Originally reported by The Hacker News, Microsoft Security, MSRC Security Updates
TL;DR
Threat actors compromised Trivy vulnerability scanner multiple times, deploying self-propagating CanisterWorm malware across 47 npm packages and stealing CI/CD secrets from GitHub Actions. Meanwhile, CISA added 5 actively exploited vulnerabilities affecting Apple, Craft CMS, and Laravel to its KEV catalog with an April 3rd patching deadline.
CISA added 5 actively exploited vulnerabilities to KEV catalog requiring federal agency patching by April 3rd, and multiple critical supply chain attacks targeting Trivy scanner with self-propagating malware affecting 47 npm packages.
The cybersecurity landscape faced significant upheaval this week as supply chain attacks targeted critical infrastructure tools while federal agencies scrambled to address newly confirmed exploitation vectors.
Threat actors behind the Trivy scanner supply chain attack have escalated their campaign with a previously undocumented self-propagating worm called CanisterWorm. The malware has compromised 47 npm packages, leveraging ICP canisters (tamperproof smart contracts) for persistence and propagation across the JavaScript ecosystem.
The attack represents a sophisticated evolution in supply chain compromise techniques, demonstrating how threat actors can weaponize legitimate security tools to create widespread impact across development environments.
Aqua Security's Trivy vulnerability scanner suffered a second breach within 30 days, with attackers compromising the GitHub Actions repositories "aquasecurity/trivy-action" and "aquasecurity/setup-trivy." The compromise affected 75 tags and enabled theft of sensitive CI/CD secrets from organizations using these actions for container vulnerability scanning.
The repeated targeting of Trivy demonstrates the high value threat actors place on security tooling as attack vectors, potentially allowing them to infiltrate the very systems designed to detect their activities.
CISA added five actively exploited vulnerabilities to its Known Exploited Vulnerabilities catalog, mandating federal agencies patch them by April 3, 2026:
CVE-2025-31277 (CVSS 8.8) affecting Apple productsThe expedited timeline reflects the confirmed active exploitation of these vulnerabilities in the wild, requiring immediate attention from federal cybersecurity teams.
CVE-2026-33017 (CVSS 9.3), a critical authentication bypass and code injection vulnerability in Langflow, came under active exploitation within 20 hours of public disclosure. The vulnerability affects the POST /api/v1 endpoint and enables remote code execution, highlighting the increasingly rapid weaponization timeline for publicly disclosed flaws.
The speed of exploitation underscores the critical importance of coordinated disclosure practices and rapid patch deployment in modern threat landscapes.
Microsoft unveiled CTI-REALM, an open-source benchmark for evaluating AI agents' capability to convert cyber threat intelligence into validated detection rules. The framework aims to standardize assessment of AI-driven detection engineering across the security industry.
Microsoft published information on several new vulnerabilities:
CVE-2026-23204: Linux net/sched cls_u32 issue requiring skb_header_pointer_careful() usageCVE-2026-23274: Netfilter xt_IDLETIMER revision 0 ALARM timer label reuse rejectionCVE-2026-23276: Network tunnel transmission recursion limit additionCVE-2026-3634: Libsoup HTTP header injection and response splitting via CRLF injectionCVE-2026-3479: Python pkgutil.get_data() restriction enforcement failureCVE-2026-27459: pyOpenSSL DTLS cookie callback buffer overflowCVE-2026-30922: pyasn1 denial of service via unbounded recursionCVE-2026-26118: Azure MCP Server Tools elevation of privilege vulnerabilityOriginally reported by The Hacker News, Microsoft Security, MSRC Security Updates