Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

The Ongoing Saga of Cybersecurity Threats: A Deluge of Vulnerabilities and Exploits


Recent weeks have seen a plethora of cybersecurity threats emerge, each with its unique characteristics and implications for organizations worldwide. This article will delve into some of the most significant exploits and vulnerabilities that have made headlines, highlighting the importance of vigilance and proactive measures to safeguard against these threats.

  • Threat actors exploited a maximum-severity security flaw in Quest KACE Systems Management Appliance (SMA), allowing attackers to impersonate legitimate users without valid credentials.
  • The vulnerability, CVE-2025-32975, was patched by Quest in May 2025 but appears that some organizations have yet to apply the necessary updates.
  • Threat actors used the vulnerability to seize control of administrative accounts and execute remote commands, dropping Base64-encoded payloads from an external server via the curl command.
  • Credential harvesting using Mimikatz was also detected, as well as discovery and reconnaissance by enumerating logged-in users and administrator accounts.
  • The lack of patching and exposure to the internet may have contributed to this vulnerability being exploited.
  • Administrators are advised to apply the latest updates and avoid exposing SMA instances to the internet.
  • Armada, FortiGate devices, and other vulnerabilities have also emerged, highlighting the ongoing threat landscape for organizations worldwide.
  • The COVID-19 pandemic has accelerated the shift towards remote work, introducing new vulnerabilities and risks to organizations.



  • Threat actors have once again showcased their prowess in exploiting vulnerabilities and pushing the boundaries of cybersecurity. In recent weeks, a plethora of threats has emerged, each with its unique characteristics and implications for organizations worldwide. This article will delve into some of the most significant exploits and vulnerabilities that have made headlines, highlighting the importance of vigilance and proactive measures to safeguard against these threats.

    In one of the most concerning developments, threat actors have been observed exploiting a maximum-severity security flaw in Quest KACE Systems Management Appliance (SMA), according to Arctic Wolf. This vulnerability, identified as CVE-2025-32975, allows attackers to impersonate legitimate users without valid credentials, thereby facilitating the complete takeover of administrative accounts. The issue was patched by Quest in May 2025, but it appears that some organizations have yet to apply the necessary updates.

    The malicious activity detected by Arctic Wolf suggests that threat actors have weaponized the vulnerability to seize control of administrative accounts and execute remote commands to drop Base64-encoded payloads from an external server via the curl command. Furthermore, they created additional administrative accounts via "runkbot.exe," a background process associated with the SMA Agent used to run scripts and manage installations. Windows Registry modifications were also detected using a PowerShell script for possible persistence or system configuration changes.

    Another notable threat involves credential harvesting using Mimikatz, as well as conducting discovery and reconnaissance by enumerating logged-in users and administrator accounts, and running "net time" and "net group" commands. Remote desktop protocol (RDP) access to backup infrastructure (Veeam, Veritas) and domain controllers was also obtained.

    The lack of patching and exposure to the internet may have contributed to this vulnerability being exploited, according to Arctic Wolf. To counter this threat, administrators are advised to apply the latest updates and avoid exposing SMA instances to the internet. The issue has been addressed in versions 13.0.385, 13.1.81, 13.2.183, 14.0.341 (Patch 5), and 14.1.101 (Patch 4).

    This incident serves as a reminder of the importance of timely patching and proactive security measures. Organizations must ensure that their systems are up-to-date and that employees are aware of the risks associated with vulnerable software. Furthermore, it highlights the need for robust cybersecurity strategies that include monitoring and detection capabilities to identify potential threats in real-time.

    In addition to this exploit, several other significant vulnerabilities and exploits have emerged in recent weeks. For instance, a maximum-severity security flaw in FortiGate devices has been exploited to breach networks and steal service account credentials. Microsoft has also patched 84 flaws in its March Patch Tuesday, including two public zero-days. Critical n8n flaws allow remote code execution and exposure of stored credentials.

    Moreover, six Android malware families have targeted Pix Payments, banking apps, and crypto wallets, highlighting the ongoing threat landscape for mobile devices. Furthermore, Apple has issued security updates for older iOS devices targeted by Coruna WebKit exploits.

    The COVID-19 pandemic has accelerated the shift towards remote work, which has introduced new vulnerabilities and risks to organizations worldwide. As a result, it is more crucial than ever to invest in robust cybersecurity measures that can detect and respond to threats in real-time.

    In conclusion, the ongoing saga of cybersecurity threats is a complex and multifaceted issue that requires proactive measures from organizations and individuals alike. By staying informed about emerging vulnerabilities and exploits, and by taking steps to patch and secure systems, we can mitigate the impact of these threats and create a safer digital landscape for all.

    Recent weeks have seen a plethora of cybersecurity threats emerge, each with its unique characteristics and implications for organizations worldwide. This article will delve into some of the most significant exploits and vulnerabilities that have made headlines, highlighting the importance of vigilance and proactive measures to safeguard against these threats.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/The-Ongoing-Saga-of-Cybersecurity-Threats-A-Deluge-of-Vulnerabilities-and-Exploits-ehn.shtml

  • https://thehackernews.com/2026/03/hackers-exploit-cve-2025-32975-cvss-100.html

  • https://www.purple-ops.io/cybersecurity-threat-intelligence-blog/real-time-ransomware-intelligence-kace/

  • https://nvd.nist.gov/vuln/detail/CVE-2025-32975

  • https://www.cvedetails.com/cve/CVE-2025-32975/


  • Published: Mon Mar 23 03:01:56 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us