BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
CIPHER
The Vault
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
CIPHERThe VaultThreat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Critical CVSS 10.0 Quest KACE Exploit, IRS Phishing Campaign, and Supply Chain Attacks Dominate Threat Landscape

Critical CVSS 10.0 Quest KACE Exploit, IRS Phishing Campaign, and Supply Chain Attacks Dominate Threat Landscape

March 23, 2026Vulnerabilities & Exploits3 min readcritical

Originally reported by The Hacker News, Qualys, SANS ISC, MSRC Security Updates

#quest-kace#supply-chain-attack#phishing#container-security#chromium#rmm-malware#active-exploitation
Share

TL;DR

Arctic Wolf reports active exploitation of CVE-2025-32975 (CVSS 10.0) in Quest KACE systems, while Microsoft warns of tax season phishing campaigns affecting 29,000 users and deploying RMM malware. A supply chain attack on Trivy has spread infostealer malware through compromised Docker images.

Why critical?

Active exploitation of a CVSS 10.0 vulnerability in Quest KACE systems, combined with ongoing supply chain attacks affecting Docker Hub and large-scale phishing campaigns, represents multiple critical threat vectors requiring immediate attention.

Quest KACE Systems Under Active Attack via CVSS 10.0 Vulnerability

Arctic Wolf has observed active exploitation of CVE-2025-32975, a maximum-severity vulnerability affecting Quest KACE Systems Management Appliance (SMA). The security firm detected malicious activity starting the week of March 9, 2026, targeting unpatched SMA systems exposed to the internet.

The CVSS 10.0 rating indicates a vulnerability that allows unauthenticated remote code execution with minimal complexity. Organizations running Quest KACE SMA should immediately verify patch status and isolate internet-facing instances where possible.

Tax Season Phishing Campaign Deploys RMM Malware to 29,000 Users

Microsoft has identified fresh phishing campaigns exploiting the U.S. tax season to harvest credentials and deliver malware. The attacks leverage the time-sensitive nature of tax communications, masquerading as IRS refund notices, payroll forms, filing reminders, and requests from tax professionals.

The campaigns have successfully compromised approximately 29,000 users, with threat actors deploying remote monitoring and management (RMM) tools as persistent access mechanisms. The use of legitimate RMM software allows attackers to maintain long-term access while evading traditional detection methods.

Trivy Supply Chain Attack Spreads via Docker Hub

Cybersecurity researchers have uncovered malicious Docker images distributed through Docker Hub following a supply chain compromise of Trivy, the popular vulnerability scanner. The attack affects versions 0.69.4, 0.69.5, and 0.69.6, which have since been removed from the container registry.

The compromised images contained infostealer malware designed to spread through containerized environments, with additional worm capabilities and Kubernetes wiping functionality. The last known clean release remains version 0.69.3. Organizations using Trivy should immediately audit their container deployments and revert to the verified clean version.

Qualys Enhances Harbor Integration for Container Security

Qualys has announced improved integration between its QScanner and Harbor container registry, focusing on continuous assessment capabilities. The enhancement addresses a common DevSecOps challenge where build-time and runtime security decisions rely on different tools and scoring systems.

The integration enables scan-on-push functionality and maintains consistent risk assessment across the container lifecycle, helping development and security teams operate with shared threat intelligence and prioritization logic.

Chromium Integer Overflow Fixed in Latest Release

Microsoft has acknowledged CVE-2026-4464, an integer overflow vulnerability in Chromium's ANGLE component. The issue affects Microsoft Edge through its Chromium base and has been addressed in the latest Chrome release.

The vulnerability originated in ANGLE, Chromium's graphics abstraction layer, and could potentially allow memory corruption attacks. Users should ensure their browsers are updated to the latest versions.

SANS ISC Monday Briefing Available

The SANS Internet Storm Center has published its regular Monday briefing covering current threat landscape developments and security advisories. The briefing provides additional context on emerging threats and defensive recommendations for security practitioners.

Sources

  • https://thehackernews.com/2026/03/hackers-exploit-cve-2025-32975-cvss-100.html
  • https://thehackernews.com/2026/03/microsoft-warns-irs-phishing-hits-29000.html
  • https://thehackernews.com/2026/03/trivy-hack-spreads-infostealer-via.html
  • https://blog.qualys.com/product-tech/2026/03/22/integrate-qscanner-with-harbor-to-unify-devsecops-container-scanning
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-4464
  • https://isc.sans.edu/diary/rss/32818

Originally reported by The Hacker News, Qualys, SANS ISC, MSRC Security Updates

Tags

#quest-kace#supply-chain-attack#phishing#container-security#chromium#rmm-malware#active-exploitation

Related Intelligence

  • CISA Adds Maximum Severity Cisco Vulnerability to KEV Catalog Amid Ransomware Exploitation

    criticalMar 23, 2026
  • Supply Chain Attack Compromises Aqua Security's Trivy Scanner

    criticalMar 21, 2026
  • CISA Adds FileZen to KEV as Multiple Critical Vulnerabilities Surface

    criticalFeb 25, 2026

Related Knowledge

  • CIPHER Training: Vulnerability Research Deep Dive

    offensive
  • CIPHER Web Security Deep Dive — Training Knowledge Base

    offensive
  • CIPHER Offensive Security Deep Reference

    offensive

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Digital Rights Under Siege: Xbox Console Cracked, Gaza's Missing Persons Crisis Deepens

Next Article

CISA Adds Maximum Severity Cisco Vulnerability to KEV Catalog Amid Ransomware Exploitation →