a vulnerability and fixing it. Automated patch management closes that gap. It creates a unified patch lifecycle that monitors assets continuously,
- What It Takes to Design Trust into Event-Driven Architectures with Amazon EventBridge by Mohit Deshpande on November 17, 2025 at 4:00 pm
How disciplined design turns Amazon EventBridge from an open event bus into a system of verified trust. Event-driven architecture has become essential for achieving agility in the cloud. Yet as integrations multiply, so do the hidden pathways that adversaries can exploit. Amazon EventBridge helps unify these distributed systems, but its very flexibility demands disciplined
- Unauthenticated Authentication Bypass in Fortinet FortiWeb (CVE-2025-64446) Exploited in the Wildby Mayuresh Dani on November 15, 2025 at 12:01 am
A critical authentication bypass vulnerability affecting Fortinet FortiWeb web application firewalls has been actively exploited since early October 2025. The vulnerability allows unauthenticated attackers to create admin accounts and gain complete control over vulnerable devices exposed to the internet. It is being officially tracked as CVE-2025-64446 with a CVSS v3.1 score of 9.8 (Critical). CISA
- Microsoft Patch Tuesday, November 2025 Security Update Reviewby Diksha Ojha on November 11, 2025 at 7:47 pm
Microsoft released its November Patch Tuesday Security Updates. Here’s a quick breakdown of what you need to know. Microsoft Patch Tuesday for November 2025 This month’s release addresses 68 vulnerabilities, including five critical and 59 important-severity vulnerabilities. In this month’s updates, Microsoft has addressed a zero-day vulnerability that was being exploited in the wild. Microsoft
- Battle Compliance Confusion and Security Fatigue with Qualys and ServiceNowby Shrikant Dhanawade on November 10, 2025 at 10:33 pm
Once upon a time, your biggest worry was whether Dave in Accounting would click on a suspicious link. Today, you wish Dave were your only worry. You’re likely balancing four major clouds, including AWS, Azure, Google Cloud, and Oracle, plus on-premises, hybrid environments, thousands of ephemeral workloads, containers, and serverless functions spinning up and down
- Inside an Automotive Giant’s Data Leak — A Cloud Misconfiguration Lesson for AWS Usersby Rahul Pareek on November 3, 2025 at 5:01 pm
70 TB+ of data, hard-coded keys, and weak IAM controls. For even the most experienced enterprises, one configuration decision can be enough to surface how interdependent and vulnerable modern cloud systems truly are. The recent data exposure incident at a large automotive firm highlights this reality, an incident shaped less by exploitation and more by















