<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://blog.qualys.com/sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
<!-- Sitemap is generated on 2026-04-03 12:45:24 GMT -->
	<url>
		<loc>https://blog.qualys.com/</loc>
		<lastmod>2026-03-30T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/6767-supplemental-recurring-vendor-product-spt-index</loc>
		<lastmod>2025-09-10T18:14:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/thank-you</loc>
		<lastmod>2020-06-05T18:27:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2026/03/30/optimizing-risk-discovery-and-remediation-with-qualys-gateway-service-qgs</loc>
		<lastmod>2026-03-31T04:46:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2026/03/24/the-rise-of-managed-risk-operations-how-the-new-qualys-mroc-portal-helps-partners-scale-the-risk-operations-center</loc>
		<lastmod>2026-03-24T14:26:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2026/03/23/from-vision-to-real-time-threat-intelligence-trulens-for-etm</loc>
		<lastmod>2026-03-23T03:41:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2026/03/23/the-broken-physics-of-remediation</loc>
		<lastmod>2026-03-25T23:29:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2026/03/23/meet-agent-val-closing-the-validation-gap-in-exposure-management-at-machine-speed-with-agentic-ai</loc>
		<lastmod>2026-03-23T20:33:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2026/03/22/integrate-qscanner-with-harbor-to-unify-devsecops-container-scanning</loc>
		<lastmod>2026-03-23T04:00:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2026/03/19/mcp-servers-shadow-it-ai-qualys-totalai-2026</loc>
		<lastmod>2026-03-20T08:49:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2026/03/18/continuous-audit-readiness-5-steps-audit-outcomes-qualys</loc>
		<lastmod>2026-03-18T15:53:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2026/03/17/cve-2026-3888-important-snap-flaw-enables-local-privilege-escalation-to-root</loc>
		<lastmod>2026-03-18T13:18:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2026/03/17/geopolitical-cyber-threats-cisa-cvie-qualys-2026</loc>
		<lastmod>2026-03-23T20:34:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2026/03/17/new-era-application-security-reasoning-agents-runtime-risk-2026</loc>
		<lastmod>2026-03-18T10:55:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2026/03/12/crackarmor-critical-apparmor-flaws-enable-local-privilege-escalation-to-root</loc>
		<lastmod>2026-04-01T21:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2026/03/10/microsoft-patch-tuesday-march-2026-security-update-review</loc>
		<lastmod>2026-03-12T01:13:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2026/03/10/from-shadow-models-to-audit-ready-ai-security-a-practical-path-with-qualys-totalai</loc>
		<lastmod>2026-03-10T12:23:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2026/03/02/cyber-essentials-plus-2026-compliance</loc>
		<lastmod>2026-03-02T19:53:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2026/02/19/how-security-tool-misuse-is-reshaping-cloud-compromise</loc>
		<lastmod>2026-02-24T05:49:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2026/02/18/new-ai-powered-patch-reliability-scoring-predict-patch-impact-before-you-deploy</loc>
		<lastmod>2026-02-20T03:51:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2026/02/17/qualys-recognized-as-a-leader-in-the-2026-forrester-wave-for-cnapp</loc>
		<lastmod>2026-02-19T21:05:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2026/02/11/qualys-etm-detect-pass-the-hash-pass-the-ticket-attacks</loc>
		<lastmod>2026-03-04T10:36:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2026/02/10/microsoft-patch-tuesday-february-2026-security-update-review</loc>
		<lastmod>2026-02-12T04:31:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2026/02/04/truconfirm-ending-vulnerability-guesswork-with-proof-inside-etm</loc>
		<lastmod>2026-03-19T14:04:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2026/02/02/mutagen-astronomy-discovery-to-kev</loc>
		<lastmod>2026-02-02T21:44:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2026/01/30/roc-vs-ctem-how-a-risk-operations-center-evolves-beyond-continuous-threat-exposure-management-in-2026</loc>
		<lastmod>2026-02-09T20:47:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2026/01/29/top-10-cloud-compliance-tools-for-enterprise-security-and-audit-readiness-in-2026</loc>
		<lastmod>2026-02-26T08:25:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2026/01/22/public-container-registry-security-risks-malicious-images</loc>
		<lastmod>2026-02-24T09:09:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2026/01/21/qualys-named-a-leader-and-outperformer-in-the-2025-gigaom-radar-for-cnapp</loc>
		<lastmod>2026-01-21T21:54:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2026/01/20/cybersecurity-predictions-2026-risk-first-security</loc>
		<lastmod>2026-02-26T08:20:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2026/01/15/your-vmdr-year-in-review-making-security-progress-visible-and-actionable</loc>
		<lastmod>2026-01-16T00:11:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2026/01/15/serverless-security-risks-identity-ssrf-rce</loc>
		<lastmod>2026-01-15T16:34:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2026/01/13/microsoft-patch-tuesday-january-2026-security-update-review</loc>
		<lastmod>2026-03-19T06:39:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2026/01/06/agent-grant-agentic-ai-identity-security</loc>
		<lastmod>2026-02-26T08:14:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2026/01/06/cloud-agent-updates-2025</loc>
		<lastmod>2026-02-26T08:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/12/19/pci-dss-4-0-1-compliance-web-application-api-security</loc>
		<lastmod>2025-12-23T07:43:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/patch-management/2025/12/17/shadypanda-malicious-browser-extensions-prevention</loc>
		<lastmod>2025-12-24T10:21:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/12/16/navigating-change-evolving-your-exposure-management-strategy-in-a-post-kenna-world-with-qualys</loc>
		<lastmod>2025-12-17T00:15:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/12/11/totalai-ai-security-onboarding-and-risk-insights</loc>
		<lastmod>2025-12-11T17:04:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/12/10/react2shell-decoding-cve-2025-55182-the-silent-threat-in-react-server-components</loc>
		<lastmod>2025-12-11T23:06:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2025/12/09/microsoft-patch-tuesday-december-2025-security-update-review</loc>
		<lastmod>2025-12-10T13:11:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/12/04/active-exploitation-of-7-zip-rce-vulnerability-shows-why-manual-patching-is-no-longer-an-option</loc>
		<lastmod>2025-12-04T15:25:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/11/24/the-future-of-cloud-security-a-new-act-for-cyber-risk-operations</loc>
		<lastmod>2026-02-26T08:12:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/11/24/from-vision-to-value-gartner-identifies-qualys-as-2025-magic-quadrant-leader-in-exposure-assessment-platforms</loc>
		<lastmod>2025-11-24T17:16:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2025/11/24/zero-day-zero-the-ai-attack-that-just-ended-the-era-of-the-forgiving-internet</loc>
		<lastmod>2025-11-24T18:54:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/11/20/genai-harness-the-power-eliminate-the-risk-a-practical-playbook-for-securing-ai-from-day-one</loc>
		<lastmod>2025-11-20T21:36:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/patch-management/2025/11/18/what-is-patch-management-automation-guide</loc>
		<lastmod>2025-11-19T09:41:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/11/17/eventbridge-security-reconnaissance-attack-best-practices-2025</loc>
		<lastmod>2025-11-17T14:57:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2025/11/14/unauthenticated-authentication-bypass-in-fortinet-fortiweb-cve-2025-64446-exploited-in-the-wild</loc>
		<lastmod>2025-11-15T02:55:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2025/11/11/microsoft-patch-tuesday-november-2025-security-update-review</loc>
		<lastmod>2025-11-14T08:11:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/11/10/battle-compliance-confusion-and-security-fatigue-with-qualys-and-servicenow</loc>
		<lastmod>2025-11-17T19:22:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/11/03/inside-an-automotive-giants-data-leak-a-cloud-misconfiguration-lesson-for-aws-users</loc>
		<lastmod>2025-11-07T09:44:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2025/10/30/what-security-teams-need-to-know-as-php-and-iot-exploits-surge</loc>
		<lastmod>2025-11-03T06:25:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2025/10/22/oracle-critical-patch-update-october-2025-security-update-review</loc>
		<lastmod>2025-10-23T03:45:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2025/10/17/a-strategic-response-to-the-f5-big-ip-nation-state-breach</loc>
		<lastmod>2025-11-12T10:59:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/10/15/bringing-the-power-of-agentic-ai-for-identity-risk-adaptive-threat-prioritization-and-exposure-exploitability-validation</loc>
		<lastmod>2025-10-15T14:15:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/10/15/introducing-truconfirm-for-enterprise-trurisk-management-automated-exposure-validation</loc>
		<lastmod>2025-10-15T08:19:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/10/15/introducing-trulens-for-enterprise-trurisk-management-unified-threat-intelligence</loc>
		<lastmod>2025-10-17T17:02:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/10/15/qualys-etm-identity-the-first-true-quantification-of-the-identity-perimeter</loc>
		<lastmod>2026-02-26T08:11:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2025/10/14/microsoft-patch-tuesday-october-2025-security-update-review</loc>
		<lastmod>2025-10-24T16:50:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/10/09/qualys-recognized-as-a-leader-in-the-2025-gigaom-radar-for-patch-management-solutions</loc>
		<lastmod>2025-10-09T18:51:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/10/09/ensuring-safe-and-reliable-updates-with-qualys-trurisk-manifest-version-control</loc>
		<lastmod>2025-10-09T17:06:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/10/07/subscription-health-dashboard-2025-update</loc>
		<lastmod>2025-10-07T18:34:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/10/06/how-to-prevent-npm-supply-chain-attacks-in-ci-cd-pipelines-with-container-security</loc>
		<lastmod>2025-10-03T21:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/09/30/qualys-named-a-leader-in-the-2025-idc-marketscape-worldwide-exposure-management-vendor-assessment</loc>
		<lastmod>2025-09-30T17:33:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/09/30/how-agentic-ai-powers-seamless-audit-readiness-with-agent-chang</loc>
		<lastmod>2025-09-30T16:13:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/09/24/automated-browser-patching-trurisk-eliminate</loc>
		<lastmod>2025-09-24T19:23:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/09/23/trurisk-eliminate-cyber-risk-step-5</loc>
		<lastmod>2025-10-10T09:38:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/09/19/introducing-enhanced-user-interface-for-qualys-pci-dss-4-0-asv-compliant-solution</loc>
		<lastmod>2026-03-16T09:19:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/09/16/navigating-sebis-cloud-security-requirements-a-guide-for-regulated-entities</loc>
		<lastmod>2025-09-16T16:21:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/09/11/patch-tuesday-risk-elimination-with-agent-sara</loc>
		<lastmod>2025-09-11T18:40:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2025/09/10/when-dependencies-turn-dangerous-responding-to-the-npm-supply-chain-attack</loc>
		<lastmod>2025-09-12T06:22:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/09/10/federal-agencies-tech-debt-cyber-risk</loc>
		<lastmod>2025-09-15T14:55:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2025/09/09/microsoft-patch-tuesday-september-2025-security-update-review</loc>
		<lastmod>2025-10-14T16:59:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2025/09/08/shaping-the-future-of-cyber-risk-management-qsc-evolves-to-rocon</loc>
		<lastmod>2026-01-30T06:41:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/misc/2025/09/06/salesloft-drift-supply-chain-incident</loc>
		<lastmod>2025-09-06T19:00:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/09/05/cve-2025-8088-winrar-exploit-from-zero-day-to-zero-risk-with-trurisk-eliminate</loc>
		<lastmod>2025-09-15T14:55:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/09/04/operationalizing-threat-exposure-with-agentic-ai-meet-agent-nova</loc>
		<lastmod>2025-09-04T16:08:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/08/27/qualys-achieves-fedramp-high-ato-unlocking-the-future-of-trusted-cybersecurity-for-government-and-critical-infrastructure</loc>
		<lastmod>2025-09-05T16:55:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/08/26/chatbots-apis-and-the-hidden-risks-inside-your-application-stack</loc>
		<lastmod>2025-08-26T06:50:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/08/25/qualys-module-picker-streamlined-security-module-management</loc>
		<lastmod>2025-10-16T13:51:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/08/20/how-agentic-ai-helps-with-adaptive-cloud-risk-assessment-with-agent-vikram</loc>
		<lastmod>2025-08-20T14:36:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/08/14/unleashing-agentic-ai-for-superior-threat-informed-risk-prioritization-with-agent-nyra</loc>
		<lastmod>2025-08-13T23:08:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/08/13/remediate-wmi-class-corruption-errors-with-qualys-trurisk-eliminate</loc>
		<lastmod>2025-09-19T09:36:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2025/08/12/microsoft-and-adobe-patch-tuesday-august-2025-security-update-review</loc>
		<lastmod>2025-08-19T09:55:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/08/12/eliminate-risk-from-older-and-unmanaged-java-installations</loc>
		<lastmod>2025-08-12T18:51:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2025/08/12/two-pwnie-awards-one-crucial-lesson-what-our-openssh-research-reveals-about-cyber-defense-in-2025</loc>
		<lastmod>2025-08-13T15:46:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/08/11/unified-compliance-coverage-policy-audit</loc>
		<lastmod>2025-08-14T06:45:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/08/04/unpacking-qualys-agentic-ai-technical-insights-into-its-architecture-and-capabilities</loc>
		<lastmod>2025-09-19T08:24:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/08/04/from-exposure-whack-a-mole-to-autonomous-cyber-risk-management-meet-agentic-ai-on-the-qualys-platform</loc>
		<lastmod>2025-09-19T08:19:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/07/28/cloud-ai-llm-inventory-risk-management-totalai</loc>
		<lastmod>2025-09-19T08:21:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2025/07/24/fortifying-your-cloud-against-cross-service-confused-deputy-attacks</loc>
		<lastmod>2025-11-12T23:26:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2025/07/21/toolshell-zero-day-microsoft-rushes-emergency-patch-for-actively-exploited-sharepoint-vulnerabilities</loc>
		<lastmod>2025-07-24T20:05:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/07/21/understanding-the-impact-of-scattered-spider-on-the-airline-transportation-industry</loc>
		<lastmod>2025-07-23T16:06:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/07/21/smart-itsm-automation-vulnerability-management</loc>
		<lastmod>2025-09-19T09:31:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2025/07/16/oracle-critical-patch-update-july-2025-security-update-review</loc>
		<lastmod>2025-07-21T04:29:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2025/07/14/state-of-cyber-risk-2025-research-report</loc>
		<lastmod>2025-07-11T18:46:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/07/10/qualys-patch-management-introduces-precondition-checks-job-chaining</loc>
		<lastmod>2025-07-10T10:55:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/07/10/google-chrome-distrust-chunghwa-netlock-certificates</loc>
		<lastmod>2025-07-10T07:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2025/07/08/microsoft-and-adobe-patch-tuesday-july-2025-security-update-review</loc>
		<lastmod>2025-07-10T04:29:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/07/07/qualys-named-as-a-major-player-in-the-idc-marketscape-worldwide-cloud-native-application-protection-platform-2025</loc>
		<lastmod>2025-07-03T15:51:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/07/01/qualys-named-an-overall-leader-in-cnapp-by-kuppingercole</loc>
		<lastmod>2025-08-19T19:45:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/06/25/how-to-quantify-risk-and-communicate-effectively-with-trurisk</loc>
		<lastmod>2025-09-26T07:04:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/06/19/qualys-patch-management-latest-updates</loc>
		<lastmod>2025-06-19T13:12:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2025/06/18/qilin-ransomware-explained-threats-risks-defenses</loc>
		<lastmod>2025-09-19T09:44:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2025/06/17/qualys-tru-uncovers-chained-lpe-suse-15-pam-to-full-root-via-libblockdev-udisks</loc>
		<lastmod>2025-06-18T18:22:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/06/16/building-resilient-software-supply-chains-with-qualys-swca</loc>
		<lastmod>2025-07-18T12:12:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/06/16/qualys-vmdr-wins-at-2025-sc-awards-europe-for-best-vulnerability-management-solution</loc>
		<lastmod>2025-06-13T00:10:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/06/16/qualys-totalcloud-wins-best-cloud-security-product-at-2025-sc-awards-europe</loc>
		<lastmod>2025-06-13T00:11:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2025/06/10/microsoft-and-adobe-patch-tuesday-june-2025-security-update-review</loc>
		<lastmod>2025-06-18T11:06:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/06/05/qualys-recognized-as-the-leader-in-attack-surface-management-by-kuppingercole</loc>
		<lastmod>2025-06-05T18:01:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/06/05/ensure-pci-4-0-readiness-with-integrated-file-monitoring-for-containers</loc>
		<lastmod>2025-06-05T16:06:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2025/05/29/qualys-tru-discovers-two-local-information-disclosure-vulnerabilities-in-apport-and-systemd-coredump-cve-2025-5054-and-cve-2025-4598</loc>
		<lastmod>2025-06-10T18:32:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/05/27/eliminate-risk-with-precision-introducing-vulnerability-detection-sources-in-vmdr</loc>
		<lastmod>2025-10-01T20:08:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/05/22/building-confidence-in-cyber-essentials-compliance-with-qualys-policy-audit</loc>
		<lastmod>2025-05-29T08:39:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/05/21/simplifying-dora-compliance-with-the-qualys-enterprise-trurisk-platform</loc>
		<lastmod>2025-05-29T08:31:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2025/05/15/fileless-execution-powershell-based-shellcode-loader-executes-remcos-rat</loc>
		<lastmod>2025-05-29T08:41:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2025/05/13/microsoft-patch-tuesday-may-2025-security-update-review</loc>
		<lastmod>2025-05-15T04:13:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/05/12/security-uninterrupted-inside-qualys-zero-touch-security-vision-with-qualys-cloud-agent</loc>
		<lastmod>2025-05-29T08:48:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2025/05/08/inside-lockbit-defense-lessons-from-the-leaked-lockbit-negotiations</loc>
		<lastmod>2025-05-08T22:54:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/05/06/powering-the-future-of-cyber-risk-management-welcoming-our-first-mroc-alliance-members</loc>
		<lastmod>2025-05-06T21:13:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/05/05/bridging-the-gap-how-qualys-simplifies-nca-ecc-2024-compliance-for-businesses</loc>
		<lastmod>2026-03-16T10:01:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/05/01/remediate-risk-without-the-roadblocks-automate-with-qualys-flow</loc>
		<lastmod>2025-05-06T15:30:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/04/29/guard-against-genai-and-llm-risks-from-development-to-deployment-with-qualys-totalai</loc>
		<lastmod>2025-04-29T12:46:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/04/24/shrinking-lifespans-growing-risk-the-final-certificate-countdown</loc>
		<lastmod>2025-04-30T07:31:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/04/24/introducing-qualys-policy-audit-the-new-standard-for-audit-readiness</loc>
		<lastmod>2025-09-03T11:13:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2025/04/22/the-verizon-2025-data-breach-investigations-report-dbir-six-trends-you-cant-ignore</loc>
		<lastmod>2025-04-23T04:02:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/vulnmgmt-detection-response/2025/04/21/steps-to-trurisk-3-getting-started-assessing-business-consequences</loc>
		<lastmod>2025-09-26T07:01:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/04/18/the-importance-of-continuous-vulnerability-assessment-in-modern-it-environments</loc>
		<lastmod>2025-12-08T07:25:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/04/18/responding-to-zero-day-vulnerabilities-detection-and-mitigation</loc>
		<lastmod>2026-03-16T10:04:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/04/18/api-security-safeguarding-your-digital-infrastructure-from-attacks</loc>
		<lastmod>2026-03-16T09:57:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/04/18/data-leakage-prevention-in-ai</loc>
		<lastmod>2025-09-19T09:42:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/04/18/ai-workload-security</loc>
		<lastmod>2026-03-16T09:56:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/04/18/risk-mitigation-for-generative-ai-workloads</loc>
		<lastmod>2025-09-19T09:47:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/04/18/llm-security</loc>
		<lastmod>2025-06-05T13:25:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/04/18/ai-security-monitoring</loc>
		<lastmod>2026-03-16T10:01:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/04/18/what-is-sspm-saas-security-posture-management-explained-by-qualys</loc>
		<lastmod>2025-09-19T09:37:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/04/18/what-is-cloud-workload-protection-cwp-explained-by-qualys</loc>
		<lastmod>2026-03-16T10:02:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/04/18/what-is-cloud-detection-and-response-cdr-explained-by-qualys</loc>
		<lastmod>2025-09-19T09:46:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/04/17/what-is-cspm-cloud-security-posture-management-explained-by-qualys</loc>
		<lastmod>2025-09-19T09:30:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/04/17/what-is-kubernetes-container-security-kcs-explained-by-qualys</loc>
		<lastmod>2026-03-16T10:00:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/04/17/ai-security-posture-management</loc>
		<lastmod>2026-03-16T09:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2025/04/16/oracle-critical-patch-update-april-2025-security-update-review</loc>
		<lastmod>2025-04-16T14:16:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/04/15/safeguarding-vulnerability-management-despite-mitre-funding-risks</loc>
		<lastmod>2025-04-16T19:48:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/04/15/the-efficiency-imperative-how-federal-agencies-can-streamline-cybersecurity-operations</loc>
		<lastmod>2025-04-15T00:03:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2025/04/08/microsoft-patch-tuesday-april-2025-security-update-review</loc>
		<lastmod>2025-04-09T12:53:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/vulnmgmt-detection-response/2025/04/07/steps-to-trurisk-2-measuring-the-likelihood-of-vulnerability-exploitation</loc>
		<lastmod>2025-09-26T06:53:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2025/04/03/the-state-of-cloud-saas-security-essential-statistics-and-insights</loc>
		<lastmod>2026-02-24T10:36:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2025/03/27/qualys-tru-discovers-three-bypasses-of-ubuntu-unprivileged-user-namespace-restrictions</loc>
		<lastmod>2025-03-27T17:10:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/03/27/how-devops-can-move-fast-and-stay-secure-with-trurisk</loc>
		<lastmod>2025-04-02T00:59:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2025/03/11/microsoft-patch-tuesday-march-2025-security-update-review</loc>
		<lastmod>2025-04-08T17:14:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/03/10/steps-to-trurisk-1-shift-to-priority-driven-strategies</loc>
		<lastmod>2025-09-26T07:05:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/03/10/qualys-servicenow-automating-risk-driven-remediation-for-container-security</loc>
		<lastmod>2025-03-13T04:01:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/03/03/how-qualys-policy-compliance-helps-you-adopt-nist-ai-rmf-1-0</loc>
		<lastmod>2025-03-03T08:44:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/02/28/independent-analyst-firm-qualys-recognized-as-a-leader-in-attack-surface-management</loc>
		<lastmod>2025-02-28T19:13:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2025/02/25/defense-lessons-from-the-black-basta-ransomware-playbook</loc>
		<lastmod>2025-03-05T00:03:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/02/25/qualys-totalcloud-kcs-achieves-red-hat-vulnerability-scanner-certification</loc>
		<lastmod>2025-02-24T23:02:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/02/24/from-vulnerability-scanning-to-risk-management-the-complete-vmdr-advantage</loc>
		<lastmod>2025-02-25T07:22:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/02/20/streamline-your-security-automate-compliance-database-assessments-with-qualys-cloud-agent</loc>
		<lastmod>2025-02-21T13:05:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2025/02/18/securing-dynamic-cloud-environments-best-practices-for-comprehensive-scanning</loc>
		<lastmod>2025-02-12T16:51:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2025/02/18/qualys-tru-discovers-two-vulnerabilities-in-openssh-cve-2025-26465-cve-2025-26466</loc>
		<lastmod>2026-02-24T09:10:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/02/13/qualys-adds-threat-intelligence-for-typosquatting-and-defamatory-domains-to-external-attack-surface-management</loc>
		<lastmod>2025-02-18T04:00:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2025/02/11/microsoft-patch-tuesday-february-2025-security-update-review</loc>
		<lastmod>2025-02-12T09:22:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2025/02/11/what-is-cloud-scanning-and-why-does-it-matter</loc>
		<lastmod>2026-02-24T10:35:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/02/07/the-impact-of-llms-on-cybersecurity-new-threats-and-solutions</loc>
		<lastmod>2025-06-05T13:24:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/02/07/ai-and-data-privacy-mitigating-risks-in-the-age-of-generative-ai-tools</loc>
		<lastmod>2025-12-08T07:30:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/02/07/must-have-ai-security-policies-for-enterprises-a-detailed-guide</loc>
		<lastmod>2025-12-08T07:31:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/02/07/llm-security-101-protecting-large-language-models-from-cyber-threats</loc>
		<lastmod>2025-12-08T07:24:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/02/05/qualys-unveils-mroc-the-industrys-first-managed-risk-operation-center-to-help-partners-scale-risk-management-services</loc>
		<lastmod>2025-02-05T18:25:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/02/03/qualys-totalappsec-delivers-ai-powered-unified-application-risk-management-for-modern-web-apps-and-apis</loc>
		<lastmod>2025-02-03T04:49:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2025/01/31/deepseek-failed-over-half-of-the-jailbreak-tests-by-qualys-totalai</loc>
		<lastmod>2026-03-16T09:21:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/01/28/securing-ai-innovation-enterprise-strategies-for-llm-and-generative-ai-security</loc>
		<lastmod>2025-01-28T18:38:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/01/27/unlock-the-boardroom-with-cyber-risk-how-the-qualys-enterprise-trurisk-platform-empowers-cisos</loc>
		<lastmod>2025-01-30T10:07:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2025/01/22/oracle-critical-patch-update-january-2025-security-update-review</loc>
		<lastmod>2025-01-24T06:38:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2025/01/21/mass-campaign-of-murdoc-botnet-mirai-a-new-variant-of-corona-mirai</loc>
		<lastmod>2025-01-23T07:41:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/01/17/how-to-address-cve-2025-21307-without-a-patch-before-the-weekend</loc>
		<lastmod>2025-06-02T07:05:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2025/01/16/cybersecurity-2025-qualys-predictions-for-navigating-the-evolving-threat-landscape</loc>
		<lastmod>2026-01-12T07:29:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/01/15/certificate-awareness-automated-renewal-with-qualys-certview</loc>
		<lastmod>2025-06-02T06:02:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2025/01/14/microsoft-patch-tuesday-january-2025-security-update-review</loc>
		<lastmod>2025-01-16T06:23:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2025/01/07/secure-efficient-cost-effective-how-qualys-patch-management-delivers-roi</loc>
		<lastmod>2025-06-02T05:54:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/12/19/securing-cloud-environments-against-potential-extortion-threats</loc>
		<lastmod>2024-12-19T18:02:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/12/18/steps-to-trurisk-insight-to-action-with-vmdr</loc>
		<lastmod>2025-09-26T06:57:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/12/18/notlockbit-a-deep-dive-into-the-new-ransomware-threat</loc>
		<lastmod>2025-01-20T08:30:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/12/17/whats-new-in-qualys-vmdr-2024-edition</loc>
		<lastmod>2025-05-06T10:03:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/12/16/critical-apache-struts-file-upload-vulnerability-cve-2024-53677-risks-implications-and-enterprise-countermeasures</loc>
		<lastmod>2025-07-30T09:39:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/12/12/qualys-performance-tuning-series-remove-stale-compliance-data-for-the-best-performance</loc>
		<lastmod>2025-06-02T05:36:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/12/11/qualys-achieves-100-major-step-detection-in-the-2024-mitre-attck-evaluations-enterprise</loc>
		<lastmod>2025-06-20T13:47:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/12/10/microsoft-patch-tuesday-december-2024-security-update-review</loc>
		<lastmod>2025-04-22T04:52:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/12/05/qualys-totalai-the-journey-from-llm-scanner-to-comprehensive-ai-security-solution</loc>
		<lastmod>2025-05-14T12:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/12/05/secure-your-generative-investments-qualys-advances-enterprise-trurisk-platform-with-qualys-totalai-to-protect-your-llm-investments</loc>
		<lastmod>2025-06-20T13:22:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/12/04/proactively-managing-high-risk-vulnerabilities-with-trurisk-mitigate</loc>
		<lastmod>2025-05-13T07:01:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/11/26/elevate-cyber-defense-with-qualys-advanced-hunting</loc>
		<lastmod>2025-06-20T13:46:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/11/25/ai-under-the-microscope-whats-changed-in-the-owasp-top-10-for-llms-2025</loc>
		<lastmod>2025-09-19T08:33:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/11/19/qualys-tru-uncovers-five-local-privilege-escalation-vulnerabilities-in-needrestart</loc>
		<lastmod>2026-02-25T11:58:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/11/14/best-practices-for-cloud-compliance</loc>
		<lastmod>2026-03-16T10:04:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/11/12/microsoft-and-adobe-patch-tuesday-november-2024-security-update-review</loc>
		<lastmod>2025-07-22T10:06:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/11/07/elevate-your-container-security-with-qscanner-in-2025</loc>
		<lastmod>2025-06-23T13:55:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/11/05/qualys-web-application-scanning-was-recognized-as-a-leader-in-2024-gigaom-radar-report-for-application-security-testing-ast</loc>
		<lastmod>2025-05-14T13:50:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/10/31/announcing-totalcloud-attack-path-cloud-workflow-automation-and-3-step-simplified-user-onboarding-for-qualys-totalcloud-cnapp</loc>
		<lastmod>2025-05-06T10:27:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/vulnmgmt-detection-response/2024/10/29/qualys-vmdr-core-apps-revamped-ultimate-cyber-defense-partnership-for-streamlined-vulnerability-management-with-itsm</loc>
		<lastmod>2025-06-10T16:01:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/10/20/unmasking-lumma-stealer-analyzing-deceptive-tactics-with-fake-captcha</loc>
		<lastmod>2026-02-24T09:03:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/10/16/oracle-critical-patch-update-october-2024-security-update-review</loc>
		<lastmod>2025-05-13T07:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/10/15/the-spanish-national-security-framework-ens-is-now-part-of-the-qualys-enterprise-trurisk-platform</loc>
		<lastmod>2025-05-14T13:31:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/10/10/introducing-the-enhanced-user-interface-of-the-qualys-enterprise-trurisk-platform</loc>
		<lastmod>2026-03-16T09:21:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/10/09/announcing-trurisk-2-0-unleashing-next-level-precision-in-cyber-risk-management</loc>
		<lastmod>2025-06-02T14:00:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/10/09/qualys-launches-enterprise-trurisk-management-the-industrys-first-cloud-based-risk-operations-center</loc>
		<lastmod>2026-02-25T12:14:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/10/09/the-future-of-cybersecurity-risk-management-risk-operations-center-roc-delivered-by-qualys-enterprise-trurisk-management-etm</loc>
		<lastmod>2026-02-26T08:10:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/10/08/microsoft-and-adobe-patch-tuesday-october-2024-security-update-review</loc>
		<lastmod>2025-05-13T06:54:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/10/07/qualys-vmdr-rated-as-the-only-leader-and-outperformer-by-independent-analyst-firm-for-the-second-consecutive-year</loc>
		<lastmod>2026-02-24T07:12:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/10/02/threat-brief-understanding-akira-ransomware</loc>
		<lastmod>2025-05-06T09:31:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/09/27/qualys-ranked-as-a-strong-performer-among-top-vendors-in-forrester-wave-for-attack-surface-management</loc>
		<lastmod>2026-02-24T07:11:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/09/26/critical-unauthenticated-rce-flaws-in-cups-printing-systems</loc>
		<lastmod>2025-05-06T09:51:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/09/25/addressing-cloud-identity-risks-with-totalcloud-ciem</loc>
		<lastmod>2025-05-14T13:01:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/09/24/enhancing-cloud-native-security-qualys-introduces-scanning-for-container-optimized-os-in-google-kubernetes-engine</loc>
		<lastmod>2025-05-06T10:29:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/09/19/black-basta-ransomware-what-you-need-to-know</loc>
		<lastmod>2026-02-17T16:29:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/09/12/totalcloud-insights-unmasking-aws-instance-metadata-service-v1-imdsv1-the-hidden-flaw-in-aws-security</loc>
		<lastmod>2025-06-23T10:53:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/09/10/microsoft-and-adobe-patch-tuesday-september-2024-security-update-review</loc>
		<lastmod>2025-05-13T06:54:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/09/09/partnering-for-security-qualys-solutions-for-microsoft-azure-linux-in-aks-and-azure-container-instances</loc>
		<lastmod>2025-05-15T04:59:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/09/05/simplifying-azure-cloud-security-with-snapshot-based-scans</loc>
		<lastmod>2024-09-23T23:23:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/09/03/secure-your-business-with-qualys-new-cloud-agent-deployment-using-qualys-scanner</loc>
		<lastmod>2024-09-03T18:45:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/08/22/totalcloud-insights-when-multi-factor-authentication-turns-into-single-factor-authentication</loc>
		<lastmod>2024-08-22T17:55:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/08/15/hhs-oig-report-underscores-challenges-of-securing-the-cloud</loc>
		<lastmod>2025-03-12T09:35:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/08/14/our-takeaways-from-2024-gartner-market-guide-for-cloud-native-application-protection-platforms-cnapp-insights-and-market-evolution</loc>
		<lastmod>2025-05-14T12:54:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/08/13/microsoft-patch-tuesday-august-2024-security-update-review</loc>
		<lastmod>2025-05-13T06:55:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/08/12/understanding-the-new-windows-secure-kernel-mode-elevation-of-privilege-vulnerability-cve-2024-21302</loc>
		<lastmod>2025-05-13T06:45:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/08/09/subscription-health-dashboard-update-optimize-deployments-and-identify-issues</loc>
		<lastmod>2025-11-28T10:13:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/08/06/2024-midyear-threat-landscape-review</loc>
		<lastmod>2025-04-21T11:10:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/08/05/de-risk-generative-ai-enterprise-trurisk-platform-advances-to-secure-ai-and-llm-workloads</loc>
		<lastmod>2024-08-05T04:54:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/08/02/enhance-your-cybersecurity-posture-qualys-tackles-cisa-nsas-top-10-misconfigurations</loc>
		<lastmod>2025-05-15T04:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/07/30/qualys-announces-trurisk-eliminate-to-augment-patching</loc>
		<lastmod>2025-01-07T17:06:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/07/24/secure-your-apis-and-reduce-your-attack-surface-with-modern-ai-powered-api-security-in-qualys-web-application-scanning-was</loc>
		<lastmod>2025-09-22T06:17:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/07/19/global-outage-alert-windows-bsod-crisis-following-crowdstrike-update-recovery-steps-qualys-assurance</loc>
		<lastmod>2025-05-15T05:30:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/07/17/oracle-critical-patch-update-july-2024-security-update-review</loc>
		<lastmod>2025-05-13T07:01:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/07/12/how-to-detect-issuer-certificates-and-comply-with-google-chromes-new-entrust-certificate-policy-using-qualys-certificate-view</loc>
		<lastmod>2025-05-14T13:38:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/07/09/microsoft-patch-tuesday-july-2024-security-update-review</loc>
		<lastmod>2025-04-21T11:12:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/07/09/understanding-the-hidden-cyber-risk-from-tech-debt-eol-eos</loc>
		<lastmod>2025-05-06T10:07:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/07/08/measuring-communicating-and-eliminating-risk-with-trurisk-in-qualys-web-application-scanning-was</loc>
		<lastmod>2025-03-13T07:08:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2024/07/03/qualys-blog</loc>
		<lastmod>2024-07-04T07:50:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server</loc>
		<lastmod>2025-07-22T10:07:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/06/28/polyfill-io-supply-chain-attack</loc>
		<lastmod>2025-06-23T11:11:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2024/06/27/decoding-owasp-a-security-engineers-roadmap-to-application-security</loc>
		<lastmod>2025-06-23T09:52:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2024/06/24/essential-strategies-to-secure-your-web-applications-and-apis-in-a-modern-application-development-world</loc>
		<lastmod>2024-06-24T17:13:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/06/20/secure-your-containerized-environments-with-qualys-containerized-scanner-appliance-qcsa</loc>
		<lastmod>2024-06-20T16:46:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/06/19/totalcloud-insights-protect-your-aws-environment-by-managing-access-keys-securely</loc>
		<lastmod>2024-06-19T15:02:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/06/11/microsoft-patch-tuesday-june-2024-security-update-review</loc>
		<lastmod>2025-07-22T10:10:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/06/07/check-point-security-gateway-information-disclosure-vulnerability-cve-2024-24919</loc>
		<lastmod>2025-05-14T13:19:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/06/04/totalcloud-insights-securing-your-data-the-power-of-encryption-in-preventing-threats</loc>
		<lastmod>2025-06-20T13:45:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2024/06/03/pci-dss-4-0-complying-with-the-new-requirements</loc>
		<lastmod>2025-06-02T07:32:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/05/29/2024-cybersecurity-trends-whats-observable-already</loc>
		<lastmod>2024-05-29T15:41:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/05/22/totalcloud-insights-uncovering-the-hidden-dangers-in-google-cloud-dataproc</loc>
		<lastmod>2025-05-14T13:39:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/05/17/introducing-fim-4-0-with-file-access-monitoring-fam-and-agentless-fim</loc>
		<lastmod>2025-06-25T06:27:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/05/16/how-the-qualys-enterprise-trurisk-platform-extends-cisa-vulnrichment</loc>
		<lastmod>2024-05-17T20:39:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/05/16/totalcloud-container-security-best-practices</loc>
		<lastmod>2026-02-26T08:23:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/05/14/microsoft-patch-tuesday-may-2024-security-update-review</loc>
		<lastmod>2025-05-14T12:59:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/05/10/get-weekends-back-put-chrome-cves-like-cve-2024-4671-on-auto-patching</loc>
		<lastmod>2024-05-24T19:16:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/05/09/totalcloud-insights-a-wake-up-call-on-cloud-database-security-failure-rates</loc>
		<lastmod>2024-05-09T21:09:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/05/09/elevating-security-qualys-unveils-first-solution-for-scanning-aws-bottlerocket-in-amazon-eks-and-amazon-ecs</loc>
		<lastmod>2025-05-15T04:57:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/05/09/how-to-create-collaboration-and-shared-goals-with-it-and-security-teams</loc>
		<lastmod>2026-02-25T12:11:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/05/08/detect-address-the-top-10-mitre-attck-techniques-for-ransomware-using-policy-compliance</loc>
		<lastmod>2026-03-16T09:17:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2024/05/07/qualys-is-proud-to-sign-cisas-secure-by-design-pledge</loc>
		<lastmod>2024-05-08T17:59:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/05/06/introducing-cybersecurity-asset-management-3-0-with-expanded-discovery-and-cyber-risk-assessment</loc>
		<lastmod>2025-05-06T10:36:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/05/02/agentless-fim-for-detecting-network-configuration-changes</loc>
		<lastmod>2024-05-02T17:35:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/05/02/qualys-launches-mssp-portal-to-empower-managed-security-service-providers</loc>
		<lastmod>2025-05-06T10:09:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2024/05/01/verizons-2024-dbir-unpacked-from-ransomware-evolution-to-supply-chain-vulnerabilities</loc>
		<lastmod>2025-06-02T07:29:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/04/30/crushftp-zero-day-exploitation-due-to-cve-2024-4040</loc>
		<lastmod>2025-07-22T10:10:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/04/24/arcanedoor-unlocked-tackling-state-sponsored-cyber-espionage-in-network-perimeters</loc>
		<lastmod>2025-06-23T10:06:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2024/04/24/unveiling-the-hidden-power-of-the-cmdb-in-cybersecurity</loc>
		<lastmod>2026-03-16T09:59:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/04/24/staying-five-steps-ahead-of-cyber-risk</loc>
		<lastmod>2024-04-23T20:23:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/04/22/empowering-small-businesses-in-the-digital-age-a-must-read-guide-to-web-application-api-security</loc>
		<lastmod>2025-03-13T07:16:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/04/22/wordpress-layerslider-plugin-sql-injection-vulnerability</loc>
		<lastmod>2025-07-22T10:11:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/04/18/totalcloud-insights-safeguarding-your-cloud-database-from-sql-server-threats-and-lateral-movement-risks</loc>
		<lastmod>2025-05-13T06:33:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/04/17/oracle-patch-update-april-2024-security-update-review</loc>
		<lastmod>2025-04-22T04:49:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/04/16/how-qualys-supports-the-national-cyber-security-centre-ncscs-vulnerability-management-guidance</loc>
		<lastmod>2024-04-19T20:28:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/04/15/navigating-the-eu-nis2-directive</loc>
		<lastmod>2025-05-13T06:55:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/04/15/wordpress-remote-code-execution-via-plugin-upload-cve-2024-31210</loc>
		<lastmod>2025-05-06T09:48:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/04/12/de-risk-the-software-supply-chain-by-expanding-unparalleled-detection-coverage-with-qualys-vmdr-and-software-composition-analysis</loc>
		<lastmod>2025-05-13T06:55:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/04/11/qualys-endpoint-detection-response-validated-by-top-independent-testing-labs</loc>
		<lastmod>2024-04-12T15:50:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/04/10/real-time-file-access-monitoring-fam-with-qualys-fim</loc>
		<lastmod>2024-04-29T16:23:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/04/10/how-to-reduce-your-risk-with-proactive-vm-strategies</loc>
		<lastmod>2024-04-10T18:32:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2024/04/09/microsoft-patch-tuesday-april-2024-security-update-review</loc>
		<lastmod>2025-07-22T10:01:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/04/08/navigating-sql-injection-vulnerabilities-with-dast-for-modern-appsec</loc>
		<lastmod>2025-06-23T10:03:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/04/02/key-insights-from-the-ncscs-vulnerability-management-guidance</loc>
		<lastmod>2024-04-16T19:45:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/03/29/xz-utils-sshd-backdoor</loc>
		<lastmod>2025-07-22T10:11:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/03/26/meeting-fisma-m-24-04-requirements-with-a-unified-attack-surface-management-strategy</loc>
		<lastmod>2025-05-15T04:51:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/03/25/combine-qualys-trurisk-and-mitre-attck-to-adopt-a-threat-informed-defense-to-reduce-risk</loc>
		<lastmod>2025-05-14T14:31:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2024/03/19/navigating-evolving-cybersecurity-recent-trends-and-future-outlook</loc>
		<lastmod>2025-06-02T07:18:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/03/13/de-risking-your-organization-in-spite-of-nvd-delays</loc>
		<lastmod>2025-05-02T13:10:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/03/12/upgrade-your-cybersecurity-program-to-a-threat-informed-defense-approach-with-qualys</loc>
		<lastmod>2024-03-25T16:31:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/03/12/microsoft-patch-tuesday-march-2024-security-update-review</loc>
		<lastmod>2025-07-22T10:12:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/03/07/qualys-updates-login-page-to-improve-user-experience-and-highlight-latest-qualys-news</loc>
		<lastmod>2024-03-07T17:10:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/03/05/achieving-nist-csf-2-0-top-tier-adaptable-status</loc>
		<lastmod>2025-09-22T06:16:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2024/02/26/a-comprehensive-assessment-of-the-general-personal-data-protection-law-lgpd</loc>
		<lastmod>2025-06-02T07:12:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/02/22/trurisk%ef%b8%8f-insights-the-story-behind-a-trurisk-score</loc>
		<lastmod>2024-02-22T23:05:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/02/15/ransomware-reality-check-deciphering-priorities-in-a-sea-of-cyber-extortion</loc>
		<lastmod>2024-02-15T18:02:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/02/13/microsoft-patch-tuesday-february-2024-security-update-review</loc>
		<lastmod>2024-03-13T05:55:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/02/12/csam-drives-accurate-trurisk-scoring-with-eol-eos-unauthorized-software-and-missing-security-agents</loc>
		<lastmod>2024-02-09T19:25:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/02/07/announcing-totalcloud-2-0-with-trurisk-insights-the-future-of-cloud-and-saas-security</loc>
		<lastmod>2025-05-02T08:31:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/02/05/csam-strengthens-attack-surface-coverage-and-risk-assessment-with-third-party-connectors</loc>
		<lastmod>2025-05-02T12:39:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/01/31/identify-and-de-risk-unmanaged-unauthorized-devices-with-qualys-cybersecurity-asset-management-csam</loc>
		<lastmod>2024-02-01T20:43:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/01/31/qualys-patch-management-a-review-of-new-features-in-2023-for-faster-elimination-of-cyber-risk</loc>
		<lastmod>2024-02-02T20:23:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/01/30/qualys-tru-discovers-important-vulnerabilities-in-gnu-c-librarys-syslog</loc>
		<lastmod>2024-02-01T22:38:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/01/30/advancing-cybersecurity-management-with-qualys-cloud-agent</loc>
		<lastmod>2024-02-15T16:30:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2024/01/29/cybersecurity-must-de-risk-the-business</loc>
		<lastmod>2024-01-29T16:33:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/01/24/upgrade-to-new-ui-of-qualys-web-application-scanning-was-bringing-you-enhanced-web-application-security</loc>
		<lastmod>2025-03-18T06:57:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/01/24/qualys-was-unveils-new-features-in-an-upgraded-user-interface</loc>
		<lastmod>2025-03-18T06:54:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/01/23/announcing-the-newest-game-changing-upgrades-of-qualys-cloud-agent</loc>
		<lastmod>2026-02-24T09:44:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/01/22/reduce-risk-faster-with-the-qualys-risk-reduction-recommendation-report</loc>
		<lastmod>2024-01-22T16:48:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/01/17/oracle-patch-update-january-2024-security-update-review</loc>
		<lastmod>2024-01-18T15:15:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/01/12/detect-and-manage-the-risk-of-apache-struts-cve-2023-50164-comprehensively</loc>
		<lastmod>2025-05-02T08:30:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/01/11/totalcloud-insights-crafting-effective-indicators-of-compromise-iocs-for-sub-domain-takeover-risk-detection</loc>
		<lastmod>2024-01-11T23:01:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/01/11/dual-zero-day-threats-in-ivanti-connect-secure-and-policy-secure-gateways-cve-2023-46805-and-cve-2024-21887</loc>
		<lastmod>2024-02-01T15:40:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2024/01/10/facebook-job-scam</loc>
		<lastmod>2025-04-24T06:00:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2024/01/09/microsoft-patch-tuesday-january-2024-security-update-review</loc>
		<lastmod>2024-01-10T10:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2024/01/09/qualys-and-microsoft-sunset-embedded-integration-of-qualys-solutions-for-microsoft-defender-for-cloud</loc>
		<lastmod>2026-02-25T12:08:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/12/26/yet-another-apache-struts-2-vulnerability-cve-2023-50164</loc>
		<lastmod>2025-05-14T13:27:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/12/21/ssh-attack-surface-cve-2023-48795-find-and-patch-before-the-grinch-arrives-with-cybersecurity-asset-management</loc>
		<lastmod>2025-05-14T12:34:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/12/19/2023-threat-landscape-year-in-review-part-one</loc>
		<lastmod>2025-05-14T13:35:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/12/18/hidden-risks-of-amazon-s3-misconfigurations</loc>
		<lastmod>2026-02-24T09:02:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/12/12/microsoft-patch-tuesday-december-2023-security-update-review</loc>
		<lastmod>2025-05-14T12:55:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/12/12/building-an-appsec-program-with-qualys-was-additional-configurations-and-review-confirm</loc>
		<lastmod>2023-12-12T19:09:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2023/12/12/an-easy-and-effective-strategy-to-shield-your-business-from-ransomware</loc>
		<lastmod>2023-12-15T11:55:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/12/08/opencms-unauthenticated-xxe-vulnerability-cve-2023-42344</loc>
		<lastmod>2025-05-14T13:07:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/12/04/building-an-appsec-program-with-qualys-was-introduction-and-configuring-a-web-application-or-api-default-scan-settings</loc>
		<lastmod>2023-12-13T13:56:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/11/26/closing-the-visibility-gap-how-qualys-cloud-agent-passive-sensor-caps-eliminates-blind-spots-without-the-hassle</loc>
		<lastmod>2026-02-24T09:44:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/11/23/unveiling-the-deceptive-dance-phobos-ransomware-masquerading-as-vx-underground</loc>
		<lastmod>2026-02-24T09:02:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/11/15/atlassian-confluence-broken-access-control-vulnerability-cve-2023-22515</loc>
		<lastmod>2026-02-24T09:29:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/11/14/microsoft-and-adobe-patch-tuesday-november-2023-security-update-review</loc>
		<lastmod>2025-05-14T13:14:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/qualys-security-conference/2023/11/09/qsc23-qualys-announces-a-directional-shift-to-measure-communicate-and-eliminate-cyber-risk-with-new-platform-and-solutions</loc>
		<lastmod>2025-05-19T13:42:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/qualys-security-conference/2023/11/09/de-risking-in-practice-how-qualys-customers-are-driving-value-in-their-organizations</loc>
		<lastmod>2023-11-09T19:14:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/qualys-security-conference/2023/11/09/leveraging-ai-informed-cybersecurity-to-measure-communicate-and-eliminate-cyber-risk</loc>
		<lastmod>2026-02-24T09:45:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/qualys-security-conference/2023/11/08/effectively-measure-communicate-and-eliminate-cloud-risks-with-totalcloud</loc>
		<lastmod>2023-11-09T23:49:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/11/08/cybersecurity-at-a-crossroads-new-implications-on-business-risk</loc>
		<lastmod>2023-11-09T04:06:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/11/02/cvss-v4-is-now-live-and-what-do-you-need-to-know</loc>
		<lastmod>2026-02-17T15:48:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/11/01/explaining-the-business-value-of-qualys-enterprise-trurisk-platform-to-your-leadership</loc>
		<lastmod>2023-11-01T23:24:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/10/31/qualys-api-best-practices-policy-compliance-posture-streaming-pcrs-api</loc>
		<lastmod>2025-05-02T12:17:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2023/10/30/pci-dss-4-0-how-to-ensure-full-compliance-with-new-requirements</loc>
		<lastmod>2026-02-24T09:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/10/26/qualys-api-best-practices-web-application-scanning-api</loc>
		<lastmod>2023-10-31T11:06:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2023/10/26/safeguard-your-organization-this-holiday-season-with-free-endpoint-security-from-qualys</loc>
		<lastmod>2023-11-06T16:33:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/10/25/building-an-appsec-program-with-qualys-was-configuring-a-web-application-or-api-crawl-settings</loc>
		<lastmod>2023-12-05T23:30:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/10/24/qualys-named-a-leader-in-kuppingercole-cspm-report</loc>
		<lastmod>2023-10-20T17:35:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/10/18/oracle-patch-tuesday-october-2023-security-update-review</loc>
		<lastmod>2023-10-19T05:59:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2023/10/17/critical-cisco-0day-exploited-do-you-have-blind-spots-in-your-risk-management</loc>
		<lastmod>2023-10-18T13:41:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/10/17/building-an-appsec-program-with-qualys-was</loc>
		<lastmod>2025-05-02T09:02:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/10/16/discover-and-assess-the-risk-of-embedded-open-source-software-oss-vulnerabilities</loc>
		<lastmod>2025-05-06T09:59:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/10/13/qualys-fim-playbook-for-pci-4-0</loc>
		<lastmod>2023-10-13T11:02:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/10/11/how-does-qualys-totalcloud-prevent-secret-leaks-for-containers</loc>
		<lastmod>2023-10-19T10:33:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack</loc>
		<lastmod>2026-02-24T10:53:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/microsoft-patch-tuesday-october-2023-security-update-review</loc>
		<lastmod>2025-05-14T12:55:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/qualys-security-conference/2023/10/09/the-qualys-security-conference-mumbai-thats-a-wrap</loc>
		<lastmod>2023-10-09T17:47:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/10/05/curl-8-4-0-proactively-identifying-potential-vulnerable-assets</loc>
		<lastmod>2025-05-14T07:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/10/05/achieving-dora-compliance-with-qualys-a-comprehensive-approach</loc>
		<lastmod>2023-10-16T23:51:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/10/04/pci-dss-4-0-fim-requirements-simplified-with-qualys-file-integrity-monitoring</loc>
		<lastmod>2026-02-24T09:22:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/10/03/cve-2023-4911-looney-tunables-local-privilege-escalation-in-the-glibcs-ld-so</loc>
		<lastmod>2025-05-14T13:25:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2023/09/29/latest-trend-in-mac-vulnerabilities-and-how-to-efficiently-address-them</loc>
		<lastmod>2025-05-02T12:43:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/09/28/qualys-named-a-market-leader-in-gigaom-radar-report-for-application-security-testing</loc>
		<lastmod>2025-03-18T06:47:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2023/09/27/mitigating-risk-with-custom-first-party-software-and-application-components-a-cisos-guide</loc>
		<lastmod>2025-05-02T12:55:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2023/09/26/qualys-survey-of-top-10-exploited-vulnerabilities-in-2023</loc>
		<lastmod>2026-03-16T10:02:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2023/09/18/the-mgm-cybersecurity-breach-learnings-and-prevention-measures</loc>
		<lastmod>2023-10-04T18:54:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/09/18/qualys-is-the-outperformer-in-the-new-gigaom-radar-report-for-continuous-vulnerability-management</loc>
		<lastmod>2025-03-12T09:39:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/09/12/microsoft-patch-tuesday-september-2023-security-update-review</loc>
		<lastmod>2023-09-14T09:28:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/09/12/risk-fact-5-keeping-the-pace-of-remediation-at-cloud-scale-requires-automation</loc>
		<lastmod>2023-09-18T07:11:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/09/04/qualys-top-20-exploited-vulnerabilities</loc>
		<lastmod>2026-02-25T11:57:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/08/30/elevate-your-security-posture-implementing-cis-top-18-controls-through-qualys-cloud-platform</loc>
		<lastmod>2026-03-16T09:59:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/08/29/risk-fact-4-malware-in-your-cloud-means-exploitation-is-underway</loc>
		<lastmod>2023-09-18T06:41:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2023/08/24/qualys-tackles-2022s-top-routinely-exploited-cyber-vulnerabilities</loc>
		<lastmod>2025-05-02T08:26:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/08/17/risk-fact-3-weaponized-vulnerabilities-give-attackers-a-key-to-your-cloud</loc>
		<lastmod>2023-09-12T16:09:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/08/17/part-iii-implementing-effective-cyber-security-metrics-that-reduce-risk-realistically</loc>
		<lastmod>2025-05-02T13:00:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/08/09/risk-fact-2-external-facing-vulnerabilities-are-low-hanging-fruit-for-attackers</loc>
		<lastmod>2025-03-18T06:09:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2023/08/08/microsoft-patch-tuesday-august-2023-security-update-review</loc>
		<lastmod>2025-07-22T10:02:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/08/08/ensuring-compliance-with-dora-how-qualys-solutions-can-help</loc>
		<lastmod>2023-08-08T15:41:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/08/03/qualys-expands-cloud-platform-for-first-party-application-risk-detection-and-remediation</loc>
		<lastmod>2025-05-02T08:14:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/08/01/beating-the-challenge-of-cloud-detection-and-response-with-qualys-totalcloud-deep-learning-ai</loc>
		<lastmod>2025-03-18T06:12:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/08/01/risk-fact-1-cloud-misconfigurations-enable-exploitation-by-attackers</loc>
		<lastmod>2023-09-12T16:21:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/07/27/part-ii-implementing-effective-cyber-security-metrics-that-reduce-risk-realistically</loc>
		<lastmod>2023-07-31T05:08:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/07/27/who-protects-pii-consumers-or-companies</loc>
		<lastmod>2025-05-14T13:24:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/07/21/add-unique-asset-context-with-custom-attributes</loc>
		<lastmod>2023-07-21T15:25:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2023/07/20/part-i-implementing-effective-cyber-security-metrics-that-reduce-risk-realistically</loc>
		<lastmod>2023-07-20T15:26:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/07/19/oracle-patch-tuesday-july-2023-security-update-review</loc>
		<lastmod>2023-07-20T10:05:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/07/19/cve-2023-38408-remote-code-execution-in-opensshs-forwarded-ssh-agent</loc>
		<lastmod>2026-02-24T09:01:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/07/18/part-2-an-in-depth-look-at-the-latest-vulnerability-threat-landscape-attackers-edition</loc>
		<lastmod>2023-07-20T07:01:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2023/07/14/evaluate-your-windows-endpoints-for-storm-0978-activity-with-qualys-endpoint-security</loc>
		<lastmod>2023-07-20T23:52:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/07/11/microsoft-patch-tuesday-july-2023-security-update-review</loc>
		<lastmod>2023-07-25T11:45:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/07/11/an-in-depth-look-at-the-latest-vulnerability-threat-landscape-part-1</loc>
		<lastmod>2023-07-18T13:41:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/07/06/how-qualys-drives-pci-dss-4-0-compliance-for-file-integrity-monitoring</loc>
		<lastmod>2025-05-02T12:34:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/07/06/qualys-performance-tuning-series-qualys-cloud-agent-configuration-best-practice</loc>
		<lastmod>2026-02-24T09:27:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/06/26/supporting-our-u-s-federal-customers-for-bod-23-02-by-mitigating-the-risk-from-internet-exposed-management-interfaces</loc>
		<lastmod>2025-03-12T09:59:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2023/06/14/qualys-responds-to-cisa-alert-binding-operational-directive-23-02</loc>
		<lastmod>2023-07-26T17:09:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/06/14/cvssv4-public-preview-announcement</loc>
		<lastmod>2023-06-14T15:09:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/06/13/microsoft-patch-tuesday-june-2023-security-update-review</loc>
		<lastmod>2023-06-14T11:15:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/06/08/empower-your-security-team-with-our-robust-script-library</loc>
		<lastmod>2023-06-08T21:12:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/06/07/progress-moveit-transfer-vulnerability-being-actively-exploited</loc>
		<lastmod>2025-03-13T07:11:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/06/06/behind-the-screen-three-vulnerabilities-in-renderdoc</loc>
		<lastmod>2023-06-06T17:01:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/05/31/totalcloud-empowered-with-cloudview-integration</loc>
		<lastmod>2025-03-12T09:37:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/05/30/qualys-gateway-service-now-available-in-aws-azure-and-google-cloud-marketplaces</loc>
		<lastmod>2023-05-30T15:06:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/05/17/new-strain-of-sotdas-malware-discovered</loc>
		<lastmod>2023-05-18T04:04:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/05/10/adopting-an-effective-and-easy-to-implement-zero-trust-architecture</loc>
		<lastmod>2023-05-11T12:49:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/05/10/new-tsa-cybersecurity-emergency-action-rule-impacts-cybersecurity-and-compliance</loc>
		<lastmod>2023-08-22T05:41:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2023/05/09/microsoft-patch-tuesday-may-2023-security-update-review</loc>
		<lastmod>2023-05-16T11:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2023/04/27/qualys-virtual-cyber-risk-summit-thats-a-wrap</loc>
		<lastmod>2023-04-27T04:30:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2023/04/24/qualys-launches-inaugural-cyber-risk-summit-to-share-expert-insights</loc>
		<lastmod>2023-04-24T22:29:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/04/24/qualys-security-solutions-now-support-alibaba-cloud</loc>
		<lastmod>2023-05-08T05:06:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2023/04/19/oracle-patch-tuesday-april-2023-security-update-review</loc>
		<lastmod>2025-07-22T10:04:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/04/18/qualys-security-updates-cloud-agent-for-windows-and-mac</loc>
		<lastmod>2023-04-21T15:29:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2023/04/11/microsoft-and-adobe-patch-tuesday-april-2023-security-update-review</loc>
		<lastmod>2023-10-10T06:08:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/04/03/3cxdesktopapp-backdoored-in-a-suspected-lazarus-campaign</loc>
		<lastmod>2023-04-04T00:51:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/04/03/augment-security-asset-tagging-with-custom-assessment-and-remediation-car</loc>
		<lastmod>2023-04-04T01:02:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/04/03/risk-fact-5-infrastructure-misconfigurations-open-the-door-to-ransomware</loc>
		<lastmod>2023-04-17T04:14:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/03/31/risk-fact-4-misconfigurations-still-prevalent-in-web-applications</loc>
		<lastmod>2025-03-18T06:45:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/03/30/risk-based-vulnerability-management-combined-with-a-cyber-risk-management-platform</loc>
		<lastmod>2025-03-27T12:21:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/03/30/risk-fact-3-initial-access-brokers-attack-what-organizations-ignore</loc>
		<lastmod>2023-04-14T13:17:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/03/29/risk-fact-2-automation-is-the-difference-between-success-and-failure</loc>
		<lastmod>2025-05-02T13:13:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/03/28/risk-fact-1-speed-is-the-key-to-out-maneuvering-adversaries</loc>
		<lastmod>2023-04-14T13:05:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/03/21/acsc-essential-8-cybersecurity-strategies-maturity-levels-and-best-practices</loc>
		<lastmod>2025-05-15T05:28:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/03/16/a-new-approach-to-discover-monitor-and-reduce-your-modern-web-attack-surface</loc>
		<lastmod>2025-03-12T09:23:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/03/14/staying-ahead-of-ransomware-threats</loc>
		<lastmod>2023-03-15T06:36:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2023/03/14/the-march-2023-patch-tuesday-security-update-review</loc>
		<lastmod>2023-03-17T17:26:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/03/02/qualys-vmdr-jira-integration-now-available</loc>
		<lastmod>2023-03-02T12:05:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/02/21/whats-next-after-log4shell</loc>
		<lastmod>2025-05-02T12:30:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/02/16/automating-vulnerability-management-with-qualys-vmdr-servicenow</loc>
		<lastmod>2023-02-17T11:04:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/02/15/forta-goanywhere-zero-day-exploited-by-threat-actors</loc>
		<lastmod>2025-05-14T13:37:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2023/02/14/the-february-2023-patch-tuesday-security-update-review</loc>
		<lastmod>2023-02-16T03:35:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/02/14/dont-forget-about-risk-remediation-of-your-macos-assets</loc>
		<lastmod>2023-02-14T17:12:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/02/09/real-time-defense-of-multi-cloud-environments-from-malicious-attacks-and-threats</loc>
		<lastmod>2023-02-24T03:18:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/02/09/announcing-general-availability-of-qualys-totalcloud</loc>
		<lastmod>2025-03-18T06:12:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/02/09/blind-sql-injection-content-based-time-based-approaches</loc>
		<lastmod>2025-05-06T10:43:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/02/08/introducing-enterprise-trurisk-management-from-qualys</loc>
		<lastmod>2025-05-02T08:36:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/02/08/introducing-qualys-ml-based-threat-intelligence</loc>
		<lastmod>2023-02-09T07:30:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/02/07/ransomware-targets-outdated-vmware-esxi-hypervisors-protect-your-systems-now</loc>
		<lastmod>2023-02-09T16:40:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/patch-management/2023/02/06/macos-patching-is-here</loc>
		<lastmod>2026-02-24T08:20:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/02/03/is-your-fim-solution-cost-and-time-efficient</loc>
		<lastmod>2023-02-03T22:22:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/02/03/cve-2023-25136-pre-auth-double-free-vulnerability-in-openssh-server-9-1</loc>
		<lastmod>2023-02-13T16:57:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/01/31/why-fedramp-high-authorization-can-ensure-high-cybersecurity-maturity</loc>
		<lastmod>2025-03-27T12:36:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/01/30/managing-security-configuration-risk-most-comprehensive-configuration-compliance-solution</loc>
		<lastmod>2023-01-31T02:11:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/01/17/the-oracle-january-2023-critical-patch-update</loc>
		<lastmod>2023-01-18T19:37:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/01/16/detection-of-vulnerabilities-in-javascript-libraries</loc>
		<lastmod>2026-02-24T09:16:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2023/01/10/the-january-2023-patch-tuesday-security-update-review</loc>
		<lastmod>2023-01-17T11:54:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/01/10/driving-cisa-compliance-with-qualys</loc>
		<lastmod>2023-01-13T16:07:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2023/01/03/implement-risk-based-vulnerability-management-with-qualys-trurisk-part-3</loc>
		<lastmod>2023-01-03T11:44:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2023/01/03/bitrat-now-sharing-sensitive-bank-data-as-a-lure</loc>
		<lastmod>2025-05-15T05:27:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/12/29/qualys-threat-research-unit-threat-thursdays-december-2022</loc>
		<lastmod>2025-05-02T12:14:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/12/16/implement-risk-based-vulnerability-management-with-qualys-trurisk-part-2</loc>
		<lastmod>2023-03-02T13:18:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2022/12/13/the-december-2022-patch-tuesday-security-update-review</loc>
		<lastmod>2022-12-19T04:52:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/12/12/dissecting-the-empire-c2-framework</loc>
		<lastmod>2026-02-24T09:22:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/12/12/operationalizing-qualys-vmdr-with-qualys-trurisk-part-1</loc>
		<lastmod>2022-12-16T12:30:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/patch-management/2022/12/02/the-9th-chrome-zero-day-this-year-again-just-before-the-weekend</loc>
		<lastmod>2025-05-02T12:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/12/01/out-of-band-detections-using-qualys-periscope</loc>
		<lastmod>2022-12-06T20:55:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/11/30/effective-vulnerability-management-with-ssvc-and-qualys-trurisk</loc>
		<lastmod>2023-05-22T03:50:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/11/30/race-condition-in-snap-confines-must_mkdir_and_open_with_perms-cve-2022-3328</loc>
		<lastmod>2022-12-22T13:30:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/11/30/qualys-broadens-security-offerings-for-oracle-cloud-infrastructure</loc>
		<lastmod>2025-05-02T09:17:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/patch-management/2022/11/29/dont-spend-your-holiday-season-patching-chrome</loc>
		<lastmod>2022-11-29T18:26:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2022/11/22/ease-your-cybersecurity-maturity-model-certification-journey-with-qualys</loc>
		<lastmod>2022-11-22T18:27:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2022/11/14/qsc-2022-thats-a-wrap</loc>
		<lastmod>2025-03-18T06:42:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2022/11/14/qsc-2022-listening-to-the-voice-of-the-customer</loc>
		<lastmod>2022-11-16T22:01:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/11/10/qsc-2022-qualys-threat-research-unit-tru-our-shield-is-your-shield</loc>
		<lastmod>2022-11-16T22:01:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2022/11/10/qsc-2022-day-1-recap-qualys-gives-organizations-more-security-in-an-ever-expanding-threat-landscape</loc>
		<lastmod>2025-05-15T05:21:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2022/11/09/qsc-2022-kickoff-quantifying-and-qualifying-digital-cyber-risks</loc>
		<lastmod>2022-11-16T22:01:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/11/08/november-2022-patch-tuesday</loc>
		<lastmod>2023-02-06T09:55:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2022/11/08/get-your-patch-tuesday-vulnerabilities-patched-on-tuesday</loc>
		<lastmod>2022-11-17T00:31:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/11/03/openssl-vulnerability-recap</loc>
		<lastmod>2022-12-22T12:52:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/11/01/why-is-snapshot-scanning-not-enough</loc>
		<lastmod>2025-05-02T08:46:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/11/01/introducing-totalcloud-cloud-security-simplified</loc>
		<lastmod>2025-05-02T08:34:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/10/31/qualys-research-alert-prepare-for-a-critical-vulnerability-in-openssl-3-0</loc>
		<lastmod>2026-02-24T08:34:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/10/28/chrome-zero-day-cve-2022-3723</loc>
		<lastmod>2022-12-22T12:45:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/10/27/october-2022-threat-thursday</loc>
		<lastmod>2025-05-02T08:55:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/10/27/text4shell-detect-prioritize-and-remediate-the-risk-across-on-premise-cloud-container-environment-using-qualys-platform</loc>
		<lastmod>2023-01-20T11:45:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/10/25/fingerprinting-web-applications-and-apis-using-qualys-web-application-scanning</loc>
		<lastmod>2022-11-03T23:20:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/10/25/leeloo-multipath-authorization-bypass-and-symlink-attack-in-multipathd-cve-2022-41974-and-cve-2022-41973</loc>
		<lastmod>2022-12-21T10:14:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2022/10/25/cve-2022-44889-detect-text4shell</loc>
		<lastmod>2023-01-20T11:55:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/10/17/cisa-bod-23-01-meeting-and-exceeding-cisa-requirements-with-qualys</loc>
		<lastmod>2022-12-19T10:02:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/10/13/not-your-average-fim-why-customers-choose-qualys-fim</loc>
		<lastmod>2022-12-19T08:18:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2022/10/12/creating-awareness-of-external-javascript-libraries-in-web-applications</loc>
		<lastmod>2022-11-16T23:54:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/10/12/award-winning-qualys-vulnerability-and-compliance-solution-now-available-on-ibm-zsystems-linuxone</loc>
		<lastmod>2023-01-17T12:59:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2022/10/11/json-web-token-jwt-weaknesses</loc>
		<lastmod>2022-11-16T23:53:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/10/11/october-2022-patch-tuesday</loc>
		<lastmod>2023-02-06T09:53:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2022/10/10/in-depth-look-into-data-driven-science-behind-qualys-trurisk</loc>
		<lastmod>2026-02-24T09:23:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/10/07/nsa-alert-topmost-cves-actively-exploited-by-peoples-republic-of-china-state-sponsored-cyber-actors</loc>
		<lastmod>2023-01-20T12:30:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/10/05/qualys-performance-tuning-series-remove-stale-assets-for-best-performance</loc>
		<lastmod>2024-07-29T15:01:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2022/10/03/whatsapp-fixed-critical-vulnerabilities-that-could-let-an-attacker-hack-devices-remotely-automatically-discover-and-remediate-using-vmdr-mobile</loc>
		<lastmod>2023-01-20T12:01:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/09/30/qualys-response-to-proxynotshell-microsoft-exchange-server-zero-day-threat-using-qualys-platform</loc>
		<lastmod>2025-03-27T11:32:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/09/30/spelunking-your-qualys-data-with-splunk</loc>
		<lastmod>2025-05-02T08:57:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/09/29/september-2022-threat-thursday</loc>
		<lastmod>2022-10-28T01:49:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/09/28/remediate-your-vulnerable-lenovo-systems-with-qualys-custom-assessment-and-remediation</loc>
		<lastmod>2022-12-20T07:11:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/09/28/optimizing-a-web-application-security-scan-for-bwapp</loc>
		<lastmod>2025-09-19T09:47:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/09/27/prepare-your-organization-for-compliance-with-the-nydfs-cybersecurity-regulation</loc>
		<lastmod>2022-09-28T05:41:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2022/09/20/why-organizations-struggle-with-patch-management-and-what-to-do-about-it</loc>
		<lastmod>2022-12-21T09:52:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/09/13/september-2022-patch-tuesday</loc>
		<lastmod>2023-02-06T08:23:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2022/09/08/let-smart-automation-reduce-the-risk-of-zero-day-attacks-on-third-party-applications-2</loc>
		<lastmod>2022-12-21T10:21:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/09/01/introducing-qualys-threat-research-thursdays</loc>
		<lastmod>2022-10-27T18:10:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/08/31/an-end-to-end-approach-to-next-gen-security-for-web-applications-apis</loc>
		<lastmod>2022-12-14T10:49:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/08/23/mitigating-the-risk-of-zero-day-vulnerabilities-by-using-compensating-controls</loc>
		<lastmod>2022-12-21T07:22:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/08/22/qualys-vmdr-recognized-as-best-vm-solution-by-sc-awards-2022-leader-by-gigaom</loc>
		<lastmod>2022-12-21T09:59:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2022/08/17/atlassian-confluence-questions-for-confluence-app-hardcoded-credentials-cve-2022-26138</loc>
		<lastmod>2022-12-19T10:48:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/08/16/asyncrat-c2-framework-overview-technical-analysis-and-detection</loc>
		<lastmod>2022-12-22T12:59:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/08/15/qualys-security-updates-cloud-agent-for-linux</loc>
		<lastmod>2025-05-02T09:20:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/08/09/august-2022-patch-tuesday</loc>
		<lastmod>2023-02-06T10:00:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/08/09/know-your-servicenow-and-qualys-integrations</loc>
		<lastmod>2026-02-24T09:15:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2022/08/08/a-deep-dive-into-vmdr-2-0-with-qualys-trurisk</loc>
		<lastmod>2023-09-13T07:56:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/08/05/qualys-api-best-practices-cybersecurity-asset-management-api</loc>
		<lastmod>2025-05-14T14:30:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/08/03/introducing-cybersecurity-asset-management-2-0-with-natively-integrated-external-attack-surface-management</loc>
		<lastmod>2022-12-22T13:15:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/08/01/heres-a-simple-script-to-detect-the-stealthy-nation-state-bpfdoor</loc>
		<lastmod>2022-12-22T12:23:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/07/29/new-qualys-research-report-evolution-of-quasar-rat</loc>
		<lastmod>2022-07-29T17:55:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2022/07/28/attack-surface-management-a-critical-pillar-of-cybersecurity-asset-management</loc>
		<lastmod>2026-02-26T08:17:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2022/07/27/join-qualys-at-black-hat-usa-2022</loc>
		<lastmod>2025-03-13T07:09:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2022/07/26/aflac-completes-successful-poc-of-qualys-vmdr-2-0-with-trurisk</loc>
		<lastmod>2022-12-19T13:06:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/07/25/integrating-jira-to-the-qualys-cloud-platfrom</loc>
		<lastmod>2025-05-02T12:05:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/07/20/use-qualys-flow-to-automate-detection-remediation-with-no-code-workflows</loc>
		<lastmod>2022-12-12T12:46:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/07/12/july-2022-patch-tuesday</loc>
		<lastmod>2023-02-06T08:10:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/07/11/qualys-cmdb-sync-integration</loc>
		<lastmod>2022-12-21T10:11:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/07/11/how-to-quickly-prioritize-risks-with-vmdr-2-0-and-orchestrate-response-with-cmdb-itsm-integration</loc>
		<lastmod>2022-12-20T12:23:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2022/06/29/atlassian-confluence-ognl-injection-remote-code-execution-rce-vulnerability-cve-2022-26134</loc>
		<lastmod>2026-02-24T09:28:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/06/22/risk-based-remediation-powered-by-patch-management-in-qualys-vmdr-2-0</loc>
		<lastmod>2025-07-30T08:04:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/06/20/defending-against-scheduled-task-attacks-in-windows-environments</loc>
		<lastmod>2025-04-22T04:44:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/06/15/new-qualys-research-report-inside-a-redline-infostealer-campaign</loc>
		<lastmod>2022-06-15T21:46:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/06/14/detect-the-follina-msdt-vulnerability-cve-2022-30190-with-qualys-multi-vector-edr-context-xdr</loc>
		<lastmod>2026-03-16T09:25:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/06/14/june-2022-patch-tuesday</loc>
		<lastmod>2025-03-27T12:01:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/06/07/close-the-gap-between-it-security-with-our-new-app-qualys-vmdr-for-itsm</loc>
		<lastmod>2025-06-10T15:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/06/06/introducing-qualys-vmdr-2-0</loc>
		<lastmod>2023-09-13T08:04:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/05/26/qualys-fim-be-compliance-ready-with-intuitive-ready-to-use-file-monitoring-profiles</loc>
		<lastmod>2022-12-19T10:18:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/05/20/put-secops-in-the-drivers-seat-with-custom-assessment-and-remediation</loc>
		<lastmod>2022-12-19T11:10:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/05/16/how-to-get-useful-monitoring-of-file-level-security</loc>
		<lastmod>2022-12-16T09:53:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/05/10/may-2022-patch-tuesday</loc>
		<lastmod>2023-02-06T07:59:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/05/08/ursnif-malware-banks-on-news-events-for-phishing-attacks</loc>
		<lastmod>2022-12-23T06:53:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2022/05/06/cisa-alert-top-15-routinely-exploited-vulnerabilities</loc>
		<lastmod>2022-12-21T12:42:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2022/05/04/ransomware-insights-from-the-fbi-2021-internet-crime-report</loc>
		<lastmod>2022-12-20T07:56:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/04/21/assessing-certificate-risk-with-qualys-vmdr</loc>
		<lastmod>2022-12-20T05:38:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/04/20/implications-of-windows-subsystem-for-linux-for-adversaries-defenders-part-2</loc>
		<lastmod>2022-12-22T05:36:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/04/12/april-2022-patch-tuesday</loc>
		<lastmod>2023-02-06T07:57:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/04/04/edr-is-dead-long-live-multi-vector-edr</loc>
		<lastmod>2025-06-23T13:52:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/03/31/qualys-multi-vector-edr-excels-in-2022-mitre-attck-evaluation</loc>
		<lastmod>2022-12-21T13:03:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/03/31/spring-framework-zero-day-remote-code-execution-spring4shell-vulnerability</loc>
		<lastmod>2025-03-27T11:53:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/03/22/implications-of-windows-subsystem-for-linux-for-adversaries-defenders-part-1</loc>
		<lastmod>2025-05-14T12:57:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/03/18/infographic-log4shell-vulnerability-impact-by-the-numbers</loc>
		<lastmod>2022-12-22T05:45:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2022/03/18/qualys-study-reveals-how-enterprises-responded-to-log4shell</loc>
		<lastmod>2025-03-27T12:34:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/03/09/casdoor-sql-injection-cve-2022-24124</loc>
		<lastmod>2022-12-22T12:49:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/03/08/march-2022-patch-tuesday</loc>
		<lastmod>2023-02-06T07:34:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/03/06/avoslocker-ransomware-behavior-examined-on-windows-linux</loc>
		<lastmod>2022-12-23T07:53:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/03/01/ukrainian-targets-hit-by-hermeticwiper-new-datawiper-malware</loc>
		<lastmod>2022-12-22T13:23:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2022/02/26/russia-ukraine-crisis-how-to-strengthen-your-security-posture-to-protect-against-cyber-attack-based-on-cisa-guidelines</loc>
		<lastmod>2025-05-02T09:06:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/02/24/meet-fedramp-compliance-with-qualys-cloud-platform</loc>
		<lastmod>2026-03-16T09:27:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/02/23/enhanced-native-dns-based-scanning-with-qualys-vmdr</loc>
		<lastmod>2025-05-02T09:15:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/02/22/managing-cisa-known-exploited-vulnerabilities-with-qualys-vmdr</loc>
		<lastmod>2022-12-22T05:27:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/02/17/oh-snap-more-lemmings-local-privilege-escalation-vulnerability-discovered-in-snap-confine-cve-2021-44731</loc>
		<lastmod>2022-12-23T11:45:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2022/02/15/the-unbearable-lightness-of-unaudited-supply-chains</loc>
		<lastmod>2022-02-16T07:20:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/02/08/microsoft-adobe-17-vulnerabilities-with-5-critical</loc>
		<lastmod>2022-12-23T05:08:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/02/08/lolzarus-lazarus-group-incorporating-lolbins-into-campaigns</loc>
		<lastmod>2022-12-23T08:09:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/02/02/catching-the-rat-called-agent-tesla</loc>
		<lastmod>2022-12-23T08:21:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/02/01/vulnerability-remediation-its-not-just-patching</loc>
		<lastmod>2026-02-24T10:52:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/01/27/simplifying-cloud-asset-identification-in-a-multi-cloud-environment</loc>
		<lastmod>2025-05-02T08:41:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/01/25/pwnkit-local-privilege-escalation-vulnerability-discovered-in-polkits-pkexec-cve-2021-4034</loc>
		<lastmod>2025-04-22T04:51:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/01/17/the-chaos-ransomware-can-be-ravaging</loc>
		<lastmod>2022-12-21T12:00:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/01/14/automating-agent-less-vulnerability-assessment-for-intune-enrolled-mobile-devices</loc>
		<lastmod>2022-12-21T11:49:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/01/11/microsoft-adobe-patch-tuesday-january-2022-microsoft-126-vulnerabilities-with-9-critical-adobe-41-vulnerabilities-22-critical</loc>
		<lastmod>2025-05-02T12:23:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2022/01/11/how-to-make-log4shell-remediation-quick-effective</loc>
		<lastmod>2022-12-23T08:03:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2022/01/06/emotet-re-emerges-with-help-from-trickbot</loc>
		<lastmod>2022-12-21T13:07:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2022/01/05/mitigation-of-supply-chain-risks-in-microsoft-365</loc>
		<lastmod>2022-01-07T18:45:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2021/12/28/log4shell-follow-this-multi-layered-approach-for-detection-and-remediation</loc>
		<lastmod>2025-05-02T12:07:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/12/27/how-to-discover-log4shell-vulnerabilities-in-running-containers-images</loc>
		<lastmod>2022-12-13T08:12:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/12/20/qualys-integrates-with-shodan-to-help-map-the-external-attack-surface</loc>
		<lastmod>2022-12-23T05:37:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/12/20/new-options-profiles-for-log4shell-detection</loc>
		<lastmod>2022-12-21T11:29:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/12/19/5-ways-to-quickly-detect-a-log4shell-exploit-in-your-environment</loc>
		<lastmod>2025-03-27T12:32:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2021/12/17/out-of-band-detection-for-log4shell</loc>
		<lastmod>2022-12-23T11:47:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/12/15/is-your-web-application-exploitable-by-log4shell-cve-2021-44228-vulnerability</loc>
		<lastmod>2026-02-25T08:03:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/12/14/log4shell-exploit-detection-and-response-with-qualys-multi-vector-edr</loc>
		<lastmod>2025-04-14T07:49:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/12/14/microsoft-adobe-patch-tuesday-december-2021-microsoft-83-vulnerabilities-with-7-critical-1-actively-exploited-adobe-60-vulnerabilities-28-critical</loc>
		<lastmod>2025-05-02T13:07:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2021/12/13/developing-a-repeatable-and-sustainable-security-exploitable-risk-reporting-program</loc>
		<lastmod>2023-02-06T10:04:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/12/10/apache-log4j2-zero-day-exploited-in-the-wild-log4shell</loc>
		<lastmod>2025-07-30T09:33:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/12/09/ransomware-ranzy-locker</loc>
		<lastmod>2021-12-10T06:16:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2021/11/22/euronet-worldwide-speedy-global-response-to-threats-reduces-risk</loc>
		<lastmod>2021-12-01T17:57:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/11/18/conti-ransomware</loc>
		<lastmod>2022-12-23T04:53:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/qualys-security-conference/2021/11/18/qsc21-day-1-recap-as-threats-intensify-qualys-helps-organizations-shore-up-security</loc>
		<lastmod>2025-05-02T12:09:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2021/11/17/security-automation-critical-to-the-digital-journey</loc>
		<lastmod>2021-12-01T17:57:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/11/10/microsoft-adobe-patch-tuesday-november-2021-microsoft-55-vulnerabilities-with-6-critical-6-zero-days-adobe-4-vulnerabilities</loc>
		<lastmod>2022-12-19T11:01:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/11/08/qualys-response-to-cisa-alert-binding-operational-directive-22-01</loc>
		<lastmod>2022-12-13T12:35:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2021/11/02/cspm-evolution-start-secure-stay-secure</loc>
		<lastmod>2022-12-19T07:22:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/10/27/apache-http-server-path-traversal-remote-code-execution-cve-2021-41773-cve-2021-42013</loc>
		<lastmod>2025-04-22T04:47:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/10/27/apache-tomcat-http-request-smuggling-vulnerability-cve-2021-33037</loc>
		<lastmod>2025-03-13T07:07:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/10/24/vulnerability-on-demand-search-reporting-easy-download-options</loc>
		<lastmod>2021-10-25T05:00:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/10/18/apple-fixes-zero-day-in-ios-and-ipados-15-0-2-emergency-release-detect-and-prioritize-vulnerabilities-using-vmdr-for-mobile-devices</loc>
		<lastmod>2022-10-17T19:57:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2021/10/13/microsoft-adobe-patch-tuesday-october-2021-microsoft-74-vulnerabilities-with-3-critical-4-zero-days-adobe-10-vulnerabilities</loc>
		<lastmod>2022-10-28T01:55:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/10/13/tenacity-2-0-emulating-threat-groups</loc>
		<lastmod>2021-10-13T12:41:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2021/10/10/from-technical-features-to-customer-security-metrics</loc>
		<lastmod>2021-10-14T18:09:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2021/10/05/the-rise-of-ransomware</loc>
		<lastmod>2022-12-20T12:15:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2021/10/05/assess-risk-ransomware-attacks-qualys-research</loc>
		<lastmod>2025-03-27T12:38:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/09/29/qid-spotlight-discover-azul-java-vulnerabilities</loc>
		<lastmod>2021-09-29T20:55:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/09/29/apple-fixed-nso-pegasus-iphone-spyware-vulnerabilities-in-ios-ipados-12-5-5-for-old-iphones-and-fixed-more-vulnerabilities-in-ios-ipados-15-0-detect-prioritize-using-vmdr-for-mobile-devices</loc>
		<lastmod>2022-12-19T10:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2021/09/27/prioritize-remediation-with-a-perceived-risk-approach-to-strengthen-cybersecurity-effectiveness</loc>
		<lastmod>2021-09-27T16:23:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/09/21/apache-struts-2-double-ognl-evaluation-vulnerability-cve-2020-17530</loc>
		<lastmod>2026-02-24T08:32:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2021/09/20/improving-cybersecurity-practices-by-managing-the-asset-lifecycle</loc>
		<lastmod>2022-12-20T10:45:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/09/20/detect-prioritize-nso-pegasus-iphone-spyware-vulnerabilities-using-vmdr-for-mobile-devices</loc>
		<lastmod>2022-10-17T19:58:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/09/20/google-android-september-2021-security-patch-vulnerabilities-discover-and-take-remote-response-action-using-vmdr-for-mobile-devices</loc>
		<lastmod>2022-10-17T19:58:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/09/14/microsoft-and-adobe-patch-tuesday-september-2021-microsoft-60-vulnerabilities-with-3-critical-adobe-61-vulnerabilities</loc>
		<lastmod>2022-10-28T01:55:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2021/09/14/optimize-vulnerability-remediation-with-zero-touch-patch</loc>
		<lastmod>2022-12-20T08:11:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/08/13/google-android-august-2021-security-patch-vulnerabilities-discover-and-take-remote-response-action-using-vmdr-for-mobile-devices</loc>
		<lastmod>2022-10-17T19:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/08/10/microsoft-and-adobe-patch-tuesday-august-2021-microsoft-51-vulnerabilities-with-7-critical-adobe-29-vulnerabilities</loc>
		<lastmod>2022-10-28T01:55:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/08/05/tenacity-an-adversary-emulation-tool-for-persistence</loc>
		<lastmod>2021-09-09T19:49:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2021/08/04/qualys-research-wins-two-2021-pwnie-awards</loc>
		<lastmod>2021-08-05T01:44:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2021/08/03/securing-red-hat-coreos-on-openshift-with-qualys</loc>
		<lastmod>2022-12-21T12:18:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2021/08/02/qualys-research-nominated-for-pwnie-awards-2021</loc>
		<lastmod>2021-08-02T22:47:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2021/07/31/top-black-hat-usa-sessions-for-qualys-customers</loc>
		<lastmod>2021-07-31T16:12:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/07/28/cisa-alert-top-routinely-exploited-vulnerabilities</loc>
		<lastmod>2022-12-20T09:37:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/07/28/ios-and-ipados-14-7-and-14-7-1-security-update-discover-vulnerabilities-and-take-remote-response-action-using-vmdr-for-mobile-devices</loc>
		<lastmod>2022-10-17T19:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/07/23/protect-your-devices-from-pegasus-spyware-using-vmdr-for-mobile-devices-proactive-approach</loc>
		<lastmod>2025-05-14T13:36:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/07/20/cve-2021-33910-denial-of-service-stack-exhaustion-in-systemd-pid-1</loc>
		<lastmod>2022-12-20T08:26:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/07/20/sequoia-a-local-privilege-escalation-vulnerability-in-linuxs-filesystem-layer-cve-2021-33909</loc>
		<lastmod>2022-12-23T06:02:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/07/13/google-android-july-2021-security-patch-vulnerabilities-discover-and-take-remote-response-action-using-vmdr-for-mobile-devices</loc>
		<lastmod>2022-10-17T19:59:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/07/13/microsoft-and-adobe-patch-tuesday-july-2021-microsoft-117-vulnerabilities-with-13-critical-adobe-26-vulnerabilities</loc>
		<lastmod>2022-10-28T01:55:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2021/07/09/qualys-api-best-practices-host-list-detection</loc>
		<lastmod>2024-11-19T22:04:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2021/07/08/kaseya-revil-ransomware-attack-cve-2021-30116-automatically-discover-and-prioritize-using-qualys-vmdr</loc>
		<lastmod>2022-12-19T10:43:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/07/07/analyzing-the-revil-ransomware-attack</loc>
		<lastmod>2026-02-24T08:31:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/07/07/microsoft-windows-print-spooler-rce-vulnerability-printnightmare-cve-2021-34527-automatically-discover-prioritize-and-remediate-using-qualys-vmdr</loc>
		<lastmod>2022-12-22T13:05:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/06/09/darkside-ransomware</loc>
		<lastmod>2022-12-23T07:50:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/06/08/microsoft-adobe-patch-tuesday-june-2021-microsoft-50-vulnerabilities-with-5-critical-adobe-21-critical-vulnerabilities</loc>
		<lastmod>2022-10-28T01:55:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2021/05/25/windows-registry-integrity-monitoring-with-qualys-fim</loc>
		<lastmod>2022-12-20T10:31:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2021/05/24/reinforce-defense-with-file-reputation-and-trusted-source-intelligence-in-qualys-fim</loc>
		<lastmod>2021-05-24T10:04:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2021/05/18/reinventing-asset-management-for-security</loc>
		<lastmod>2022-12-19T10:22:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2021/05/18/introducing-cybersecurity-asset-management</loc>
		<lastmod>2025-05-14T14:29:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/05/12/nefilim-ransomware</loc>
		<lastmod>2026-02-24T10:30:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/05/11/may-2021-patch-tuesday</loc>
		<lastmod>2022-10-28T01:55:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/05/10/google-android-may-2021-security-patch-vulnerabilities-discover-and-take-remote-response-action-using-vmdr-for-mobile-devices</loc>
		<lastmod>2022-10-17T19:59:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/05/04/21nails-multiple-vulnerabilities-in-exim-mail-server</loc>
		<lastmod>2022-12-21T12:33:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2021/05/03/the-convergence-of-endpoint-protection-with-detection-response</loc>
		<lastmod>2021-05-03T06:21:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2021/04/28/ios-and-ipados-14-5-security-update-vulnerabilities-discover-and-take-remote-response-action-using-vmdr-for-mobile-devices</loc>
		<lastmod>2022-10-17T19:59:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/04/22/whatsapp-vulnerabilities-automatically-discover-and-remediate-using-vmdr-for-mobile-devices</loc>
		<lastmod>2022-10-17T19:59:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2021/04/21/manage-linux-patching-with-qualys-patch-management</loc>
		<lastmod>2022-12-20T08:22:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/04/14/april-2021-patch-tuesday-108-vulnerabilities-19-critical-adobe</loc>
		<lastmod>2022-10-28T01:55:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2021/04/14/qualys-api-best-practices-host-list-api</loc>
		<lastmod>2022-12-22T13:38:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2021/04/13/introducing-this-month-in-patches-webinar-series</loc>
		<lastmod>2025-05-02T09:21:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/04/12/google-android-april-2021-security-patch-vulnerabilities-discover-and-take-remote-response-action-using-vmdr-for-mobile-devices</loc>
		<lastmod>2022-10-17T19:56:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2021/04/08/frictionless-database-security-and-compliance</loc>
		<lastmod>2022-12-19T07:05:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/04/02/qualys-update-on-accellion-fta-security-incident</loc>
		<lastmod>2025-05-14T13:59:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2021/04/01/assessing-mainframe-compliance-while-minimizing-operational-impact</loc>
		<lastmod>2022-12-19T10:34:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2021/03/31/extending-your-fedramp-program-to-containers-with-the-qualys-cloud-platform</loc>
		<lastmod>2025-05-14T14:28:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2021/03/23/unified-dashboard</loc>
		<lastmod>2026-02-24T07:08:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2021/03/22/qualys-leadership-update-moving-forward-together</loc>
		<lastmod>2025-03-27T12:24:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2021/03/10/security-advisory-mitigating-the-risk-of-microsoft-exchange-zero-day-proxylogon-vulnerabilities</loc>
		<lastmod>2025-05-02T12:13:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/03/09/march-2021-patch-tuesday-82-vulnerabilities-10-critical-adobe</loc>
		<lastmod>2022-10-28T01:55:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/03/03/microsoft-exchange-server-zero-days-automatically-discover-prioritize-and-remediate-using-qualys-vmdr</loc>
		<lastmod>2022-12-19T13:29:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2021/03/02/qualys-api-best-practices-knowledgebase-api</loc>
		<lastmod>2022-12-23T05:32:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2021/02/10/qualys-extends-vmdr-to-android-and-ios-ipados-devices</loc>
		<lastmod>2022-10-17T19:59:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/02/09/february-2021-patch-tuesday-56-vulnerabilities-11-critical-adobe</loc>
		<lastmod>2022-10-28T01:55:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2021/02/03/unified-saas-application-security-detection-and-response</loc>
		<lastmod>2024-02-07T06:53:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/02/01/unpacking-the-fireeye-breach-start-here-first</loc>
		<lastmod>2021-09-22T00:22:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/01/26/cve-2021-3156-heap-based-buffer-overflow-in-sudo-baron-samedit</loc>
		<lastmod>2025-07-30T09:36:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2021/01/26/dive-deep-into-vmdr-2</loc>
		<lastmod>2021-01-25T20:51:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2021/01/25/the-evolution-of-the-qualys-cloud-platform</loc>
		<lastmod>2021-08-19T21:13:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2021/01/25/building-an-open-cloud-platform</loc>
		<lastmod>2021-08-19T21:14:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2021/01/21/unified-vulnerability-view-of-unauthenticated-and-agent-scans</loc>
		<lastmod>2023-06-13T23:00:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/01/12/january-2021-patch-tuesday-83-vulnerabilities-10-critical-one-zero-day-adobe</loc>
		<lastmod>2022-10-28T01:55:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2021/01/04/technical-deep-dive-into-solarwinds-breach</loc>
		<lastmod>2022-12-21T11:02:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2020/12/22/qualys-security-advisory-solarwinds-fireeye</loc>
		<lastmod>2025-05-02T09:00:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2020/12/21/adobe-flash-player-reaches-end-of-life-on-december-31-2020</loc>
		<lastmod>2026-02-24T08:31:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2020/12/14/fireeye-breach-leveraged-solarwinds-orion-software</loc>
		<lastmod>2020-12-24T08:50:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/12/14/support-live-chat</loc>
		<lastmod>2020-12-16T20:36:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/12/10/qid-spotlight-enhanced-oracle-java-discovery</loc>
		<lastmod>2025-05-14T07:57:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2020/12/09/theft-of-cybersecurity-tools-fireeye-breach</loc>
		<lastmod>2021-01-05T22:49:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2020/12/08/december-2020-patch-tuesday-58-vulnerabilities-9-critical-windows-exchange-hyper-v-sharepoint-adobe</loc>
		<lastmod>2022-10-28T01:55:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2020/11/25/qualys-research-nominated-for-pwnie-awards-2020</loc>
		<lastmod>2020-11-25T02:00:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/11/16/an-end-to-end-approach-to-next-gen-web-application-and-api-security</loc>
		<lastmod>2022-12-19T10:38:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/11/16/securing-containers-in-google-cloud-artifact-registry-with-qualys</loc>
		<lastmod>2020-11-16T17:17:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/11/16/a-modern-approach-to-risk-management-and-compliance</loc>
		<lastmod>2021-01-27T21:43:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/11/11/edr-solutions-require-comprehensive-telemetry-to-fend-off-multi-vector-attacks</loc>
		<lastmod>2021-08-19T21:32:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2020/11/10/november-2020-patch-tuesday-112-vulnerabilities-17-critical-windows-codecs-network-file-system-workstation-adobe</loc>
		<lastmod>2022-10-28T01:55:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/10/22/nsa-alert-chinese-state-sponsored-actors-exploit-known-vulnerabilities</loc>
		<lastmod>2020-12-03T03:20:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/10/16/qualys-policy-compliance-plugin-for-jenkins-now-available</loc>
		<lastmod>2020-10-16T03:54:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/10/15/auto-discover-and-secure-middleware-instances-in-your-environment</loc>
		<lastmod>2020-10-16T09:49:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/10/14/microsoft-windows-tcp-ip-remote-code-execution-vulnerability-cve-2020-16898-automatically-discover-prioritize-and-remediate-using-qualys-vmdr</loc>
		<lastmod>2020-10-23T00:25:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2020/10/14/discover-a10-networks-advance-core-os-vulnerabilities-using-qualys-vmdr</loc>
		<lastmod>2020-10-15T22:24:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2020/10/13/october-2020-patch-tuesday-87-vulnerabilities-11-critical-sharepoint-tcp-ip-stack-graphics-adobe-vulns</loc>
		<lastmod>2022-10-28T01:55:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/10/05/ensure-your-vmware-virtual-machines-are-instrumented-for-security-and-compliance</loc>
		<lastmod>2020-10-01T18:42:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/10/02/detecting-http-request-smuggling-with-qualys-was</loc>
		<lastmod>2025-03-12T10:05:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/09/22/pan-os-critical-buffer-overflow-vulnerability-cve-2020-2040-automatically-discover-prioritize-and-remediate-using-qualys-vmdr</loc>
		<lastmod>2020-09-22T19:29:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2020/09/16/vulnerability-detection-pipeline-beta</loc>
		<lastmod>2022-12-21T10:17:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2020/09/15/microsoft-netlogon-vulnerability-cve-2020-1472-zerologon-automatically-discover-prioritize-and-remediate-using-qualys-vmdr</loc>
		<lastmod>2026-03-16T09:23:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/09/15/discover-gentoo-linux-vulnerabilities-using-qualys-vmdr</loc>
		<lastmod>2020-09-15T16:09:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2020/09/08/september-2020-patch-tuesday-129-vulnerabilities-23-critical-sharepoint-exchange-windows-codecs-adobe-vulns</loc>
		<lastmod>2022-10-28T01:55:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2020/09/04/detect-fritzfrog-and-other-malware-infections-with-inventory-data</loc>
		<lastmod>2020-09-08T21:02:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2020/09/01/discover-euleros-vulnerabilities-using-qualys-vmdr</loc>
		<lastmod>2020-09-01T21:37:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/08/26/meow-attack-a-reminder-for-organizations-to-identify-and-secure-their-databases</loc>
		<lastmod>2020-08-26T18:44:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/08/18/automated-discovery-and-assessment-of-paas-databases-with-lambda-service-for-qualys-policy-compliance</loc>
		<lastmod>2022-12-19T11:09:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2020/08/11/august-2020-patch-tuesday-120-vulnerabilities-17-critical-media-foundation-windows-codecs-workstation-adobe</loc>
		<lastmod>2022-10-28T01:55:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/08/10/continuous-monitoring-and-beyond</loc>
		<lastmod>2022-12-07T15:52:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/08/04/join-us-at-black-hat-usa-2020</loc>
		<lastmod>2025-05-02T09:08:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2020/08/03/grub2-boothole-buffer-overflow-vulnerability-cve-2020-10713-automatically-discover-prioritize-and-remediate-using-qualys-vmdr</loc>
		<lastmod>2020-08-04T01:16:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2020/07/20/automatically-discover-prioritize-and-remediate-windows-dns-vulnerability-cve-2020-1350-using-qualys-vmdr</loc>
		<lastmod>2020-08-03T21:54:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2020/07/14/july-2020-patch-tuesday-123-vulnerabilities-18-critical-hyper-v-remotefx-dns-server-workstation-adobe</loc>
		<lastmod>2022-10-28T01:55:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2020/07/06/f5-big-ip-remote-code-execution-vulnerability-cve-2020-5902</loc>
		<lastmod>2025-09-22T06:24:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/07/02/add-ergonomic-security-to-your-ci-cd-pipeline</loc>
		<lastmod>2022-12-19T12:42:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2020/06/24/ripple20-multiple-vulnerabilities-identified-in-treck-tcp-ip-stack</loc>
		<lastmod>2022-12-21T06:30:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2020/06/10/secure-your-global-remote-workforce</loc>
		<lastmod>2025-05-15T05:07:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2020/06/09/june-2020-patch-tuesday-128-vulns-11-critical-sharepoint-workstation-adobe-patches</loc>
		<lastmod>2022-10-28T01:55:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/06/03/product-api-library-notifications-move-to-notifications-qualys-com</loc>
		<lastmod>2020-09-07T06:04:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/05/29/nsa-announces-sandworm-actors-exploiting-exim-mta-vulnerability-cve-2019-10149</loc>
		<lastmod>2020-09-07T06:43:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/05/29/the-european-cybersecurity-blogger-awards-2020-meet-the-finalists</loc>
		<lastmod>2020-09-07T05:43:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2020/05/20/verizon-data-breach-investigations-report-2020</loc>
		<lastmod>2020-09-07T06:18:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2020/05/12/may-2020-patch-tuesday-111-vulns-16-critical-sharepoint-vs-code-adobe-patches</loc>
		<lastmod>2022-10-28T01:55:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/05/07/qualys-community-migration-to-salesforce-platform</loc>
		<lastmod>2020-09-07T05:43:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2020/04/14/april-2020-patch-tuesday-113-vulns-19-critical-0-day-patches-sharepoint-adobe-coldfusion</loc>
		<lastmod>2022-10-28T01:55:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2020/04/06/secure-remote-endpoints-from-vulnerabilities-in-video-conferencing-productivity-applications-like-zoom</loc>
		<lastmod>2020-08-10T17:10:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/04/01/qualys-cloud-platform-10-0-new-features</loc>
		<lastmod>2020-09-07T06:04:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/04/01/stay-on-top-of-detections-with-real-time-alerts-in-qualys-file-integrity-monitoring</loc>
		<lastmod>2020-09-07T06:04:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2020/03/30/secure-elasticsearch-kafka-other-microservices-with-qualys-cloud-platform</loc>
		<lastmod>2020-09-07T06:04:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2020/03/25/automatically-discover-prioritize-and-remediate-windows-adobe-type-manager-library-remote-code-execution-vulnerability-adv200006-using-qualys-vmdr</loc>
		<lastmod>2020-09-07T06:43:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/03/24/how-to-install-the-qualys-cloud-agent-for-remote-workforce</loc>
		<lastmod>2022-12-23T07:40:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2020/03/23/microsoft-released-out-of-band-advisory-microsoft-windows-adobe-type-manager-library-remote-code-execution-vulnerability-adv200006</loc>
		<lastmod>2022-10-13T01:36:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2020/03/18/cyber-criminals-using-coronavirus-fears-to-spread-information-stealing-malware</loc>
		<lastmod>2020-09-07T06:04:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2020/03/17/qualys-cloud-platform-continuity-of-service-covid-19</loc>
		<lastmod>2020-09-07T05:43:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2020/03/16/automatically-discover-prioritize-and-remediate-microsoft-smbv3-rce-vulnerability-cve-2020-0796-using-qualys-vmdr</loc>
		<lastmod>2020-09-07T06:43:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/03/16/automated-and-scalable-audit-workflows-with-qualys-security-assessment-questionnaire</loc>
		<lastmod>2020-09-07T06:04:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2020/03/11/microsoft-windows-smbv3-remote-code-execution-vulnerability-cve-2020-0796</loc>
		<lastmod>2026-02-24T09:24:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/03/10/detect-apache-tomcat-ajp-file-inclusion-vulnerability-cve-2020-1938-using-qualys-was</loc>
		<lastmod>2026-02-24T07:06:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2020/03/10/march-2020-patch-tuesday-115-vulns-26-critical-microsoft-word-and-workstation-patches</loc>
		<lastmod>2022-10-28T01:55:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/03/06/identifying-lets-encrypt-revoked-certificates</loc>
		<lastmod>2020-09-07T06:43:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/03/05/automatically-discover-prioritize-and-remediate-apache-tomcat-ajp-file-inclusion-vulnerability-cve-2020-1938-using-qualys-vmdr</loc>
		<lastmod>2020-09-07T06:43:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/02/13/detections-released-for-esu-updates-on-eol-windows-7-2008-and-2008-r2</loc>
		<lastmod>2020-09-07T06:04:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2020/02/11/february-2020-patch-tuesday-99-vulns-12-critical-patch-for-ie-0-day-exchange-vuln-adobe-vulns</loc>
		<lastmod>2022-10-28T01:55:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/02/10/top-5-reasons-to-attend-qualys-security-conference-2020-san-francisco</loc>
		<lastmod>2025-05-02T09:04:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/02/07/qualys-vm-releases-eol-qids-for-microsoft-windows-7-and-2008-r2</loc>
		<lastmod>2022-12-19T11:05:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/02/04/actionable-searching-and-data-download-with-vulnerability-management-dashboards</loc>
		<lastmod>2021-02-23T23:13:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2020/01/29/openbsd-opensmtpd-remote-code-execution-vulnerability-cve-2020-7247</loc>
		<lastmod>2022-12-19T12:51:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/01/24/wordpress-database-reset-plugin-vulnerability-cve-2020-7047-cve-2020-7048</loc>
		<lastmod>2020-09-07T07:17:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/01/23/detect-day-zero-intrusion-with-qualys-file-integrity-monitoring</loc>
		<lastmod>2020-09-07T06:04:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/01/17/libminer-container-based-cryptocurrency-miner-targeting-unprotected-redis-servers</loc>
		<lastmod>2022-10-25T23:00:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/01/15/introducing-periscope-out-of-band-vulnerability-detection-mechanism-in-qualys-was</loc>
		<lastmod>2026-02-26T08:02:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2020/01/14/microsoft-windows-cryptoapi-spoofing-vulnerability-cve-2020-0601-how-to-detect-and-remediate</loc>
		<lastmod>2022-12-19T09:49:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2020/01/14/january-2020-patch-tuesday-50-vulns-7-critical-adobe-vulns</loc>
		<lastmod>2022-10-28T01:55:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/01/08/citrix-adc-and-gateway-remote-code-execution-vulnerability-cve-2019-19781</loc>
		<lastmod>2020-09-07T07:17:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2020/01/08/the-new-year-calls-for-a-change-in-the-ot-industrys-state-of-security</loc>
		<lastmod>2020-09-07T05:43:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2020/01/06/securing-databases-with-qualys-policy-compliance</loc>
		<lastmod>2022-12-15T10:45:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/12/27/top-19-vulnerability-cves-in-santas-dashboard-tracking</loc>
		<lastmod>2022-10-13T01:55:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/12/20/blue-is-a-color-we-love-but-cant-keep</loc>
		<lastmod>2020-09-07T06:04:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2019/12/11/openbsd-local-privilege-escalation-vulnerability-cve-2019-19726</loc>
		<lastmod>2020-09-07T06:43:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/12/11/cve-2019-11016-open-redirect-vulnerability</loc>
		<lastmod>2022-12-21T11:56:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2019/12/10/december-2019-patch-tuesday-36-vulns-7-critical-actively-attacked-win32k-vuln-adobe-vulns</loc>
		<lastmod>2022-10-28T01:55:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2019/12/04/openbsd-multiple-authentication-vulnerabilities</loc>
		<lastmod>2020-09-07T06:43:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/12/03/streamlining-and-automating-compliance</loc>
		<lastmod>2020-09-07T06:04:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2019/11/20/the-power-and-future-of-the-qualys-cloud-platform</loc>
		<lastmod>2020-09-07T06:04:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2019/11/12/november-2019-patch-tuesday-74-vulns-13-critical-actively-attacked-ie-vuln-hyper-v-escapes-adobe</loc>
		<lastmod>2022-10-28T01:55:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2019/11/04/bluekeep-attacks-observed-months-after-initial-release</loc>
		<lastmod>2020-09-07T06:43:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/10/31/5-reasons-to-attend-qualys-security-conference-2019</loc>
		<lastmod>2020-09-07T05:43:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/10/30/php-remote-code-execution-vulnerability-cve-2019-11043</loc>
		<lastmod>2026-03-16T09:20:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/10/21/new-improved-qualys-was-burp-extension-now-available</loc>
		<lastmod>2022-12-20T08:06:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/10/17/graboid-revenge-of-the-worms</loc>
		<lastmod>2020-09-07T06:18:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/10/11/qualys-vulnerability-signature-release-2-4-722-4-oracle-db-new-feature</loc>
		<lastmod>2020-09-07T06:04:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2019/10/08/october-2019-patch-tuesday</loc>
		<lastmod>2022-10-28T01:55:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/10/07/enhanced-api-scanning-with-postman-support-in-qualys-was</loc>
		<lastmod>2022-12-22T12:40:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2019/09/24/microsoft-releases-out-of-band-security-updates</loc>
		<lastmod>2020-09-07T06:43:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/09/23/empower-your-cloud-ops-teams-publish-qualys-cloudview-security-assessment-reports-to-their-slack-channel</loc>
		<lastmod>2025-03-12T09:46:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/09/16/assess-vulnerabilities-misconfigurations-in-ci-cd-pipeline</loc>
		<lastmod>2022-12-20T05:34:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2019/09/10/september-patch-tuesday-79-vulns-17-critical-remote-desktop-client-sharepoint-exploited-privesc</loc>
		<lastmod>2022-10-28T01:55:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2019/08/29/cisco-rest-api-container-for-ios-xe-software-authentication-bypass-vulnerability-cve-2019-12643</loc>
		<lastmod>2020-09-07T06:43:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/08/26/fedramp-conmon-efficiently-effectively-managing-slas-for-ra-5d-requirement</loc>
		<lastmod>2022-12-20T06:10:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2019/08/13/windows-remote-desktop-vulnerabilities-seven-monkeys-how-to-detect-and-patch</loc>
		<lastmod>2022-12-15T13:11:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2019/08/13/august-2019-patch-tuesday-93-vulns-29-critical-7-remote-desktop-vulns-hyper-v-dhcp-adobe-vulns</loc>
		<lastmod>2022-10-28T01:55:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/08/01/countdown-to-black-hat-top-10-sessions-to-attend-9-and-10</loc>
		<lastmod>2020-09-07T06:00:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/07/29/countdown-to-black-hat-top-10-sessions-to-attend-8</loc>
		<lastmod>2020-09-07T06:00:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/07/22/countdown-to-black-hat-top-10-sessions-to-attend-7</loc>
		<lastmod>2020-09-07T06:04:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/07/15/countdown-to-black-hat-top-10-sessions-to-attend-6</loc>
		<lastmod>2020-09-07T06:04:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2019/07/09/july-2019-patch-tuesday-77-vulns-15-critical-dhcp-rce-exploited-privesc-sql-adobe-vulns</loc>
		<lastmod>2022-10-28T01:56:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/07/08/countdown-to-black-hat-top-10-sessions-to-attend-5</loc>
		<lastmod>2020-09-07T06:04:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/07/01/video-training-update-july-2019</loc>
		<lastmod>2020-09-07T06:04:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/07/01/countdown-to-black-hat-top-10-sessions-to-attend-4</loc>
		<lastmod>2020-09-07T06:04:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/06/24/countdown-to-black-hat-top-10-sessions-to-attend-3</loc>
		<lastmod>2020-09-07T06:05:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/06/17/countdown-to-black-hat-top-10-sessions-to-attend-2</loc>
		<lastmod>2020-09-07T06:05:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2019/06/14/exim-mta-vulnerability-the-return-of-the-wizard-cve-2019-10149</loc>
		<lastmod>2020-09-07T06:43:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2019/06/11/june-2019-patch-tuesday-88-vulns-21-critical-hyper-v-escape-adobe-vulns</loc>
		<lastmod>2022-10-28T01:56:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/06/11/alpine-docker-image-vulnerability-cve-2019-5021-how-to-detect-and-fix</loc>
		<lastmod>2022-12-19T08:25:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/06/10/countdown-to-black-hat-top-10-sessions-to-attend-1</loc>
		<lastmod>2020-09-07T06:05:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/06/06/integrating-threat-and-vulnerability-management-with-patch-management-the-feasible-quantum-leap</loc>
		<lastmod>2020-09-07T06:05:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/06/03/boosting-patch-management-is-key-for-breach-prevention</loc>
		<lastmod>2020-09-07T06:05:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2019/06/01/third-party-user-enumeration-issue-resolved</loc>
		<lastmod>2020-09-07T06:18:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2019/05/24/linkedin-faux-pas-shines-light-on-certificate-management</loc>
		<lastmod>2022-12-20T09:47:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/05/23/boost-security-with-these-gartner-recommended-projects</loc>
		<lastmod>2020-09-07T06:05:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2019/05/15/windows-rdp-remote-code-execution-vulnerability-bluekeep-how-to-detect-and-patch</loc>
		<lastmod>2022-12-20T11:44:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/05/15/verizons-dbir-highlights-key-drivers-of-security-risk</loc>
		<lastmod>2025-05-14T14:26:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2019/05/14/may-2019-patch-tuesday-79-vulns-22-critical-rdp-rce-mds-attacks-adobe-vulns</loc>
		<lastmod>2022-10-28T01:56:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/04/22/zombie-poodle-and-goldendoodle-vulnerabilities</loc>
		<lastmod>2026-02-24T07:04:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/04/18/qualys-training-update-april-2019</loc>
		<lastmod>2020-09-07T06:05:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/04/17/monitoring-aws-golden-ami-pipelines-with-qualys-and-slack</loc>
		<lastmod>2020-09-07T06:05:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2019/04/10/reducing-aws-risk-footprint-through-the-use-of-amis-at-ancestry</loc>
		<lastmod>2020-09-07T06:05:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2019/04/09/april-2019-patch-tuesday-74-vulns-16-critical-2-actively-attacked-1-poc-exploit-adobe-vulns</loc>
		<lastmod>2022-10-28T01:56:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/03/18/free-training-new-certified-learning-paths</loc>
		<lastmod>2022-12-22T13:52:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/03/14/pci-ssl-early-tls-qids-38601-42366</loc>
		<lastmod>2022-12-20T10:34:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/03/13/jenkins-plugin-v2-for-qualys-was-now-available</loc>
		<lastmod>2020-09-07T07:17:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2019/03/12/march-2019-patch-tuesday-65-vulns-18-critical-rces-in-dhcp-client-adobe-vulns</loc>
		<lastmod>2022-10-28T01:56:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2019/02/14/know-whats-on-your-network-at-all-times-with-qualys-asset-inventory</loc>
		<lastmod>2020-09-07T06:05:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2019/02/12/february-2019-patch-tuesday-74-vulns-20-critical-exchange-0-day-adobe-vulns</loc>
		<lastmod>2022-10-28T01:56:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/02/12/runc-container-breakout-vulnerability</loc>
		<lastmod>2020-09-07T06:18:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/02/06/assess-vulnerabilities-and-misconfigurations-in-aws-golden-ami-pipelines-with-qualys</loc>
		<lastmod>2022-12-21T06:24:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/01/29/policy-compliance-adds-udc-support-for-cloud-agent</loc>
		<lastmod>2020-09-07T06:05:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/01/23/mod_ssl-bug-and-ssl-labs-renegotiation-test</loc>
		<lastmod>2022-11-03T23:20:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2019/01/10/detecting-insecure-cookies-with-qualys-web-application-scanning</loc>
		<lastmod>2022-12-21T11:42:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2019/01/09/container-security-becomes-a-priority-for-enterprises</loc>
		<lastmod>2020-09-07T06:05:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2019/01/08/january-2019-patch-tuesday-47-vulns-7-critical-adobe-vulns</loc>
		<lastmod>2022-10-28T01:56:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/12/17/new-frontiers-in-cryptojacking</loc>
		<lastmod>2020-09-07T06:18:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2018/12/11/december-2018-patch-tuesday-39-vulns-workstation-patches-adobe-vulns</loc>
		<lastmod>2022-10-28T01:56:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/12/11/global-it-asset-inventory-the-foundation-for-security-and-compliance</loc>
		<lastmod>2020-09-07T06:05:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2018/12/04/capital-one-building-security-into-devops</loc>
		<lastmod>2025-05-15T05:06:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2018/11/28/infosec-teams-race-to-secure-devops</loc>
		<lastmod>2020-09-07T06:05:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/qualys-security-conference/2018/11/20/qsc18-takeaway-complex-environments-demand-visibility-and-real-time-security</loc>
		<lastmod>2022-10-28T02:07:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/11/19/grade-change-for-tls-1-0-and-tls-1-1-protocols</loc>
		<lastmod>2026-03-16T09:27:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/qualys-security-conference/2018/11/16/qsc18-api-security-enabling-innovation-without-enabling-attacks-and-data-breaches</loc>
		<lastmod>2022-10-28T02:07:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/qualys-security-conference/2018/11/15/qsc18-day-1-takeaway-continuous-transformation-demands-continuous-security</loc>
		<lastmod>2022-10-28T02:07:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/qualys-security-conference/2018/11/15/qsc18-the-need-for-security-visibility-in-the-age-of-digital-transformation</loc>
		<lastmod>2022-10-28T02:07:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2018/11/13/november-2018-patch-tuesday-62-vulns-tftp-server-rce-adobe-poc</loc>
		<lastmod>2022-10-28T01:56:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2018/11/12/welcome-to-qualys-security-conference-2018</loc>
		<lastmod>2020-09-07T06:18:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/11/06/bluetooth-bugs-affect-enterprise-wi-fi-as-hackers-exploit-cisco-0-day</loc>
		<lastmod>2020-09-07T06:05:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/10/23/dont-overlook-qualys-malware-detection</loc>
		<lastmod>2025-03-18T06:08:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/10/17/threat-hunting-adoption-expertise-grow-but-work-remains</loc>
		<lastmod>2020-09-07T06:05:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/10/16/apple-amazon-in-a-tussle-with-bloomberg-over-spy-chips-report</loc>
		<lastmod>2020-09-07T06:05:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/10/10/pci-qid-38598-deprecated-public-key-length</loc>
		<lastmod>2020-09-07T06:18:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2018/10/09/october-2018-patch-tuesday-49-vulns-critical-browser-patches-hyper-v-adobe-vulns</loc>
		<lastmod>2022-10-28T01:56:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/10/02/stronger-security-with-global-it-asset-inventory</loc>
		<lastmod>2020-09-07T06:05:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/10/01/hackers-exploit-facebook-bug-as-twitter-dms-maybe-got-misrouted</loc>
		<lastmod>2020-09-07T06:05:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/09/12/qualys-helps-consultants-and-msps-deliver-world-class-security-services-to-mid-size-customers</loc>
		<lastmod>2025-03-12T08:16:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2018/09/11/september-2018-patch-tuesday-61-vulns-fragmentsmack-hyper-v-escape</loc>
		<lastmod>2022-10-28T01:56:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/09/10/british-airways-hack-triggers-gdpr-concerns-as-world-awaits-windows-0-day-patch</loc>
		<lastmod>2020-09-07T06:05:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/09/05/gdpr-101-monitoring-maintaining-compliance-after-the-deadline</loc>
		<lastmod>2020-09-07T06:05:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/08/30/securing-container-deployments-with-qualys</loc>
		<lastmod>2020-09-07T06:05:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/08/28/black-hat-qualys-shows-how-new-passive-network-sensor-boosts-platform-capabilities</loc>
		<lastmod>2025-05-14T14:25:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/08/27/security-news-hackers-aim-ransomware-at-big-cos-as-experts-call-for-swift-patching-of-struts-bug</loc>
		<lastmod>2020-09-07T06:06:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2018/08/23/detecting-apache-struts-2-namespace-rce-cve-2018-11776</loc>
		<lastmod>2022-12-15T12:29:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/08/16/black-hat-usa-2018-best-practices-videos</loc>
		<lastmod>2020-09-07T06:06:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2018/08/14/august-patch-tuesday-63-vulns-l1tf-exchange-sql-active-attacks-on-ie-flaw</loc>
		<lastmod>2022-10-28T01:56:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/08/14/introducing-a-burp-extension-for-integration-with-qualys-web-application-scanning</loc>
		<lastmod>2025-03-18T06:55:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/08/13/security-news-wannacry-surfaces-in-taiwan-as-reddit-breach-puts-2fa-in-the-spotlight</loc>
		<lastmod>2020-09-07T06:06:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/08/09/qualys-browsercheck-coinblocker-protects-users-from-active-cryptojacking-campaigns</loc>
		<lastmod>2020-09-07T06:18:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/08/01/qualys-helps-smaller-organizations-secure-hybrid-it-with-free-offering</loc>
		<lastmod>2025-03-13T07:13:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/07/31/eager-to-boost-your-container-security-dont-miss-this-webcast</loc>
		<lastmod>2020-09-04T17:31:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2018/07/30/security-news-bluetooth-bug-triggers-patch-frenzy-as-ransomware-attack-hits-global-shipper</loc>
		<lastmod>2020-09-04T17:31:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/07/25/staying-safe-in-the-era-of-browser-based-cryptocurrency-mining</loc>
		<lastmod>2020-09-07T06:18:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/07/20/saq-enables-users-to-pick-and-choose-questions-for-custom-templates</loc>
		<lastmod>2020-09-07T06:06:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/qualys-security-conference/2018/07/13/qsc18-virtual-edition-securing-containers-from-build-to-deployments</loc>
		<lastmod>2022-10-28T02:07:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2018/07/10/july-patch-tuesday-critical-browser-patches-lazy-fp-exchange-adobe-vulns</loc>
		<lastmod>2022-10-28T02:00:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/qualys-security-conference/2018/06/29/qsc18-virtual-edition-vulnerability-risk-management</loc>
		<lastmod>2022-10-28T02:07:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/06/28/gdpr-is-here-how-gdpr-readiness-can-boost-your-business</loc>
		<lastmod>2020-09-07T06:06:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/06/26/gdpr-is-here-dont-neglect-public-cloud-security</loc>
		<lastmod>2025-03-18T07:00:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/qualys-security-conference/2018/06/22/qsc18-virtual-edition-global-it-asset-discovery-inventory-and-management</loc>
		<lastmod>2022-10-28T02:07:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/06/19/gdpr-is-here-web-app-security-is-a-must</loc>
		<lastmod>2025-03-12T08:11:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/06/18/get-emerging-threats-visibility-with-qualys-ioc-widgets</loc>
		<lastmod>2020-09-07T06:06:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/qualys-security-conference/2018/06/15/qsc18-virtual-edition-building-security-in-the-qualys-cloud-platform-and-architecture</loc>
		<lastmod>2025-03-12T09:58:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/qualys-security-conference/2018/06/15/qsc18-virtual-edition-securing-our-networks-and-enabling-the-digital-transformation-one-app-at-a-time</loc>
		<lastmod>2022-10-28T02:07:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/06/14/indication-of-compromise-another-key-practice-for-gdpr-compliance-2</loc>
		<lastmod>2025-03-12T10:07:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2018/06/12/june-patch-tuesday-new-speculative-store-bypass-fixes-adobe-vulns</loc>
		<lastmod>2022-10-28T01:56:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/06/06/its-the-dawn-of-the-digital-transformation-age-do-you-know-where-your-certificates-are</loc>
		<lastmod>2025-05-14T14:24:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/06/05/gdpr-is-here-put-file-integrity-monitoring-in-your-toolbox</loc>
		<lastmod>2020-09-07T06:06:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/05/31/gdpr-is-here-assess-the-security-configurations-of-your-it-systems</loc>
		<lastmod>2020-09-07T06:06:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2018/05/30/all-hands-memo-to-small-home-office-owners-reboot-your-routers</loc>
		<lastmod>2020-09-04T17:42:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/05/29/gdpr-is-here-assess-risk-from-vendors-and-from-internal-teams</loc>
		<lastmod>2020-09-07T06:06:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/qualys-security-conference/2018/05/27/qsc-2018-mumbai-finds-qualys-at-the-forefront-of-digital-transformation-security</loc>
		<lastmod>2022-10-28T02:07:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/05/25/gdpr-compliance-manage-procedural-risk-assessments-with-new-gdpr-templates</loc>
		<lastmod>2020-09-07T06:06:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/05/24/gdpr-is-here-manage-vulnerabilities-and-prioritize-threat-remediation</loc>
		<lastmod>2020-09-07T06:06:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/05/21/gdpr-is-here-achieve-the-superior-data-breach-prevention-and-detection-required-with-qualys</loc>
		<lastmod>2020-09-07T06:06:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/05/15/securing-the-hybrid-cloud-a-guide-to-using-security-controls-tools-and-automation</loc>
		<lastmod>2020-09-07T06:06:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2018/05/14/what-weve-got-here-is-failure-to-communicate-os-vendors-misread-cpu-docs-create-flaw</loc>
		<lastmod>2020-09-04T17:42:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2018/05/08/may-2018-patch-tuesday-medium-weight-but-one-active-exploit-needs-attention</loc>
		<lastmod>2022-10-28T01:56:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2018/05/07/timely-password-change-announcement-from-twitter-as-new-bugs-hit-webex-and-gpon-routers</loc>
		<lastmod>2020-09-04T17:41:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/05/07/how-to-prioritize-vulnerabilities-in-a-modern-it-environment</loc>
		<lastmod>2025-09-19T09:49:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/04/27/gaining-control-over-your-digital-certificates</loc>
		<lastmod>2025-05-14T14:24:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/04/25/when-preparing-for-gdpr-dont-neglect-public-cloud-security</loc>
		<lastmod>2025-03-18T06:56:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/04/24/orangeworm-targeting-healthcare-industry-since-2015-now-exposed</loc>
		<lastmod>2020-09-07T06:00:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/04/23/qualys-was-swagger-for-rest-api-security-testing</loc>
		<lastmod>2022-12-21T05:40:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/04/19/the-sky-is-falling-responding-rationally-to-headline-vulnerabilities</loc>
		<lastmod>2020-09-07T06:06:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2018/04/18/dr-michio-kaku-paints-fascinating-picture-of-the-future-at-qualys-rsa-boooth</loc>
		<lastmod>2020-09-07T05:46:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/04/16/qualys-cloud-security-must-move-towards-transparent-orchestration</loc>
		<lastmod>2020-09-07T06:06:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/04/13/indication-of-compromise-another-key-practice-for-gdpr-compliance</loc>
		<lastmod>2020-09-07T06:06:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2018/04/10/april-patch-tuesday-63-microsoft-vulnerabilities-19-for-adobe</loc>
		<lastmod>2022-10-28T01:56:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/04/09/vendor-risk-bites-sears-delta-and-best-buy-while-saks-and-lord-taylor-grapple-with-a-data-breach</loc>
		<lastmod>2020-09-07T06:06:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/04/04/put-fim-in-your-gdpr-toolbox</loc>
		<lastmod>2020-09-07T06:06:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/04/02/microsoft-misfires-with-meltdown-patch-while-wannacry-pops-up-at-boeing</loc>
		<lastmod>2020-09-07T06:06:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2018/03/30/a-patch-for-the-meltdown-patch-released-out-of-band-thursday-night</loc>
		<lastmod>2020-09-07T06:44:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/03/30/continuous-web-security-assessment-for-production-and-devops-environments</loc>
		<lastmod>2020-09-07T07:17:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/03/29/securing-your-cloud-and-container-devops-pipeline</loc>
		<lastmod>2025-03-12T08:08:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/03/28/qid-86725-f5-big-ip-load-balancer-internal-ip-address-disclosure</loc>
		<lastmod>2022-12-19T09:50:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2018/03/26/feds-take-on-foreign-hackers-while-880k-orbitz-customers-likely-affected-by-data-breach</loc>
		<lastmod>2020-09-04T17:40:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/03/19/webcast-qa-the-gdpr-deadline-readiness-and-impact-to-global-organizations-outside-the-eu</loc>
		<lastmod>2025-05-14T14:23:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2018/03/13/march-patch-tuesday-75-microsoft-vulnerabilities-2-for-adobe</loc>
		<lastmod>2022-10-28T01:56:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/03/13/pci-dss-v3-2-exposing-session-id-in-url</loc>
		<lastmod>2020-09-07T06:06:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/03/09/cryptomining-is-all-the-rage-among-hackers-as-ddos-amplification-attacks-grow</loc>
		<lastmod>2020-09-07T06:06:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/03/07/gdpr-the-stakes-are-high-and-time-is-of-the-essence</loc>
		<lastmod>2025-05-14T14:21:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/03/05/tls-1-0-deprecation-for-qualys-cloud-platform</loc>
		<lastmod>2020-09-07T06:06:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/03/02/apple-in-the-infosec-spotlight-as-github-falls-prey-to-amplified-ddos-attack</loc>
		<lastmod>2020-09-07T06:06:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/02/27/recline-on-the-qualys-couch-examining-patching-behavior</loc>
		<lastmod>2020-09-07T06:06:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/02/16/hackers-hit-the-olympics-while-patch-tuesday-and-meltdown-spectre-keep-it-departments-on-edge</loc>
		<lastmod>2022-10-28T01:56:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2018/02/13/february-patch-tuesday-55-microsoft-vulnerabilities-patched-45-for-adobe</loc>
		<lastmod>2022-10-28T01:56:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/02/12/securing-it-assets-by-prioritizing-protection-and-remediation</loc>
		<lastmod>2020-09-07T06:06:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/02/09/intel-makes-spectre-patch-progress-while-adobe-grapples-with-latest-flash-bug</loc>
		<lastmod>2020-09-07T06:06:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/02/06/if-you-think-file-integrity-monitoring-is-boring-think-again</loc>
		<lastmod>2022-12-15T13:09:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/02/05/for-gdpr-compliance-web-app-security-is-a-must</loc>
		<lastmod>2025-03-18T06:59:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/02/02/forward-secrecy-authenticated-encryption-and-robot-grading-update</loc>
		<lastmod>2022-12-16T10:52:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/02/02/meltdown-spectre-new-concerns-over-intel-patches-as-hackers-test-exploits</loc>
		<lastmod>2020-09-07T06:06:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/01/26/meltdown-spectre-intel-nixes-patches-tech-ceos-questioned-on-information-blackout</loc>
		<lastmod>2020-09-07T06:06:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/01/18/meltdown-and-spectre-arent-business-as-usual</loc>
		<lastmod>2020-09-07T06:06:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/01/16/meltdown-spectre-mitigation-is-a-work-in-progress</loc>
		<lastmod>2020-09-07T06:06:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/01/16/continuous-security-compliance-webcast-series</loc>
		<lastmod>2025-03-12T10:04:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2018/01/09/january-patch-tuesday-meltdown-spectre-16-critical-microsoft-patches-1-adobe-patch</loc>
		<lastmod>2022-10-28T01:56:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2018/01/08/meltdown-spectre-and-qualys-cloud-platform</loc>
		<lastmod>2020-09-07T06:18:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/01/08/pci-dss-v3-2-private-ip-address-disclosure</loc>
		<lastmod>2020-09-07T06:07:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2018/01/05/visualizing-spectre-meltdown-impact-and-remediation-progress</loc>
		<lastmod>2025-07-30T07:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2018/01/03/processor-vulnerabilities-meltdown-and-spectre</loc>
		<lastmod>2020-09-07T06:18:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/12/14/cloud-security-improves-but-much-work-still-remains-to-be-done</loc>
		<lastmod>2020-09-07T06:07:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2017/12/12/december-patch-tuesday-quiet-end-to-the-year</loc>
		<lastmod>2022-10-28T01:56:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/12/07/implementing-the-cis-20-critical-security-controls-make-your-infosec-foundation-rock-solid</loc>
		<lastmod>2020-09-07T06:07:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/12/04/implementing-the-cis-20-critical-security-controls-delving-into-more-sophisticated-techniques</loc>
		<lastmod>2025-03-18T06:48:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/11/28/qualys-was-new-detections-for-xml-external-entities-xxe</loc>
		<lastmod>2020-09-07T07:17:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/11/28/implementing-the-cis-20-critical-security-controls-building-upon-foundational-cyber-hygiene</loc>
		<lastmod>2025-03-18T06:44:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2017/11/14/november-patch-tuesday-53-vulnerabilities-and-a-massive-adobe-update</loc>
		<lastmod>2022-10-28T01:56:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/11/14/implementing-the-cis-20-critical-security-controls-slash-risk-of-cyber-attacks-by-85</loc>
		<lastmod>2025-09-22T07:12:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/11/08/webcast-qa-devsecops-building-continuous-security-into-it-and-app-infrastructures</loc>
		<lastmod>2020-09-07T06:07:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/11/02/new-silence-banking-trojan-copies-carbanak-to-steal-from-banks-analysis-with-iocs</loc>
		<lastmod>2020-09-07T06:18:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/11/01/case-study-cisco-group-bakes-security-into-web-app-dev-process</loc>
		<lastmod>2025-03-18T06:47:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/10/31/devsecops-building-continuous-security-into-it-and-app-infrastructures</loc>
		<lastmod>2020-09-07T06:07:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/10/27/infosec-pros-must-fasten-their-seatbelts-for-digital-transformation-ride</loc>
		<lastmod>2020-09-07T06:07:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/10/26/webcast-qa-automating-the-cis-critical-security-controls</loc>
		<lastmod>2020-09-07T06:07:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2017/10/24/bad-rabbit-ransomware</loc>
		<lastmod>2021-09-22T00:20:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/10/23/aclu-attorney-u-s-citizens-legally-unsheltered-from-abusive-surveillance</loc>
		<lastmod>2020-09-07T06:07:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2017/10/19/gartner-the-pursuit-of-perfection-weakens-infosec-effectiveness</loc>
		<lastmod>2020-09-04T17:39:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/qualys-security-conference/2017/10/19/qsc17-qualys-battles-the-silos-helps-protect-digital-transformation-efforts</loc>
		<lastmod>2025-05-15T05:25:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/10/18/the-shift-from-securing-our-networks-to-enabling-the-digital-transformation-of-our-enterprises</loc>
		<lastmod>2020-09-07T06:07:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/10/18/bugcrowd-integration-now-available-in-qualys-web-application-scanning</loc>
		<lastmod>2020-09-07T06:07:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/qualys-security-conference/2017/10/16/qsc17-focuses-on-digital-transformations-challenges-and-opportunities</loc>
		<lastmod>2025-03-18T06:43:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/10/12/the-critical-security-controls-basic-cyber-security-hygiene-for-your-organization</loc>
		<lastmod>2020-09-07T06:07:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2017/10/10/october-patch-tuesday-28-critical-microsoft-vulnerabilities</loc>
		<lastmod>2022-10-28T01:56:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/09/26/achieve-continuous-security-and-compliance-with-the-cis-critical-security-controls</loc>
		<lastmod>2020-09-07T06:07:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/09/26/google-and-mozilla-deprecating-existing-symantec-certificates</loc>
		<lastmod>2021-10-21T18:27:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/09/19/fixing-hpkp-with-certificate-constraints</loc>
		<lastmod>2021-10-21T18:32:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2017/09/12/september-patch-tuesday-27-critical-vulnerabilities-from-microsoft-plus-critical-adobe-patches</loc>
		<lastmod>2022-10-28T01:56:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/09/05/fixing-hpkp-with-pin-revocation</loc>
		<lastmod>2021-10-21T18:33:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/08/29/sans-institute-hackers-paint-a-bullseye-on-your-employees-and-endpoints</loc>
		<lastmod>2020-09-07T06:07:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/08/09/countdown-to-gdpr-it-policy-compliance</loc>
		<lastmod>2020-09-07T06:07:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2017/08/08/august-patch-tuesday-25-critical-microsoft-vulnerabilities-43-for-adobe</loc>
		<lastmod>2022-10-28T01:56:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/08/07/cybersecurity-report-threat-landscape-gets-more-sophisticated</loc>
		<lastmod>2025-03-12T09:17:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/08/02/countdown-to-gdpr-manage-vulnerabilities</loc>
		<lastmod>2020-09-07T06:07:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/07/26/how-to-secure-public-clouds-while-boosting-digital-transformation</loc>
		<lastmod>2025-05-14T14:19:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2017/07/24/introducing-the-qualys-new-look-and-positioning</loc>
		<lastmod>2020-09-04T17:38:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/07/19/countdown-to-gdpr-assess-vendor-risk</loc>
		<lastmod>2020-09-07T06:07:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/07/18/securing-public-clouds-for-digital-transformation-success</loc>
		<lastmod>2025-03-12T08:14:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/07/12/qa-conducting-cloud-based-vendor-risk-audits-with-qualys-saq</loc>
		<lastmod>2020-12-18T20:06:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2017/07/11/july-patch-tuesday-19-critical-vulnerabilities-from-microsoft-plus-critical-adobe-patches</loc>
		<lastmod>2022-10-28T01:56:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/07/11/countdown-to-gdpr-prioritize-vulnerability-remediation</loc>
		<lastmod>2020-09-07T06:07:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/06/30/ssl-labs-grading-redesign-preview-1</loc>
		<lastmod>2021-10-21T17:55:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/06/29/save-time-by-streamlining-vendor-risk-assessments-in-the-cloud</loc>
		<lastmod>2020-09-07T06:07:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/06/28/countdown-to-gdpr-get-2020-visibility-into-your-it-assets</loc>
		<lastmod>2020-09-07T06:07:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2017/06/27/petya-ransomware-what-you-need-to-know</loc>
		<lastmod>2020-09-07T06:18:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/06/21/countdown-to-gdpr-reduce-your-risk</loc>
		<lastmod>2020-09-07T06:07:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/06/19/visualizing-the-stack-clash-vulnerability-with-dashboards</loc>
		<lastmod>2020-09-07T06:07:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2017/06/19/the-stack-clash</loc>
		<lastmod>2022-12-19T13:14:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2017/06/13/microsoft-fixes-94-security-issues-in-massive-june-update</loc>
		<lastmod>2020-09-07T06:44:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/06/13/dynamic-questionnaire-accelerate-quick-and-efficient-responses-with-question-gating</loc>
		<lastmod>2020-09-07T06:07:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/06/05/lessons-learned-from-sql-injection-fix-in-joomla-3-7-0</loc>
		<lastmod>2020-09-07T07:17:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2017/05/26/samba-vulnerability-cve-2017-7494</loc>
		<lastmod>2020-09-07T06:18:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/05/23/digging-into-wannacry-details-answers-to-your-burning-questions</loc>
		<lastmod>2020-09-07T06:07:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/05/19/no-more-tears-wannacry-highlights-importance-of-prompt-precise-vulnerability-remediation</loc>
		<lastmod>2020-09-07T06:07:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/05/18/visualizing-wannacry-shadow-brokers-with-dashboards</loc>
		<lastmod>2020-09-07T06:18:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/05/18/better-trusted-scanning-with-qualys-cyberark-integration</loc>
		<lastmod>2020-09-07T06:07:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/05/17/for-gdpr-readiness-you-need-visibility-into-your-it-assets</loc>
		<lastmod>2020-09-07T06:08:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2017/05/12/how-to-rapidly-identify-assets-at-risk-to-wannacry-ransomware-and-eternalblue-exploit</loc>
		<lastmod>2020-09-07T06:18:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2017/05/10/intel-amt-vulnerability</loc>
		<lastmod>2020-09-07T06:18:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2017/05/09/adobe-fixes-half-dozen-flash-vulnerabilities-and-more</loc>
		<lastmod>2020-09-07T06:44:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2017/05/09/microsoft-fixes-malware-protection-engine-and-several-0-day-vulnerabilities</loc>
		<lastmod>2020-09-07T06:44:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/05/04/virtual-patching-a-lifesaver-for-web-app-security</loc>
		<lastmod>2020-09-07T07:17:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2017/04/25/shadow-brokers-fix-for-ibm-lotus-domino-released</loc>
		<lastmod>2020-09-07T06:44:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2017/04/18/oracle-plugs-struts-hole-along-with-299-total-vulnerabilities</loc>
		<lastmod>2020-09-07T06:44:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/04/18/pci-dss-v3-2-migrating-from-ssl-and-early-tls-v1-1</loc>
		<lastmod>2020-09-07T07:17:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/04/15/the-shadow-brokers-release-zero-day-exploit-tools</loc>
		<lastmod>2020-09-07T06:18:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2017/04/11/april-2017-patch-tuesday-video-highlights</loc>
		<lastmod>2022-10-28T01:56:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2017/04/11/microsoft-fixes-45-vulnerabilities-with-new-security-update-guide-says-goodbye-to-security-updates</loc>
		<lastmod>2020-09-07T06:51:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2017/04/11/adobe-fixes-flash-pdf-reader-and-photoshop-in-april</loc>
		<lastmod>2020-09-07T06:51:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/04/10/it-asset-inventory-systems-and-cmdbs-a-marriage-made-in-infosec-heaven</loc>
		<lastmod>2022-12-19T07:26:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/04/05/sans-2017-cybersecurity-trend-report-checklist</loc>
		<lastmod>2020-09-07T06:08:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/04/05/ssl-labs-distrusts-wosign-and-startcom-certificates</loc>
		<lastmod>2021-10-21T17:55:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/03/31/microsoft-iis-6-0-buffer-overflow-zero-day</loc>
		<lastmod>2020-09-07T07:18:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/03/30/protect-against-critical-iis-6-0-buffer-overflow-vulnerability-cve-2017-7269-with-qualys-waf</loc>
		<lastmod>2020-09-07T07:18:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/03/29/forresters-demartine-talks-devops-iot-flawed-tools-and-other-appsec-hot-topics</loc>
		<lastmod>2020-09-07T07:18:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/03/27/rest-api-testing-with-qualys-web-application-scanning</loc>
		<lastmod>2025-03-18T06:53:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/03/22/sans-study-to-take-on-new-infosec-challenges-first-get-the-basics-right</loc>
		<lastmod>2025-05-14T14:19:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/03/15/path-fuzzing-challenges</loc>
		<lastmod>2025-03-18T06:08:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/03/14/apache-struts-cve-2017-5638-vulnerability-and-the-qualys-solution</loc>
		<lastmod>2026-03-16T09:28:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2017/03/14/massive-security-update-from-microsoft-for-march</loc>
		<lastmod>2022-10-28T01:56:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/03/13/caa-mandated-by-cabrowser-forum</loc>
		<lastmod>2022-02-17T08:26:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/03/10/examining-the-current-state-of-database-security</loc>
		<lastmod>2020-09-07T06:51:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/03/09/qualys-waf-2-0-protects-against-critical-apache-struts2-vulnerability-cve-2017-5638</loc>
		<lastmod>2020-09-07T06:08:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/03/06/smart-dom-xss-detection-in-qualys-was</loc>
		<lastmod>2022-12-21T06:52:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/02/28/making-asset-inventory-actionable-with-a-cloud-based-system</loc>
		<lastmod>2020-09-07T06:08:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/02/23/ticketbleed-detection-added-to-ssl-labs</loc>
		<lastmod>2022-11-03T23:20:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/02/21/rsa-conference-2017-qualys-cloud-platform-expansions</loc>
		<lastmod>2025-05-14T14:18:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/02/21/for-complete-visibility-dive-deep-into-it-asset-discovery</loc>
		<lastmod>2020-09-07T06:08:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/02/16/simplifying-web-application-security-with-qualys-web-application-firewall-2-0</loc>
		<lastmod>2025-03-18T07:04:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2017/02/14/microsoft-february-patch-cliff-hanger-and-adobe-fix-for-flash</loc>
		<lastmod>2022-10-28T01:56:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/02/13/iot-security-a-hairy-issue-thats-simple-to-solve</loc>
		<lastmod>2020-09-07T06:08:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/02/10/automated-asset-inventory-its-a-visibility-thing</loc>
		<lastmod>2020-09-07T06:08:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/02/07/checklist-qualys-top-10-tips-for-a-secure-compliant-2017</loc>
		<lastmod>2020-09-07T06:08:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/01/30/the-worlds-gone-web-app-crazy-tips-to-cut-risk-from-hacks-rogue-staff-and-faulty-code</loc>
		<lastmod>2020-09-07T07:18:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/01/26/cross-site-request-forgery-what-happened-to-the-sleeping-giant</loc>
		<lastmod>2020-09-07T07:18:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/01/24/slash-vendor-risk-and-sharpen-compliance-with-policies-standards-and-regulations</loc>
		<lastmod>2020-09-07T06:08:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/01/18/ssl-labs-grading-changes-january-2017</loc>
		<lastmod>2021-10-21T17:56:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2017/01/17/oracle-january-2017-cpu-fixes-270-vulnerabilities</loc>
		<lastmod>2020-09-07T06:51:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/01/17/overwhelmed-by-security-vulnerabilities-heres-how-to-prioritize</loc>
		<lastmod>2020-09-07T06:08:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/01/13/whats-new-ssl-labs-1-26-5</loc>
		<lastmod>2021-10-21T17:56:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/01/12/five-things-to-know-about-qualys-fedramp-authorization</loc>
		<lastmod>2020-09-07T06:08:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2017/01/10/january-2017-patch-tuesday-video-highlights</loc>
		<lastmod>2022-10-28T01:56:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2017/01/10/adobe-security-update-for-january-flash-and-acrobat-fixed</loc>
		<lastmod>2020-09-07T06:51:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2017/01/10/microsoft-starts-2017-with-record-low-security-updates</loc>
		<lastmod>2020-09-07T06:51:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2017/01/10/hackers-are-having-a-field-day-with-stolen-credentials</loc>
		<lastmod>2020-09-07T06:18:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2017/01/05/office-depot-extends-the-value-of-cloud-based-security-via-qualys-apis</loc>
		<lastmod>2020-09-07T06:08:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2016/12/13/2016-year-end-summary-for-adobe-and-another-0-day-fix-in-december</loc>
		<lastmod>2020-09-07T06:51:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2016/12/13/microsoft-ends-2016-with-15-increase-in-bulletin-volume</loc>
		<lastmod>2020-09-07T06:51:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/12/12/ssl-deceptively-simple-yet-hard-to-implement</loc>
		<lastmod>2020-09-07T06:40:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/12/05/sans-survey-report-organizations-continuous-monitoring-programs-must-keep-maturing-to-yield-full-benefits</loc>
		<lastmod>2020-09-07T06:08:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/11/29/per-protocol-cipher-suite-detection-in-ssl-labs</loc>
		<lastmod>2021-10-21T17:56:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/11/28/web-and-mobile-apps-often-hide-complex-maze-of-insecure-connections</loc>
		<lastmod>2025-03-13T07:17:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/11/22/as-web-apps-become-top-data-breach-vector-protecting-them-is-critical</loc>
		<lastmod>2025-03-18T06:52:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/11/22/ssl-labs-now-showing-multiple-certificate-chains</loc>
		<lastmod>2021-10-21T17:57:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/11/21/bai-security-eyes-threat-prioritization-as-competitive-differentiator</loc>
		<lastmod>2020-09-07T06:08:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/11/16/announcing-ssl-labs-grading-changes-for-2017</loc>
		<lastmod>2021-10-21T17:57:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2016/11/08/november-2016-patch-tuesday-video-highlights</loc>
		<lastmod>2022-10-28T01:56:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2016/11/08/adobe-releases-flash-player-and-connect-vulnerability-fix</loc>
		<lastmod>2020-09-07T06:51:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2016/11/08/microsoft-patches-actively-exploited-kernel-vulnerability-three-previously-disclosed-browser-issues-and-sql-server</loc>
		<lastmod>2022-10-28T01:56:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2016/11/01/windows-kernel-0-day-actively-exploited</loc>
		<lastmod>2020-09-07T06:51:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/10/27/a-csos-view-of-vulnerability-management-essential-and-core-to-enterprise-security</loc>
		<lastmod>2020-09-07T06:08:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2016/10/26/emergency-flash-player-0-day-update-released-by-adobe</loc>
		<lastmod>2020-09-07T06:51:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2016/10/25/video-pulitzer-prize-winner-kaplan-talks-about-cyber-war-in-our-unsafe-internet</loc>
		<lastmod>2020-09-04T17:37:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/10/19/agility-and-flexibility-needed-to-manage-risk-throughout-vendor-relationship-lifecycle</loc>
		<lastmod>2020-09-07T06:08:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2016/10/18/oracle-october-2016-critical-patch-update</loc>
		<lastmod>2020-09-07T06:51:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2016/10/14/my-life-as-a-chief-security-officer</loc>
		<lastmod>2020-09-04T17:37:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/10/14/security-is-tough-but-infosec-pros-can-find-joy-in-the-work</loc>
		<lastmod>2020-09-07T06:08:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/10/13/infosec-teams-need-more-collaboration-and-automation-to-defend-their-organizations-and-help-them-succeed</loc>
		<lastmod>2020-09-07T06:08:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/qualys-security-conference/2016/10/13/the-big-year-2016-product-advances-highlighted-at-qsc</loc>
		<lastmod>2025-03-12T10:09:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/10/13/as-traditional-network-perimeters-dissolve-qualys-cloud-platform-provides-global-security-and-compliance-visibility</loc>
		<lastmod>2025-05-14T14:17:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/qualys-security-conference/2016/10/12/qualys-ceo-philippe-courtot-kicks-off-qsc16-with-call-for-organizations-to-secure-their-digital-transformations</loc>
		<lastmod>2022-10-28T02:07:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/10/12/lasso-in-employee-training-vendor-regulatory-compliance-with-automated-risk-assessments</loc>
		<lastmod>2020-09-07T06:08:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2016/10/11/october-patch-tuesday-2016-video-highlights</loc>
		<lastmod>2022-10-28T01:56:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2016/10/11/adobe-october-security-advisories</loc>
		<lastmod>2020-09-07T06:51:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2016/10/11/october-b-week-patch-tuesday-five-0-day-fixes</loc>
		<lastmod>2022-10-28T01:56:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/qualys-insights/2016/10/10/no-security-without-visibility-qsc16-to-focus-on-helping-enterprises-regain-clarity-into-their-it-environments</loc>
		<lastmod>2022-10-28T02:07:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/10/05/to-gauge-risk-from-third-parties-and-employees-scalability-and-automation-are-essential</loc>
		<lastmod>2020-09-07T06:08:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2016/10/03/top-5-new-settings-in-security-compliance-manager-for-windows-10</loc>
		<lastmod>2020-09-07T06:18:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/09/28/assessing-risk-from-vendors-and-other-third-parties-is-key-to-business-success</loc>
		<lastmod>2020-09-07T06:08:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2016/09/26/problem-with-openssl-patches-of-september-22-2016</loc>
		<lastmod>2022-11-03T23:20:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/09/26/prioritizing-remediation-visualize-and-share-the-data-apply-it-to-your-organization</loc>
		<lastmod>2020-09-07T06:08:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/09/20/qualys-beefs-up-cloud-tool-for-security-consultants</loc>
		<lastmod>2025-07-30T09:49:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/09/19/prioritizing-remediation-plug-into-the-firehose-of-vulnerability-disclosures-and-correlate</loc>
		<lastmod>2020-09-07T06:08:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2016/09/13/patch-tuesday-september-2016-video-highlights</loc>
		<lastmod>2022-10-28T01:56:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2016/09/13/adobe-september-2016-security-update</loc>
		<lastmod>2020-09-07T06:51:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2016/09/13/large-microsoft-patch-tuesday-update-for-september-2016</loc>
		<lastmod>2022-10-28T01:56:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/09/12/end-the-nightmare-of-vulnerability-disclosure-overload-keep-calm-and-prioritize</loc>
		<lastmod>2020-09-07T06:08:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/09/06/is-http-public-key-pinning-dead</loc>
		<lastmod>2022-12-22T05:40:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2016/08/31/thwarting-sql-injection-defense-in-depth</loc>
		<lastmod>2025-05-14T13:23:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/08/31/improved-suite-detection-in-the-next-ssl-labs-update</loc>
		<lastmod>2021-10-21T17:58:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/08/29/how-policy-compliance-plays-a-mitigation-role-to-protect-your-system</loc>
		<lastmod>2020-09-07T06:18:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/08/26/mystery-magic-bytes-from-the-equation-leak</loc>
		<lastmod>2020-09-07T06:08:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2016/08/18/equation-group-hack-cisco-asa-and-fortigate-vulnerabilities</loc>
		<lastmod>2020-09-07T06:51:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2016/08/09/patch-tuesday-august-2016-video-highlights</loc>
		<lastmod>2022-10-28T01:56:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2016/08/09/microsoft-patch-tuesday-august-2016</loc>
		<lastmod>2022-10-28T01:56:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/08/04/was-4-9-introduces-global-exclusion-lists-and-scan-comparison-feature</loc>
		<lastmod>2020-09-07T06:08:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/08/03/testing-ajax-applications-with-json-input-for-vulnerabilities-using-qualys-was</loc>
		<lastmod>2022-12-20T08:18:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/08/02/tls-version-intolerance-in-ssl-pulse</loc>
		<lastmod>2021-10-21T18:04:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2016/07/21/handling-cross-site-scripting-attacks-sophisticated</loc>
		<lastmod>2020-09-07T06:18:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2016/07/19/oracle-july-2016-critical-patch-update</loc>
		<lastmod>2020-09-07T06:51:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2016/07/18/cgi-application-vulnerability-httpoxy-for-php-go-python-and-others</loc>
		<lastmod>2020-09-07T06:51:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2016/07/12/patch-tuesday-july-2016-video-highlights</loc>
		<lastmod>2022-10-28T01:56:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2016/07/12/patch-tuesday-july-2016-microsoft-and-adobe</loc>
		<lastmod>2022-10-28T01:56:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/07/11/are-your-vendors-partners-and-other-business-allies-putting-your-organization-at-risk</loc>
		<lastmod>2020-09-07T06:08:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/07/11/qualys-supports-new-cisco-threat-centric-nac</loc>
		<lastmod>2020-09-07T06:08:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/07/07/new-qualys-app-for-splunk-enterprise-adds-real-time-dashboard-and-analytics-for-web-application-scanning</loc>
		<lastmod>2020-09-07T06:08:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/06/27/new-release-of-ssltls-deployment-best-practices</loc>
		<lastmod>2021-10-21T18:04:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/06/23/so-many-vulnerabilities-so-little-time-threatprotect-identifies-the-assets-you-must-patch-now</loc>
		<lastmod>2020-09-07T06:08:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2016/06/14/more-on-microsoft-and-adobe-patches-june-2016</loc>
		<lastmod>2020-09-07T06:51:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2016/06/14/patch-tuesday-june-2016</loc>
		<lastmod>2022-10-28T01:56:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/05/25/was-4-8-features-vulnerability-retest-function-and-finding-severity-customization</loc>
		<lastmod>2020-09-07T06:08:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/05/18/how-to-avoid-account-lockouts-when-scanning-web-applications</loc>
		<lastmod>2020-09-07T06:08:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/05/16/ssl-labs-in-2016-and-beyond</loc>
		<lastmod>2021-10-21T17:59:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2016/05/12/patch-tuesday-may-2015-2</loc>
		<lastmod>2022-10-28T01:57:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/05/11/protect-your-systems-against-samsam-and-prove-the-value-of-cyber-security-to-your-organization</loc>
		<lastmod>2020-09-07T06:08:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2016/05/10/more-on-may-2016-microsoft-and-adobe-patches</loc>
		<lastmod>2022-10-13T01:38:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/05/09/openssl-cve-2016-2107-grading-update</loc>
		<lastmod>2022-11-03T23:20:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2016/04/25/how-ignoring-low-level-security-risks-can-open-the-door-to-major-attacks</loc>
		<lastmod>2020-09-07T06:18:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2016/04/22/oracle-critical-patch-update-april-2016</loc>
		<lastmod>2020-09-07T06:51:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/04/18/was-4-7-adds-enhanced-support-for-redundant-link-checks</loc>
		<lastmod>2020-09-07T06:09:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2016/04/12/more-on-april-2016-microsoft-and-adobe-patches-including-badlock</loc>
		<lastmod>2020-09-07T06:51:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2016/04/12/22939</loc>
		<lastmod>2022-10-28T01:57:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2016/04/06/adobe-to-release-patch-for-0-day-in-flash-player</loc>
		<lastmod>2022-10-13T01:35:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/04/05/was-4-6-ability-to-delete-unused-web-asset-when-deprovisioning</loc>
		<lastmod>2020-09-07T07:18:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/04/04/qualys-was-4-6-new-features</loc>
		<lastmod>2020-09-07T06:09:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/03/29/qualys-vulnerability-management-notification-reference-data-formatting-change</loc>
		<lastmod>2020-09-07T06:09:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/03/29/qualys-cloud-platform-updates-now-available</loc>
		<lastmod>2020-09-07T06:09:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2016/03/28/the-importance-of-a-proper-http-strict-transport-security-implementation-on-your-web-server</loc>
		<lastmod>2026-03-16T09:25:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2016/03/24/oracle-out-of-band-release-for-java-0-day</loc>
		<lastmod>2020-09-07T06:51:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2016/03/10/patch-tuesday-update-adobe-flash-0-day-apsb16-08</loc>
		<lastmod>2022-10-28T01:57:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2016/03/08/more-on-march-2016-microsoft-and-adobe-patches</loc>
		<lastmod>2020-09-07T06:51:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2016/03/08/patch-tuesday-march-2016</loc>
		<lastmod>2022-10-28T01:57:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/03/04/drown-grading-update</loc>
		<lastmod>2020-09-07T06:41:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/03/04/ssl-labs-drown-test-implementation-details</loc>
		<lastmod>2022-12-23T11:46:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2016/03/03/drown-at-qualys</loc>
		<lastmod>2022-11-03T23:20:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/03/01/drown-abuses-ssl-v2-to-attack-rsa-keys-and-tls</loc>
		<lastmod>2022-11-03T23:20:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/02/29/new-certified-qualys-app-for-servicenow-cmdb</loc>
		<lastmod>2025-05-14T14:16:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2016/02/22/new-critical-glibc-vulnerability</loc>
		<lastmod>2020-09-07T06:51:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2016/02/12/critical-cisco-vpn-flaw</loc>
		<lastmod>2020-09-07T06:51:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2016/02/09/more-on-february-2016-microsoft-and-adobe-patches</loc>
		<lastmod>2020-09-07T06:51:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2016/02/09/patch-tuesday-february-2016</loc>
		<lastmod>2022-10-28T01:57:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2016/02/08/newest-java-addresses-binary-planting-vulnerability</loc>
		<lastmod>2020-09-07T06:51:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2016/01/29/what-is-the-apex-predator-doing-to-get-your-information</loc>
		<lastmod>2020-09-07T06:51:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2016/01/20/oracle-critical-patch-update-january-2016</loc>
		<lastmod>2020-09-07T06:51:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2016/01/14/hunting-for-vulnerable-functions-in-microsoft-silverlight-ms16-006</loc>
		<lastmod>2020-09-07T06:19:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2016/01/12/more-on-january-2016-microsoft-and-adobe-patches-with-information-on-retired-internet-explorer</loc>
		<lastmod>2020-09-07T06:51:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2016/01/12/path-tuesday-january-2016</loc>
		<lastmod>2022-10-28T01:57:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/01/11/qualys-was-45-new-features</loc>
		<lastmod>2025-03-18T06:54:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/01/11/qualys-md-28-new-features</loc>
		<lastmod>2020-09-07T06:09:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2016/01/11/qualys-waf-20-new-feature</loc>
		<lastmod>2020-09-07T06:09:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2016/01/07/open-redirection-a-simple-vulnerability-threatens-your-web-applications</loc>
		<lastmod>2020-09-07T06:19:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2015/12/28/last-adobe-0-day-patched-for-the-year</loc>
		<lastmod>2020-09-07T06:51:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2015/12/15/qualys-cloud-agent-client-13-for-windows-now-available</loc>
		<lastmod>2020-09-07T06:09:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2015/12/08/2015-58-increase-in-microsoft-patches</loc>
		<lastmod>2020-09-07T06:51:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2015/12/08/patch-tuesday-december-2015</loc>
		<lastmod>2022-10-28T01:57:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2015/11/25/edellroot-ssl-certificate-vulnerability-highlights-need-for-instant-asset-query</loc>
		<lastmod>2020-09-07T06:19:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2015/11/23/qualys-cloud-agent-for-windows-12-now-available</loc>
		<lastmod>2020-09-07T06:09:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2015/11/16/qualys-was-44-new-features</loc>
		<lastmod>2025-03-18T06:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2015/11/11/more-on-microsoft-and-adobe-patch-tuesday-november-2015</loc>
		<lastmod>2022-10-28T01:57:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2015/11/10/patch-tuesday-november-2015</loc>
		<lastmod>2022-10-28T01:57:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2015/11/06/version-1-20-28-now-running-in-production</loc>
		<lastmod>2020-09-07T06:41:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2015/10/28/obtain-admin-rights-on-joomla-with-sql-injection</loc>
		<lastmod>2020-09-07T07:18:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2015/10/22/unrestricted-file-upload-vulnerability</loc>
		<lastmod>2022-12-15T11:08:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2015/10/21/oracle-critical-patch-update-october-2015</loc>
		<lastmod>2020-09-07T06:51:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2015/10/20/clickjacking-a-common-implementation-mistake-that-can-put-your-websites-in-danger</loc>
		<lastmod>2026-02-24T10:54:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2015/10/19/qualys-md-27-new-features</loc>
		<lastmod>2020-09-07T06:09:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2015/10/19/qualys-was-43-new-features</loc>
		<lastmod>2020-09-07T06:09:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2015/10/19/qualys-cloud-suite-86-new-features</loc>
		<lastmod>2020-09-07T06:09:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2015/10/16/adobe-addresses-0-day-vulnerability-in-flash</loc>
		<lastmod>2020-09-07T06:51:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2015/10/13/more-on-patch-tuesday-october-2015</loc>
		<lastmod>2022-10-28T01:57:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2015/10/13/patch-tuesday-october-2015</loc>
		<lastmod>2022-10-28T01:57:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2015/10/09/implementing-the-tls-maturity-model</loc>
		<lastmod>2020-09-07T06:19:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2015/10/09/security-is-breaking-down-why-now-and-what-can-we-do-about-it-a-conversation-with-tyler-shields-principal-analyst-at-forrester</loc>
		<lastmod>2020-09-07T06:19:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2015/10/08/philippe-courtot-s-qualys-security-conference-keynote-achieving-security-when-everything-is-connected-to-everything</loc>
		<lastmod>2020-09-07T06:19:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2015/10/08/welcome-to-the-2015-qualys-security-conference</loc>
		<lastmod>2020-09-07T06:19:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2015/10/07/new-qualys-app-for-splunk-enterprise</loc>
		<lastmod>2020-09-07T06:09:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/misc/2015/10/06/qualys-named-to-cloud-top-500</loc>
		<lastmod>2025-05-14T14:11:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2015/09/21/september-patch-adobe-flash</loc>
		<lastmod>2020-09-07T06:52:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2015/09/16/blindelephant-then-and-now</loc>
		<lastmod>2020-09-07T06:19:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2015/09/11/new-penalty-for-rc4-only-servers-in-october-2015</loc>
		<lastmod>2020-09-07T06:41:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2015/09/08/microsoft-patch-tuesday-september-2015</loc>
		<lastmod>2022-10-28T01:57:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2015/09/08/patch-tuesday-september-2015</loc>
		<lastmod>2022-10-28T01:57:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2015/08/28/pebble-smart-watch-developer-portal-vulnerability</loc>
		<lastmod>2020-09-07T06:19:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2015/08/24/no-change-to-rc4-grading-in-september</loc>
		<lastmod>2020-09-07T06:41:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2015/08/18/ms15-093-oob-fix-for-internet-explorer</loc>
		<lastmod>2020-09-07T06:52:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2015/08/11/adobe-microsoft-and-firefox-updates-august-2015</loc>
		<lastmod>2020-09-07T06:52:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2015/08/11/patch-tuesday-august-2015</loc>
		<lastmod>2022-10-28T01:57:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2015/07/22/multiple-0-days-in-internet-explorer</loc>
		<lastmod>2020-09-07T06:52:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2015/07/20/forescout-integrates-with-qualys</loc>
		<lastmod>2020-09-07T06:09:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2015/07/14/adobe-microsoft-and-oracle-patch-tuesday-july-2015</loc>
		<lastmod>2022-10-28T01:57:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2015/07/14/qualys-policy-compliance-notification-changes-required-for-oracle-assessments-2</loc>
		<lastmod>2020-09-07T06:09:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2015/07/14/patch-tuesday-july-2015</loc>
		<lastmod>2022-10-28T01:57:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2015/07/08/openssl-vulnerability</loc>
		<lastmod>2022-11-03T23:20:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2015/07/06/hackingteam-0-day-for-flash</loc>
		<lastmod>2020-09-07T06:52:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2015/06/25/qualys-md-264-new-features</loc>
		<lastmod>2020-09-07T06:09:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2015/06/25/qualys-was-42-new-features</loc>
		<lastmod>2025-03-18T07:01:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2015/06/24/security-breach-on-concrete5</loc>
		<lastmod>2020-09-07T06:13:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2015/06/23/new-0-day-for-adobe-flash</loc>
		<lastmod>2020-09-07T06:52:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2015/06/22/top-4-new-settings-in-security-compliance-manager-for-windows-81</loc>
		<lastmod>2020-09-07T06:19:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2015/06/16/device-vulnerabilities-fixed-garrettcom-magnum-series</loc>
		<lastmod>2020-09-07T06:19:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2015/06/09/microsoft-and-adobe-patch-tuesday-june-2015</loc>
		<lastmod>2022-10-28T01:57:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2015/06/09/patch-tuesday-june-2015</loc>
		<lastmod>2022-10-28T01:57:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2015/06/08/introducing-tls-maturity-model</loc>
		<lastmod>2020-09-07T06:41:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2015/05/22/ssl-labs-increased-penalty-when-tls-12-is-not-supported</loc>
		<lastmod>2022-12-23T08:18:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2015/05/21/ssl-labs-117-obsolete-crypto-rc4-and-logjam</loc>
		<lastmod>2020-09-07T06:41:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2015/05/14/magento-rce-a-call-for-application-security-templates</loc>
		<lastmod>2020-09-07T06:19:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2015/05/13/venom-hypervisor-vulnerability</loc>
		<lastmod>2022-11-03T23:20:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2015/05/12/bsi-in-a-nutshell-patch-these-software-packages</loc>
		<lastmod>2020-09-07T06:52:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2015/05/12/microsoft-patch-tuesday-may-2015</loc>
		<lastmod>2022-10-28T01:57:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2015/05/12/patch-tuesday-may-2015</loc>
		<lastmod>2022-10-28T01:57:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/misc/2015/05/11/call-for-papers-qualys-security-conference-2015</loc>
		<lastmod>2020-09-07T05:48:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2015/05/06/wordpress-when-half-of-all-websites-are-vulnerable</loc>
		<lastmod>2020-09-07T07:18:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2015/05/04/what-you-need-to-know-about-the-upcoming-leap-second</loc>
		<lastmod>2020-09-07T06:13:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2015/05/01/us-cert-top-30-vulnerabilities</loc>
		<lastmod>2020-09-07T06:52:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2015/04/28/whats-new-in-ssl-labs-116x</loc>
		<lastmod>2020-09-07T06:41:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2015/04/23/ssl-labs-rc4-deprecation-plan</loc>
		<lastmod>2020-09-07T06:41:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2015/04/21/deploy-virtual-patches-on-qualys-waf-automatically-based-on-detected-web-app-vulnerabilities</loc>
		<lastmod>2020-09-07T06:13:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2015/04/21/qualys-continuous-monitoring-now-looks-inside-your-network</loc>
		<lastmod>2020-09-07T06:13:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2015/04/21/introducing-the-new-groundbreaking-qualys-cloud-agent-platform</loc>
		<lastmod>2021-03-22T00:06:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2015/04/20/ms15-034-analyze-and-remote-detection</loc>
		<lastmod>2020-09-07T06:19:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2015/04/16/security-issues-discovered-and-fixed-in-searchblox</loc>
		<lastmod>2021-02-01T09:32:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2015/04/15/qualys-continuous-monitoring-17-new-features</loc>
		<lastmod>2020-09-07T06:13:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2015/04/15/update-new-detection-for-pci-dss-31</loc>
		<lastmod>2020-09-07T06:13:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2015/04/14/top-5-client-side-patch-tuesday-vulnerabilities-from-microsoft-oracle-and-adobe-april-2015</loc>
		<lastmod>2022-10-28T01:57:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2015/04/14/top-5-server-side-patch-tuesday-vulnerabilities-from-microsoft-oracle-and-adobe-april-2015</loc>
		<lastmod>2022-10-28T01:57:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2015/04/14/patch-tuesday-april-2015</loc>
		<lastmod>2022-10-28T01:57:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2015/04/13/qualys-was-41-new-features</loc>
		<lastmod>2020-09-07T06:13:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2015/04/06/new-detections-for-pci-dss-31</loc>
		<lastmod>2020-09-07T06:13:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2015/03/30/qualys-scap-auditor-12-certification-completed</loc>
		<lastmod>2020-09-07T06:13:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2015/03/17/ghost-remote-code-execution-exploit</loc>
		<lastmod>2025-07-30T09:41:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2015/03/10/microsoft-patch-tuesday-march-2015</loc>
		<lastmod>2022-10-28T01:57:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2015/03/10/patch-tuesday-march-2015</loc>
		<lastmod>2022-10-28T01:57:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/misc/2015/03/09/call-for-customer-presenters-in-qualys-booth-at-rsa-conference-2015</loc>
		<lastmod>2020-09-07T05:48:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2015/03/06/addressing-cve-2015-0204-freak-with-qualys-vm</loc>
		<lastmod>2020-09-07T06:13:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2015/03/03/openssl-cookbook-2nd-edition-released</loc>
		<lastmod>2022-11-03T23:20:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2015/03/03/top-10-vulnerabilities-february-2015</loc>
		<lastmod>2020-09-07T06:52:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2015/03/03/qualys-policy-compliance-notification-changes-required-for-oracle-assessments</loc>
		<lastmod>2020-09-07T06:13:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/product-tech/2015/02/25/qualys-and-bmc-join-forces-to-close-the-secops-gap</loc>
		<lastmod>2020-09-07T06:13:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2015/02/24/how-to-check-for-unprotected-mongodb-databases</loc>
		<lastmod>2022-12-19T10:14:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2015/02/19/how-a-missing-security-check-enabled-a-csrf-attack</loc>
		<lastmod>2021-01-28T05:48:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/misc/2015/02/13/qualys-named-a-finalist-for-seven-sc-awards</loc>
		<lastmod>2025-05-14T14:08:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2015/02/10/patch-tuesday-february-2015</loc>
		<lastmod>2022-10-28T01:57:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2015/02/02/february-0-day-for-adobe-flash</loc>
		<lastmod>2020-09-07T06:52:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2015/01/27/the-ghost-vulnerability</loc>
		<lastmod>2026-02-24T09:47:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.qualys.com/vulnerabilities-threat-research/2015/01/26/protect-your-applications-from-hacker-research</loc>
		<lastmod>2021-01-28T05:45:07+00:00</lastmod>
	</url>
</urlset>
<!-- Sitemap is served from cache -->
