22/03/2026 Cyber Security Briefly News - Escalating Cyber Landscape: Supply Chain Compromises, State-Sponsored Phishing, and Critical Vulnerability Exploitation
โฑ๏ธ Concise Cyber Intel: Time-Saving Strategic Analysis for Pros

๐ Top Headlines at a Glance
- Security Affairs newsletter Round 568 by Pierluigi Paganini โ INTERNATIONAL EDITION
- Trivy vulnerability scanner breach pushed infostealer via GitHub Actions
- FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks
- Critical Quest KACE Vulnerability Potentially Exploited in Attacks
Executive Summary: Today's intelligence highlights a diverse and escalating threat landscape. Key concerns include sophisticated supply chain attacks distributing infostealers, targeted phishing campaigns by state-sponsored actors against high-value individuals using commercial messaging applications, and the active exploitation of critical vulnerabilities in enterprise software. Ransomware continues to impact municipal infrastructure, underscoring the persistent and varied nature of cyber risks demanding immediate, multi-faceted defensive strategies.
๐ Technical Intelligence Breakdown
๐ฐ Security Affairs newsletter Round 568 by Pierluigi Paganini โ INTERNATIONAL EDITION
This intelligence round-up identifies two distinct threat vectors. The WorldLeaks ransomware group has reportedly breached the City of Los Angels, indicating ongoing threats to municipal entities. Additionally, a PolyShell flaw has been identified, which exposes systems running Magento and Adobe Commerce.
- Ransomware Impact: The
WorldLeaksgroup's breach ofCity of Los Angelshighlights the critical need for robust ransomware defenses, including immutable backups, strong access controls, and incident response planning for public sector organizations. - Vulnerability Exposure: The
PolyShellflaw affectingMagentoandAdobe Commerceplatforms necessitates immediate patching and security reviews for organizations utilizing these e-commerce solutions to prevent potential exploitation.
โ๏ธ Trivy vulnerability scanner breach pushed infostealer via GitHub Actions
A significant supply-chain attack has compromised the Trivy vulnerability scanner. Threat actors, identified as TeamPCP, leveraged this compromise to distribute credential-stealing malware. The distribution vector included official releases and exploitation of GitHub Actions.
- Attack Vector: Compromise of a widely used security tool,
Trivy, demonstrates the high impact of supply chain attacks. - Malware Distribution: The infostealer was pushed through trusted channels, specifically official releases and
GitHub Actions, making detection challenging. - Threat Actor:
TeamPCPis attributed to this sophisticated operation. - Defensive Measures:
- Verify integrity of all downloaded software, especially security tools, using hashes or digital signatures.
- Implement strict security policies for CI/CD pipelines, particularly
GitHub Actions, to prevent unauthorized code injection. - Monitor for unusual network activity or credential access attempts following software updates.
๐ฃ FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) have issued a warning regarding phishing campaigns conducted by threat actors affiliated with Russian Intelligence Services. These campaigns specifically target commercial messaging applications (CMAs) such as WhatsApp and Signal. The objective is to seize control of accounts belonging to individuals deemed to have high intelligence value.
- Targeted Platforms:
WhatsAppandSignalare being exploited due to their widespread use and perceived security. - Threat Actor Attribution: The campaigns are linked to
Russian Intelligence Services. - Objective: Account takeover to access sensitive communications and data from high-value targets.
- Defensive Actions:
- Enable multi-factor authentication (MFA) on all messaging applications.
- Exercise extreme caution with unsolicited messages or links, even from known contacts.
- Educate high-value personnel on advanced phishing techniques and social engineering.
๐จ Critical Quest KACE Vulnerability Potentially Exploited in Attacks
A critical vulnerability, tracked as CVE-2025-32975, affecting Quest KACE products has been identified. There is a potential that this vulnerability has already been exploited in active attacks, with a specific focus on the education sector.
- Vulnerability Identified:
CVE-2025-32975inQuest KACE. - Potential Exploitation: Evidence suggests this flaw may be actively leveraged by threat actors.
- Target Sector: The education sector is noted as a primary target for these potential attacks.
- Attack Path (Potential):
Vulnerable Quest KACE System-->Exploitation of CVE-2025-32975-->Unauthorized Access/Control - Mitigation:
- Organizations using
Quest KACEshould immediately apply any available patches or workarounds forCVE-2025-32975. - Conduct thorough audits of
Quest KACEinstallations, especially within the education sector, for signs of compromise. - Isolate affected systems if patching is not immediately feasible.
- Organizations using
๐ฐ Security Affairs newsletter Round 568 by Pierluigi Paganini โ INTERNATIONAL EDITION
Dataset provides limited detail, reiterating the content from a previous item. This newsletter round-up once again highlights the breach of the City of Los Angels by the WorldLeaks ransomware group and the PolyShell flaw impacting Magento and Adobe Commerce. The repeated mention underscores the ongoing relevance and severity of these threats.
- Persistent Threats: The re-emphasis on
WorldLeaksransomware and thePolyShellflaw indicates these are current and significant concerns. - Defensive Focus: Organizations should prioritize patching known vulnerabilities, particularly those affecting widely used platforms like
MagentoandAdobe Commerce. Implementing robust ransomware protection and incident response plans remains critical for all sectors, including municipal governments.
๐ Threat Landscape & Trends
- Supply Chain Vulnerabilities: The compromise of a widely used security scanner (
Trivy) viaGitHub Actionshighlights the increasing sophistication and impact of supply chain attacks, turning trusted software into a distribution vector for malicious payloads like infostealers. - State-Sponsored Phishing:
Russian Intelligence Servicescontinue to conduct targeted phishing campaigns, focusing on high-value individuals and leveraging popular commercial messaging applications (WhatsApp,Signal) for account takeover, indicating a persistent threat to sensitive communications. - Ransomware Persistence: The
WorldLeaksransomware group's breach of theCity of Los Angelsdemonstrates that ransomware remains a critical and active threat to public sector infrastructure, necessitating robust defensive postures. - Rapid Exploitation of Critical Vulnerabilities: The potential exploitation of
CVE-2025-32975inQuest KACEshortly after its discovery, particularly targeting the education sector, underscores the urgency for prompt patching and vulnerability management. - Broad Attack Surface: Threats span from enterprise software vulnerabilities (
Quest KACE,Magento,Adobe Commerce) to individual communication platforms, requiring comprehensive security strategies.
๐ Strategic Takeaway
Organizations must adopt a proactive, multi-layered defense strategy that prioritizes supply chain security, implements robust phishing awareness and multi-factor authentication for all users, maintains an aggressive patch management program for critical vulnerabilities, and develops resilient incident response capabilities to counter the diverse and evolving threat landscape.
๐ References
- Security Affairs newsletter Round 568 by Pierluigi Paganini โ INTERNATIONAL EDITION
- Trivy vulnerability scanner breach pushed infostealer via GitHub Actions
- FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks
- Critical Quest KACE Vulnerability Potentially Exploited in Attacks





