Company Details
qualys
3,389
264,112
541514
qualys.com
0
QUA_7198901
In-progress


Qualys Vendor Cyber Rating & Cyber Score
qualys.comQualys, Inc. (NASDAQ: QLYS) is a leading provider of disruptive cloud-based security, compliance and IT solutions with more than 10,000 subscription customers worldwide, including a majority of the Forbes Global 100 and Fortune 100. Qualys helps organizations streamline and automate their security and compliance solutions onto a single platform for greater agility, better business outcomes, and substantial cost savings. The Qualys Enterprise TruRisk Platform leverages a single agent to continuously deliver critical security intelligence while enabling enterprises to automate the full spectrum of vulnerability detection, compliance, and protection for IT systems, workloads and web applications across on premises, endpoints, servers, public and private clouds, containers, and mobile devices. Founded in 1999 as one of the first SaaS security companies, Qualys has strategic partnerships and seamlessly integrates its vulnerability management capabilities into security offerings from cloud service providers, including Amazon Web Services, the Google Cloud Platform and Microsoft Azure, along with a number of leading managed service providers and global consulting organizations. For more information, please visit http://www.qualys.com.
Company Details
qualys
3,389
264,112
541514
qualys.com
0
QUA_7198901
In-progress
Between 700 and 749

Qualys Global Score (TPRM)XXXX

Description: Cybersecurity firm Qualys fell victim to a data breach incident after Accellion FTA servers were targeted in a cyber attack. The Clop ransomware gang took the responsibility for the attack and posted screenshots of files stolen from Qualys. The compromised data included purchase orders, invoices, tax documents, and scan reports.


No incidents recorded for Qualys in 2026.
No incidents recorded for Qualys in 2026.
No incidents recorded for Qualys in 2026.
Qualys cyber incidents detection timeline including parent company and subsidiaries

Qualys, Inc. (NASDAQ: QLYS) is a leading provider of disruptive cloud-based security, compliance and IT solutions with more than 10,000 subscription customers worldwide, including a majority of the Forbes Global 100 and Fortune 100. Qualys helps organizations streamline and automate their security and compliance solutions onto a single platform for greater agility, better business outcomes, and substantial cost savings. The Qualys Enterprise TruRisk Platform leverages a single agent to continuously deliver critical security intelligence while enabling enterprises to automate the full spectrum of vulnerability detection, compliance, and protection for IT systems, workloads and web applications across on premises, endpoints, servers, public and private clouds, containers, and mobile devices. Founded in 1999 as one of the first SaaS security companies, Qualys has strategic partnerships and seamlessly integrates its vulnerability management capabilities into security offerings from cloud service providers, including Amazon Web Services, the Google Cloud Platform and Microsoft Azure, along with a number of leading managed service providers and global consulting organizations. For more information, please visit http://www.qualys.com.


CrowdStrike (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk — endpoints and cloud workloads, identity and data. Powered by the CrowdStrike Security Cloud and world-clas

## Our core business We manage linux / unix server infrastructures and build the efficient and secure networking environments using hardware cutting edge technologies suited to the needs of the project and the client. We believe in quality, opposed to quantity. Our company consists of highly

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest s
.png)
VANCOUVER, British Columbia, March 30, 2026 (GLOBE NEWSWIRE) -- Four hostile nations are already embedded inside America's critical...
What Happened? A number of stocks fell in the afternoon session after the cybersecurity sector sold off amid renewed concerns about...
CrackArmor — nine AppArmor flaws enable root access & container escape on 12M+ Linux systems. Qualys TRU discovered & validated.
Qualys Inc (ISIN: US74838J1016), a pioneer in cloud-based security and compliance, trades on NASDAQ with a market cap around $4.57 billion.
Qualys, Inc. (NasdaqGS:QLYS) has introduced Agent Val, an agent-led exploit validation and autonomous risk remediation solution.
Qualys debuts Agent Val to validate real exploit paths in live systems, promising sharply reduced noise and faster remediation for teams.
Qualys (QLYS) is back in focus after Databricks introduced LakeWatch, an AI-driven security intelligence platform, and Anthropic expanded...
Qualys (QLYS) recently launched Agent Val within its Enterprise TruRisk Management platform, introducing agent-led exploit validation and...
Qualys rolls out Agent Val to live‑test exploit paths in production, promising sharper risk prioritisation and major remediation noise cuts.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Qualys is https://www.qualys.com.
According to Rankiteo, Qualys’s AI-generated cybersecurity score is 744, reflecting their Moderate security posture.
According to Rankiteo, Qualys currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Qualys has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Qualys is not certified under SOC 2 Type 1.
According to Rankiteo, Qualys does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Qualys is not listed as GDPR compliant.
According to Rankiteo, Qualys does not currently maintain PCI DSS compliance.
According to Rankiteo, Qualys is not compliant with HIPAA regulations.
According to Rankiteo,Qualys is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Qualys operates primarily in the Computer and Network Security industry.
Qualys employs approximately 3,389 people worldwide.
Qualys presently has no subsidiaries across any sectors.
Qualys’s official LinkedIn profile has approximately 264,112 followers.
Qualys is classified under the NAICS code 541514, which corresponds to Others.
Yes, Qualys has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/qualys.
Yes, Qualys maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/qualys.
As of March 30, 2026, Rankiteo reports that Qualys has experienced 1 cybersecurity incidents.
Qualys has an estimated 3,667 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Title: Qualys Data Breach via Accellion FTA Servers
Description: Cybersecurity firm Qualys fell victim to a data breach incident after Accellion FTA servers were targeted in a cyber attack. The Clop ransomware gang took the responsibility for the attack and posted screenshots of files stolen from Qualys. The compromised data included purchase orders, invoices, tax documents, and scan reports.
Type: Data Breach
Attack Vector: Exploit of Accellion FTA servers
Threat Actor: Clop ransomware gang
Motivation: Data Theft
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Purchase orders, Invoices, Tax documents, Scan reports
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Purchase Orders, Invoices, Tax Documents, Scan Reports and .

Type of Data Compromised: Purchase orders, Invoices, Tax documents, Scan reports
Last Attacking Group: The attacking group in the last incident was an Clop ransomware gang.
Most Significant Data Compromised: The most significant data compromised in an incident were purchase orders, invoices, tax documents, scan reports and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were invoices, scan reports, purchase orders and tax documents.
.png)
A vulnerability was identified in Totolink A3300R 17.0.0cu.557_b20221024. This affects the function setLanCfg of the file /cgi-bin/cstecgi.cgi of the component Parameter Handler. The manipulation of the argument lanIp leads to command injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.
Perl versions from 5.9.4 before 5.40.4-RC1, from 5.41.0 before 5.42.2-RC1, from 5.43.0 before 5.43.9 contain a vulnerable version of Compress::Raw::Zlib. Compress::Raw::Zlib is included in the Perl package as a dual-life core module, and is vulnerable to CVE-2026-3381 due to a vendored version of zlib which has several vulnerabilities, including CVE-2026-27171. The bundled Compress::Raw::Zlib was updated to version 2.221 in Perl blead commit c75ae9cc164205e1b6d6dbd57bd2c65c8593fe94.
Ghidra versions prior to 12.0.3 improperly process annotation directives embedded in automatically extracted binary data, resulting in arbitrary command execution when an analyst interacts with the UI. Specifically, the @execute annotation (which is intended for trusted, user-authored comments) is also parsed in comments generated during auto-analysis (such as CFStrings in Mach-O binaries). This allows a crafted binary to present seemingly benign clickable text which, when clicked, executes attacker-controlled commands on the analyst’s machine.
A critical security vulnerability in parisneo/lollms versions up to 2.2.0 allows any authenticated user to accept or reject friend requests belonging to other users. The `respond_request()` function in `backend/routers/friends.py` does not implement proper authorization checks, enabling Insecure Direct Object Reference (IDOR) attacks. Specifically, the `/api/friends/requests/{friendship_id}` endpoint fails to verify whether the authenticated user is part of the friendship or the intended recipient of the request. This vulnerability can lead to unauthorized access, privacy violations, and potential social engineering attacks. The issue has been addressed in version 2.2.0.
A Server-Side Request Forgery (SSRF) vulnerability exists in parisneo/lollms versions prior to 2.2.0, specifically in the `/api/files/export-content` endpoint. The `_download_image_to_temp()` function in `backend/routers/files.py` fails to validate user-controlled URLs, allowing attackers to make arbitrary HTTP requests to internal services and cloud metadata endpoints. This vulnerability can lead to internal network access, cloud metadata access, information disclosure, port scanning, and potentially remote code execution.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.