Qubes OS is a free and open-source, security-oriented operating system for single-user desktop computing. Qubes OS leverages Xen-based virtualization to allow for the creation and management of isolated compartments called qubes.
The Qubes documentation has successfully migrated to Read the Docs!
The migration of the Qubes documentation to Read the Docs is now complete! As of today, the new documentation hosted by Read the Docs has officially replaced the old documentation, and all old documentation URLs will automatically redirect to their new counterparts at (…)
The Xen Project has released one or more Xen security advisories (XSAs). The security of Qubes OS is not affected. XSAs that DO affect the security of Qubes OS The following XSAs do affect the security of Qubes OS: (none) XSAs that DO NOT affect the security of Qubes OS The (…)
We have published Qubes Canary 044. The text of this canary and its accompanying cryptographic signatures are reproduced below. For an explanation of this announcement and instructions for authenticating this canary, please see the end of this announcement. Qubes Canary 044 (…)
QSB-109: Intel microcode updates
We have published Qubes Security Bulletin (QSB) 109: Intel microcode updates. The text of this QSB and its accompanying cryptographic signatures are reproduced below, followed by a general explanation of this announcement and authentication instructions. Qubes Security (…)
Qubes OS 4.3.0-rc1 is available for testing
We’re pleased to announce that the first release candidate (RC) for Qubes OS 4.3.0 is now available for testing. This minor release includes many new features and improvements over Qubes OS 4.2. What’s new in Qubes 4.3? Dom0 upgraded to Fedora 41 (#9402). Xen upgraded to (…)
New Fedora 42 templates are now available for Qubes OS 4.2 in standard, minimal, and Xfce varieties. There are two ways to upgrade a template to a new Fedora release: Recommended: Install a fresh template to replace an existing one. This option is simpler for less (…)
The Qubes documentation is migrating to Read the Docs!
We’re pleased to announce that we’re officially migrating to Read the Docs as our documentation generation and hosting platform. Our documentation source files will continue to reside in the qubes-doc Git repository with PGP-signed tags and commits, and the live documentation (…)
Qubes OS Summit 2025: Tickets for sale and Call for Participation open!
You can now purchase on-site tickets to attend Qubes OS Summit 2025 in person! Please note that a limited number of on-site tickets are available, and tickets are more heavily discounted the earlier they’re purchased. For those who would prefer to participate remotely (…)
The Xen Project has released one or more Xen security advisories (XSAs). The security of Qubes OS is affected. XSAs that DO affect the security of Qubes OS The following XSAs do affect the security of Qubes OS: XSA-471 See QSB-108 XSAs that DO NOT affect the security of (…)
QSB-108: Transitive Scheduler Attacks (XSA-471)
We have published Qubes Security Bulletin (QSB) 108: Transitive Scheduler Attacks (XSA-471). The text of this QSB and its accompanying cryptographic signatures are reproduced below, followed by a general explanation of this announcement and authentication instructions. Qubes (…)
600 GB of Alleged Great Firewall of China Data Published in Largest Leak Yet
Hackers leaked 600 GB of data linked to the Great Firewall of China, exposing documents, code, and operations.…
13 September
From Vibe Coding to Vibe Hacking: Claude AI Abused To Build Ransomware
Anthropic’s Claude AI presently rules the realm of vibe coding. However, the company has unveiled… From Vibe Coding to Vibe Hacking: Claude AI Abused To (…)
12 September
How to write a “welcome to our team” message: Tips, ideas, and 20 ready-to-use templates
“Welcome to the team” messages can fall flat. Write the best onboarding email with these 20 creative templates that will make new hires feel valued from day (…)
12 September
Chinese APT Deploys EggStreme Fileless Malware to Breach Philippine Military Systems
An advanced persistent threat (APT) group from China has been attributed to the compromise of a Philippines-based military company using a previously (…)
10 September