home.social

#qualys — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #qualys, aggregated by home.social.

  1. A serious Ubuntu vulnerability (CVE-2026-3888) allows local users to gain full root access. If you run Ubuntu 24.04 or later, you should update your system right now.

    More details here: ostechnix.com/ubuntu-snapd-pri

    #Ubuntu #Snapd #CVE20263888 #Security #Qualys #Linux

  2. CrackArmor: Multiple vulnerabilities in #AppArmor "Bypassing Ubuntu's user-namespace restrictions
    AppArmor + Sudo + Postfix = root
    Kernel vulnerabilities". seclists.org/oss-sec/2026/q1/3 #infosec #qualys

  3. #CrackArmor: Multiple vulnerabilities in #AppArmor

    Blogpost: blog.qualys.com/vulnerabilitie

    Advisory: cdn2.qualys.com/advisory/2026/

    These vulnerabilities allow a local attacker to bypass the security normally provided by AppArmor. Also, in some situations, it allows privilege escalation to root by selectively blocking specific syscalls.

    #infosec #cybersecurity #qualys

  4. Neue #Linux #Sicherheitslücken: #Race #Conditions bedrohen sensible Daten.

    Zwei neu entdeckte Schwachstellen gefährden aktuell bestimmte #Linux- #Distributionen. Die #Sicherheitsforscher von #Qualys haben Race Conditions in den Komponenten apport und systemd-coredump identifiziert. Sie wurden unter den CVE-Nummern CVE-2025-5054 und CVE-2025-4598 veröffentlicht und ermöglichen es lokalen Angreifern, auf Speicherabzüge privilegierter Prozesse zuzugreifen.

    fosstopia.de/sicherheitslucken

  5. Neue #Linux #Sicherheitslücken: #Race #Conditions bedrohen sensible Daten.

    Zwei neu entdeckte Schwachstellen gefährden aktuell bestimmte #Linux- #Distributionen. Die #Sicherheitsforscher von #Qualys haben Race Conditions in den Komponenten apport und systemd-coredump identifiziert. Sie wurden unter den CVE-Nummern CVE-2025-5054 und CVE-2025-4598 veröffentlicht und ermöglichen es lokalen Angreifern, auf Speicherabzüge privilegierter Prozesse zuzugreifen.

    fosstopia.de/sicherheitslucken

  6. Neue #Linux #Sicherheitslücken: #Race #Conditions bedrohen sensible Daten.

    Zwei neu entdeckte Schwachstellen gefährden aktuell bestimmte #Linux- #Distributionen. Die #Sicherheitsforscher von #Qualys haben Race Conditions in den Komponenten apport und systemd-coredump identifiziert. Sie wurden unter den CVE-Nummern CVE-2025-5054 und CVE-2025-4598 veröffentlicht und ermöglichen es lokalen Angreifern, auf Speicherabzüge privilegierter Prozesse zuzugreifen.

    fosstopia.de/sicherheitslucken

  7. 🎙️ Ready for a mindset shift? 🤯

    In this On Location Briefing from #RSAC2025, we catch up with one of the industry’s leading voices on risk-based security, Richard Seiersen, for an insightful discussion you won’t want to miss!

    🚀 New Briefing from #RSAC 2025: This Is What Happens When Security Stops Chasing Threats and Starts Managing Risk

    At RSA Conference 2025, Sean Martin, CISSP caught up with Rich Seiersen, Chief Risk Technology Officer at Qualys, to talk about why simply chasing threats isn’t enough — and why risk-based security is the future.

    🔐 How can organizations rethink their priorities to focus on what truly matters in cybersecurity?

    Find out how Qualys is helping companies shift from reactive defense to proactive, risk-driven security strategies.

    🎙️ Watch, listen, or read the full conversation here:
    👉 itspmagazine.com/their-stories

    📌 Learn more about Qualys’ work:
    👉 itspmagazine.com/directory/qua

    🛰️ See all our RSAC 2025 coverage:
    👉 itspmagazine.com/rsac25

    🌟 Discover more Brand Stories and Briefings from innovative companies:
    👉 itspmagazine.com/brand-story

    🎥🎙️ This is just one of the many incredible conversations we recorded On Location in San Francisco, as Sean Martin and Marco Ciappelli covered the event as official media partners for the 11th year in a row.

    Stay tuned for more Brand Stories, Briefings, and candid conversations from RSAC 2025!

    🎤 Looking ahead:
    If your company would like to share your story with our audiences On Location, we’re gearing up for Infosecurity Europe in June and Black Hat USA in August!

    ⚡ RSAC 2025 sold out fast — we expect the same for these next events.
    🎯 Reserve your full sponsorship or briefing now: itspmagazine.com/purchase-prog

    #cybersecurity #infosec #infosecurity #technology #tech #society #business #riskmanagement #riskbasedsecurity #securitystrategy #qualys

  8. A severe vulnerability, CVE-2023-4911, has been discovered in the GNU C Library (glibc), affecting various Linux distributions, including Fedora, Ubuntu, Debian, Red Hat Enterprise Linux (RHEL), and Red Hat Virtualization. The vulnerability allows a local attacker to elevate limited local privileges to full root when launching binaries with SUID permission. While it has been fixed in upstream glibc, many downstream systems require updates to address the issue. Cybersecurity firm Qualys, which identified the vulnerability, warns that it poses a significant threat due to its ubiquity in Linux environments and ease of exploitation.

    Detailed Advisory: qualys.com/2023/10/03/cve-2023

    #Linux #vulnerability #Security #Ubuntu #Fedora #Redhat #Glibc #Qualys #Privacy #CVE #RHEL #TechBites #Tech

  9. @fosstodon @kev @mike: I don't know if you are aware of this already or not, but the servers all get a B rating from SSL Test here: ssllabs.com/ssltest/analyze.ht Most other Mastodon servers I have checked get an A+ or at least an A. It looks like you should consider disabling 1.0 and 1.1 protocols to get a better rating.