Qualys Blog

Qualys Security Blog Expert network security guidance and news

  • How to Quantify Risk and Communicate Effectively: Step 4 to TruRisk™
    by Anthony Williams on June 25, 2025 at 3:00 pm

    “The art of communication is the language of leadership.” — James Humes, former Presidential speechwriter and author.  Cybersecurity teams face adversaries who thrive in chaos. Attackers move fast, automate, and strike where defenses are weakest. In a borderless digital world, disruption is constant, driven by innovation, complexity, and the pressure to move faster, often at

  • From Patching to Eliminating Risk: What’s new in TruRisk™ Eliminate and Patch Management
    by Padmanabh Sahasrabudhe on June 19, 2025 at 3:00 pm

    As IT and security priorities converge under rising pressure, patch management is no longer just a hygiene activity but a strategic tool to eliminate the risk from exposed vulnerabilities. Since the last major release cycle, we’ve been expanding the Qualys Patch Management solution into a broader capability. These enhancements span the architecture, automation, and risk-based

  • Lessons from Qilin: What the Industry’s Most Efficient Ransomware Teaches Us
    by Ken Dunham on June 18, 2025 at 3:00 pm

    Qilin has quietly become one of the most active and impactful ransomware operations in the world today. If it’s not already on your threat radar, now is the time to take notice. This blog unpacks how Qilin operates, why it’s gaining traction across cybercriminal networks, and what steps security teams can take to get ahead

  • Qualys TRU Uncovers Chained LPE: SUSE 15 PAM to Full Root via libblockdev/udisks
    by Saeed Abbasi on June 17, 2025 at 8:25 pm

    The Qualys Threat Research Unit (TRU) has discovered two linked local privilege escalation (LPE) flaws. The first (CVE-2025-6018) resides in the PAM configuration of openSUSE Leap 15 and SUSE Linux Enterprise 15. Using this vulnerability, an unprivileged local attacker—for example, via SSH—can elevate to the “allow_active” user and invoke polkit actions normally reserved for a physically present

  • Building Resilient Software Supply Chains: Inside the Enhanced Qualys Software Composition Analysis
    by Himanshu Kathpal on June 16, 2025 at 1:54 pm

    In today’s software-driven economy, every organization, regardless of industry, is a software company. And increasingly, every software company is an open-source company. With open-source components (OSS) now comprising up to 80% of modern codebase, the software supply chain has emerged as one of the most significant and most vulnerable frontiers in cybersecurity. Unfortunately, adversaries have

  • Qualys VMDR Wins at 2025 SC Awards Europe for Best Vulnerability Management Solution
    by Huzaifa Dalal on June 16, 2025 at 1:00 pm

    We’re excited to share that Qualys VMDR (Vulnerability Management, Detection, and Response) has won the Best Vulnerability Management Solution for 3 years in row at 2025 SC Awards Europe, recognizing its market-leading innovation and measurable impact in reducing cyber risk for businesses worldwide. As the attack surface continues to grow and threats become more sophisticated,

  • Qualys TotalCloud Wins “Best Cloud Security Product” at 2025 SC Awards Europe
    by Huzaifa Dalal on June 16, 2025 at 1:00 pm

    We’re proud to announce that Qualys TotalCloud™ has been named “Best Cloud Security Product” at the 2025 SC Awards Europe—a recognition of our relentless drive to unify, simplify, and modernize cloud security for enterprises across the globe. In today’s complex multi-cloud world, securing cloud-native applications and infrastructure isn’t just about visibility—it’s about turning risk into

  • Microsoft and Adobe Patch Tuesday, June 2025 Security Update Review
    by Diksha Ojha on June 10, 2025 at 7:03 pm

    Microsoft’s June 2025 Patch Tuesday has landed, addressing a new batch of critical and important vulnerabilities across Windows and enterprise products. Here’s a quick breakdown of what you need to know. Microsoft Patch Tuesday for June 2025 In this month’s Patch Tuesday, June 2025 edition, Microsoft addressed 69 vulnerabilities. The updates include 10 critical and

  • Qualys Recognized as The Leader in Attack Surface Management by KuppingerCole
    by Pablo Quiroga on June 5, 2025 at 6:01 pm

    In today’s ever-evolving security landscape, organizations face an unprecedented expansion of digital assets—and with that expansion comes a growing attack surface. We’re proud to announce that Qualys has been named The Leader in the 2025 KuppingerCole Leadership Compass for Attack Surface Management (ASM), a testament to our commitment to providing comprehensive and proactive cybersecurity solutions.

  • Ensure PCI 4.0 Readiness with File Integrity Monitoring for Containers
    by Abhinav Mishra on June 5, 2025 at 2:00 pm

    Compliance isn’t optional. But it’s never been more complex. The rise of containers has revolutionized modern infrastructure—enabling faster innovation and greater scalability. But with this transformation comes a new wave of compliance challenges. PCI DSS 4.0 introduces stricter requirements for both vulnerability management and file integrity monitoring (FIM) in dynamic environments like Kubernetes and containerized

Share Websitecyber
We are an ethical website cyber security team and we perform security assessments to protect our clients.