<?xml version="1.0"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:neowin="https://www.neowin.net/">
	<channel>
		<title>Neowin News Feed for: Qualys</title>
		<link>https://www.neowin.net/news/tag/qualys/</link>
        <atom:link href="https://www.neowin.net/news/rss/qualys/" rel="self" type="application/rss+xml" />
		<description>Neowin News Feed for: Qualys</description>
		<language>en-us</language>
		<generator>Neowin Ignition News</generator>
		<managingEditor>editor@neowin.net (Managing Editor)</managingEditor>
		<webMaster>developers@neowin.net (Neowin Developers)</webMaster>
		<ttl>5</ttl>
		<image>
			<title>Neowin.net</title>
			<url>https://www.neowin.net/images/pegasus/icon.png</url>
			<link>https://www.neowin.net</link>
		</image>
		        <item>
            <title>Ubuntu&#039;s apport affected by core dump vulnerability, here&#039;s how to patch</title>
            <link>https://www.neowin.net/news/ubuntus-apport-affected-by-core-dump-vulnerability-heres-how-to-patch/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2025/05/1746170544_1647455145_new-ubuntu-logo_1_medium.jpg" alt="" /&gt;&lt;/div&gt;Ubuntu&amp;#039;s apport has been discovered to contain a vulnerability that could put your sensitive information at risk. Here&amp;#039;s how to patch your system. &lt;a href="https://www.neowin.net/news/ubuntus-apport-affected-by-core-dump-vulnerability-heres-how-to-patch/"&gt;Read more...&lt;/a&gt;</description>
            <author>Paul Hill</author>
            <pubDate>Sat, 31 May 2025 14:44:01 +0000</pubDate>
            <guid>https://www.neowin.net/news/ubuntus-apport-affected-by-core-dump-vulnerability-heres-how-to-patch/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2025/05/1746170544_1647455145_new-ubuntu-logo_1_story.jpg" width="760" height="428" />
            <neowin:tags>#Ubuntu #Linux</neowin:tags>            <neowin:twitter>@ziks_99</neowin:twitter>        </item>
                <item>
            <title>Ubuntu patches needrestart security vulnerability</title>
            <link>https://www.neowin.net/news/ubuntu-patches-needrestart-security-vulnerability/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2025/05/1746170544_1647455145_new-ubuntu-logo_1_medium.jpg" alt="" /&gt;&lt;/div&gt;Canonical has updated Ubuntu with patches for the needrestart package. Qualys recently found a vulnerability which could give attackers root privileges. &lt;a href="https://www.neowin.net/news/ubuntu-patches-needrestart-security-vulnerability/"&gt;Read more...&lt;/a&gt;</description>
            <author>Paul Hill</author>
            <pubDate>Wed, 20 Nov 2024 15:28:01 +0000</pubDate>
            <guid>https://www.neowin.net/news/ubuntu-patches-needrestart-security-vulnerability/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2025/05/1746170544_1647455145_new-ubuntu-logo_1_story.jpg" width="760" height="428" />
            <neowin:tags>#Ubuntu #Needrestart</neowin:tags>            <neowin:twitter>@ziks_99</neowin:twitter>        </item>
                <item>
            <title>Microsoft employee accidentally saves global Linux meltdown from CVE-2024-3094 XZ backdoor</title>
            <link>https://www.neowin.net/news/microsoft-employee-accidentally-saves-global-linux-meltdown-from-cve-2024-3094-xz-backdoor/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2020/04/1588189631_ms_loves_linux_medium.jpg" alt="" /&gt;&lt;/div&gt;A curious Microsoft employee has saved the world from a potential global meltdown as several Linux distros were found vulnerable to an XZ backdoor tracked under CVE-2024-3094 (CVSS score of 10.0). &lt;a href="https://www.neowin.net/news/microsoft-employee-accidentally-saves-global-linux-meltdown-from-cve-2024-3094-xz-backdoor/"&gt;Read more...&lt;/a&gt;</description>
            <author>Sayan Sen</author>
            <pubDate>Tue, 02 Apr 2024 07:58:02 +0000</pubDate>
            <guid>https://www.neowin.net/news/microsoft-employee-accidentally-saves-global-linux-meltdown-from-cve-2024-3094-xz-backdoor/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2020/04/1588189631_ms_loves_linux_story.jpg" width="760" height="428" />
            <neowin:tags>#XzBackdoor #Microsoft #CVE</neowin:tags>            <neowin:twitter>@ssc_combater007</neowin:twitter>        </item>
                <item>
            <title>Every major Linux distro has been vulnerable for the last 12 years due to Polkit pkexec flaw</title>
            <link>https://www.neowin.net/news/every-major-linux-distro-has-been-vulnerable-for-the-last-12-years-due-to-polkit-pkexec-flaw/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="https://cdn.neowin.com/news/images/uploaded/2022/01/1643168010_pwnkit_medium.jpg" alt="" /&gt;&lt;/div&gt;An LPE security vulnerability under the ID CVE-2021-4034 was found by Linux security researchers at Qualys. The bug has been present for 12+ years and almost every major Linux distro is vulnerable. &lt;a href="https://www.neowin.net/news/every-major-linux-distro-has-been-vulnerable-for-the-last-12-years-due-to-polkit-pkexec-flaw/"&gt;Read more...&lt;/a&gt;</description>
            <author>Sayan Sen</author>
            <pubDate>Wed, 26 Jan 2022 05:26:01 +0000</pubDate>
            <guid>https://www.neowin.net/news/every-major-linux-distro-has-been-vulnerable-for-the-last-12-years-due-to-polkit-pkexec-flaw/</guid>
            <media:thumbnail url="https://cdn.neowin.com/news/images/uploaded/2022/01/1643168010_pwnkit_story.jpg" width="760" height="428" />
            <neowin:tags>#PwnKit #LinuxMalware #Linux</neowin:tags>            <neowin:twitter>@ssc_combater007</neowin:twitter>        </item>
                <item>
            <title>Windows XP for enterprise market share drops below 10 percent</title>
            <link>https://www.neowin.net/news/windows-xp-for-enterprise-market-share-drops-below-10-percent/</link>
            <description>&lt;div style="float:left;margin-right:10px;"&gt;&lt;img src="/images/news/logos/63174411windows-xp-02.png" alt="" /&gt;&lt;/div&gt;The security firm Qualys claims that the market share of PCs that still use Windows XP among enterprise customers has dropped below 10 percent for the first time. &lt;a href="https://www.neowin.net/news/windows-xp-for-enterprise-market-share-drops-below-10-percent/"&gt;Read more...&lt;/a&gt;</description>
            <author>John Callaham</author>
            <pubDate>Thu, 15 May 2014 13:18:30 +0000</pubDate>
            <guid>https://www.neowin.net/news/windows-xp-for-enterprise-market-share-drops-below-10-percent/</guid>
            <media:thumbnail url="/images/news/logos/63174411windows-xp-02.png" width="760" height="428" />
                        <neowin:twitter>@JCalNEO</neowin:twitter>        </item>
        	</channel>
</rss>
