Qualys
banner
qualysofficial.bsky.social
Qualys
@qualysofficial.bsky.social
The official Blue Sky channel for Qualys the leading provider of #cloud #security and #compliance solutions. www.qualys.com
Apple has issued security updates to fix 2 zero-day vulnerabilities in WebKit. Both CVEs have been exploited in the wild in highly targeted attacks and can be exploited by processing maliciously crafted web content. Get the details here: https://bit.ly/3YD2hVr

#ThreatProtection
December 17, 2025 at 4:46 PM
Google patched an actively exploited Chrome zero-day, the eighth one this year. Details remain limited, but exploitation has been confirmed and users are urged to update immediately. Read the blog for affected versions and mitigation guidance: https://bit.ly/48KQDOx
December 13, 2025 at 4:47 PM
December’s @MsftSecIntel Patch Tuesday addresses 72 CVEs – 3 critical & 55 important. It also addresses 3 0-day CVEs, 1 exploited, 7 2 publicly disclosed. Details here: https://bit.ly/4oKVR1c

Join our webinar 12/11 for expert insights from @Qualys TRU: https://bit.ly/4prS4XJ
December 9, 2025 at 8:15 PM
React & Next.js fixed critical flaws in React Server Components & the Next.js App Router. Exploitation of the React Flight protocol could let attackers send crafted HTTP requests & execute code on servers. Learn more about affected versions & mitigations: https://bit.ly/48FnmDj
December 8, 2025 at 9:00 PM
A critical Fortinet FortiWeb auth bypass (CVE-2025-64446) is being actively exploited, giving attackers full control of vulnerable devices. CISA has added it to the KEV with a Nov 21 deadline. Learn about the exploit, affected versions, & mitigation steps: https://bit.ly/4o0shEt
November 15, 2025 at 2:27 AM
Oracle has issued its third Critical Patch Update of the year, addressing 374 vulnerabilities across its portfolio. Oracle Communications received the most fixes, followed by Communications Applications and Financial Services. Read the full analysis: https://bit.ly/4noXkd5
October 23, 2025 at 3:19 PM
F5 has disclosed a long-term breach by a nation-state attacker involving stolen BIG-IP source code & unpatched vulnerabilities. With CISA warning of an imminent threat, organizations must quickly identify exposed assets & speed up remediation. Read more: https://bit.ly/4oy4nRG
October 21, 2025 at 12:27 AM
Oracle addressed a high-severity vulnerability in its E-Business Suite. Exploitation could let an unauthenticated remote attacker compromise Oracle Configurator Runtime UI. Read the blog for affected versions and mitigation guidance: https://bit.ly/3W5B4cU
#ThreatProtection
October 14, 2025 at 10:59 PM
Expert-led cybersecurity training at #ROCon25. Here’s a glimpse as our instructor walks through the 5 Steps to TruRisk Reduction dashboard – demonstrating how to identify what truly needs your focus across complex vulnerability data.

#RiskManagement
October 14, 2025 at 7:50 PM
This month’s @MsftSecIntel Patch Tuesday fixes 193 vulnerabilities, including 9 Critical & 6 zero-days, with 4 actively exploited & 2 publicly disclosed. Get the details in this blog: https://bit.ly/48vQNcH.

Join the @Qualys TRU webinar this Thursday: https://bit.ly/474T78a
October 14, 2025 at 7:45 PM
Broadcom addressed a critical CVE in VMware’s guest service discovery features. Exploitation could allow an unprivileged user to escalate privileges to root on the same VM. Researchers confirmed that it has been exploited in the wild. Learn more: https://bit.ly/4mKu9Rq
October 2, 2025 at 3:28 PM
Researchers discovered a malicious modification in the npm package postmark-mcp. By adding a blind copy to an external domain, attackers secretly exfiltrated email contents. This is the first known case of an MCP server exploited in the wild. Blog: https://bit.ly/474o8dy
September 30, 2025 at 7:28 PM
SolarWinds fixed a critical CVE in its Web Help Desk software. Successful exploitation of the flaw could allow an unauthenticated attacker to execute arbitrary code on the target system. Learn more about the vulnerability, affected versions & mitigation: https://bit.ly/46yJPAZ
September 26, 2025 at 9:06 PM
@Cisco patched a critical zero-day flaw in IOS & IOS XE Software. Exploitation could let low-privileged attackers cause DoS, while high-privileged attackers could execute code as root and fully compromise systems. Read the blog for mitigation details: https://bit.ly/3IChLok
September 25, 2025 at 11:16 PM
Fortra released security updates for a critical flaw (CVE-2025-10035) in GoAnywhere MFT License Servlet. With a CVSS of 10, exploitation could allow unauthenticated remote code execution. Learn more in this blog: https://bit.ly/4nkBFDA

#ThreatProtection #VulnerabilityManagement
September 23, 2025 at 4:41 PM
Attackers exploited SharePoint ToolShell flaws to hit 145+ orgs, incl. US agencies. The campaign persisted even after patches with stealth tactics. Saeed Abbasi of @qualys.bsky.social says that when patching isn’t possible, use advanced remediation: https://bit.ly/3K6LbeU via @ismsonline.bsky.social
September 19, 2025 at 5:45 PM
Google released security updates to fix a critical CVE in the Chrome browser. Successful exploitation of the type confusion flaw in the V8 JavaScript & WebAssembly engine, has already been observed in the wild by Google Threat Analysis Group. Learn more: https://bit.ly/42EBpa1
September 19, 2025 at 1:40 PM
Over 400 npm packages have been compromised in in an ongoing supply chain attack. With 2.6B weekly downloads, thousands of apps are at risk, along with likelihood of further impact. No patches yes, users should uninstall the affected packages. Learn more: https://bit.ly/3IpDoZ3
September 17, 2025 at 8:07 PM
Ivanti released its Sept security bulletin, addressing 13 CVEs across its popular products. There is currently no evidence of active exploitation.

Get the details in this blog, including exploitation methods, affected versions, & detection steps: https://bit.ly/46kQWNs

#VulnerabilityManagement
September 12, 2025 at 8:55 PM
Apple addressed a critical CVE across its operating systems, including macOS & iOS. The flaw could be exploited through a malicious image file to cause memory corruption. The vulnerability is already being exploited in the wild.
Learn more in this blog: https://bit.ly/3JlkzGJ

#ThreatProtection
August 22, 2025 at 11:57 PM
Big win at #DefCon33! Qualys Threat Research Unit (TRU) takes home Epic Achievement + Best RCE at the #PwnieAwards for:
🔹 CVE-2024-6387 (regreSSHion) — 1st pre-auth RCE in OpenSSH in 20 yrs
🔹 CVE-2025-26465 — MITM attack on OpenSSH client

#vulnerabilityresearch #Qualys #TRU
August 9, 2025 at 11:38 PM
The #Qualys Threat Research Unit (TRU) has identified and responsibly disclosed two vulnerabilities in OpenSSH: CVE-2025-26465 and CVE-2025-26466. TRU recommends upgrading to the lastest version of OpenSSH.

Details at blog.qualys.com/vulnerabilit...

#QualysThreatResearchUnit #Vulnerabilities
Qualys TRU Discovers Two Vulnerabilities in OpenSSH: CVE-2025-26465 & CVE-2025-26466 | Qualys Security Blog
The Qualys Threat Research Unit (TRU) has identified two vulnerabilities in OpenSSH. The first, tracked as CVE-2025-26465, allows an active machine-in-the-middle attack on the OpenSSH client when the…
blog.qualys.com
February 18, 2025 at 4:40 PM
DeepSeek fails more than 50% of Jailbreak Tests by Qualys TotalAI: model failed 58% of jailbreak tests & 61% of security assessments.

🔎 Read the blog & learn how Qualys TotalAI helps secure AI models against threats. bit.ly/42Cubo0

#AI #CyberSecurity #LLMSecurity
DeepSeek Failed Over Half of the Jailbreak Tests by Qualys TotalAI | Qualys Security Blog
A comprehensive security analysis of DeepSeek’s flagship reasoning model reveals significant concerns for enterprise adoption. DeepSeek-R1, a groundbreaking Large Language Model recently released by a...
bit.ly
February 2, 2025 at 11:10 PM
Reposted by Qualys
Interesting research from Qualys here where they found a botnet that’s infected vulnerable AVTECH cameras and Huawei routers. 1500 IP addresses found to be in the bot army used to carry out further attacks. blog.qualys.com/vulnerabilit...
Mass Campaign of Murdoc Botnet Mirai: A New Variant of Corona Mirai | Qualys Security Blog
The Qualys Threat Research Unit has uncovered a large-scale, ongoing operation within the Mirai campaign, dubbed Murdoc Botnet. This variant exploits vulnerabilities targeting AVTECH Cameras and…
blog.qualys.com
January 21, 2025 at 5:52 PM