BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
CIPHER
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
CIPHERThreat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Critical Supply Chain Attacks Hit Trivy Scanner While CISA Adds 5 CVEs to KEV Catalog

Critical Supply Chain Attacks Hit Trivy Scanner While CISA Adds 5 CVEs to KEV Catalog

March 21, 2026Vulnerabilities & Exploits3 min readcritical

Originally reported by The Hacker News, Microsoft Security, MSRC Security Updates

#supply-chain-attacks#trivy#npm-packages#cisa-kev#github-actions#langflow#vulnerability-disclosure
Share

TL;DR

Threat actors compromised Trivy vulnerability scanner multiple times, deploying self-propagating CanisterWorm malware across 47 npm packages and stealing CI/CD secrets from GitHub Actions. Meanwhile, CISA added 5 actively exploited vulnerabilities affecting Apple, Craft CMS, and Laravel to its KEV catalog with an April 3rd patching deadline.

Why critical?

CISA added 5 actively exploited vulnerabilities to KEV catalog requiring federal agency patching by April 3rd, and multiple critical supply chain attacks targeting Trivy scanner with self-propagating malware affecting 47 npm packages.

The cybersecurity landscape faced significant upheaval this week as supply chain attacks targeted critical infrastructure tools while federal agencies scrambled to address newly confirmed exploitation vectors.

CanisterWorm Spreads Across npm Ecosystem Following Trivy Compromise

Threat actors behind the Trivy scanner supply chain attack have escalated their campaign with a previously undocumented self-propagating worm called CanisterWorm. The malware has compromised 47 npm packages, leveraging ICP canisters (tamperproof smart contracts) for persistence and propagation across the JavaScript ecosystem.

The attack represents a sophisticated evolution in supply chain compromise techniques, demonstrating how threat actors can weaponize legitimate security tools to create widespread impact across development environments.

Trivy GitHub Actions Compromised for Second Time in Month

Aqua Security's Trivy vulnerability scanner suffered a second breach within 30 days, with attackers compromising the GitHub Actions repositories "aquasecurity/trivy-action" and "aquasecurity/setup-trivy." The compromise affected 75 tags and enabled theft of sensitive CI/CD secrets from organizations using these actions for container vulnerability scanning.

The repeated targeting of Trivy demonstrates the high value threat actors place on security tooling as attack vectors, potentially allowing them to infiltrate the very systems designed to detect their activities.

CISA Adds 5 Vulnerabilities to KEV Catalog with April 3rd Deadline

CISA added five actively exploited vulnerabilities to its Known Exploited Vulnerabilities catalog, mandating federal agencies patch them by April 3, 2026:

  • CVE-2025-31277 (CVSS 8.8) affecting Apple products
  • Multiple vulnerabilities in Craft CMS and Laravel Livewire

The expedited timeline reflects the confirmed active exploitation of these vulnerabilities in the wild, requiring immediate attention from federal cybersecurity teams.

Langflow Critical Flaw Exploited Within 20 Hours

CVE-2026-33017 (CVSS 9.3), a critical authentication bypass and code injection vulnerability in Langflow, came under active exploitation within 20 hours of public disclosure. The vulnerability affects the POST /api/v1 endpoint and enables remote code execution, highlighting the increasingly rapid weaponization timeline for publicly disclosed flaws.

The speed of exploitation underscores the critical importance of coordinated disclosure practices and rapid patch deployment in modern threat landscapes.

Microsoft Releases CTI-REALM AI Detection Benchmark

Microsoft unveiled CTI-REALM, an open-source benchmark for evaluating AI agents' capability to convert cyber threat intelligence into validated detection rules. The framework aims to standardize assessment of AI-driven detection engineering across the security industry.

Microsoft Security Updates Cover Multiple CVEs

Microsoft published information on several new vulnerabilities:

  • CVE-2026-23204: Linux net/sched cls_u32 issue requiring skb_header_pointer_careful() usage
  • CVE-2026-23274: Netfilter xt_IDLETIMER revision 0 ALARM timer label reuse rejection
  • CVE-2026-23276: Network tunnel transmission recursion limit addition
  • CVE-2026-3634: Libsoup HTTP header injection and response splitting via CRLF injection
  • CVE-2026-3479: Python pkgutil.get_data() restriction enforcement failure
  • CVE-2026-27459: pyOpenSSL DTLS cookie callback buffer overflow
  • CVE-2026-30922: pyasn1 denial of service via unbounded recursion
  • CVE-2026-26118: Azure MCP Server Tools elevation of privilege vulnerability

Sources

  • https://thehackernews.com/2026/03/trivy-supply-chain-attack-triggers-self.html
  • https://thehackernews.com/2026/03/cisa-flags-apple-craft-cms-laravel-bugs.html
  • https://thehackernews.com/2026/03/trivy-security-scanner-github-actions.html
  • https://thehackernews.com/2026/03/critical-langflow-flaw-cve-2026-33017.html
  • https://www.microsoft.com/en-us/security/blog/2026/03/20/cti-realm-a-new-benchmark-for-end-to-end-detection-rule-generation-with-ai-agents/
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23204
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23274
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23276
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-3634
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-3479
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27459
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-30922
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26118

Originally reported by The Hacker News, Microsoft Security, MSRC Security Updates

Tags

#supply-chain-attacks#trivy#npm-packages#cisa-kev#github-actions#langflow#vulnerability-disclosure

Tracked Companies

🇺🇸Apple

Related Intelligence

  • Supply Chain Attack Compromises Aqua Security's Trivy Scanner

    criticalMar 21, 2026
  • Perseus Banking Malware, DarkSword iPhone Exploits, and 54 EDR Killers Lead Week of Diverse Threats

    highMar 20, 2026
  • Critical n8n RCE Hits KEV Catalog While Attackers Weaponize SOC Fatigue and Target Developers

    criticalMar 12, 2026

Related Knowledge

  • CIPHER Training: Vulnerability Research Deep Dive

    offensive
  • CIPHER Web Security Deep Dive — Training Knowledge Base

    offensive
  • CIPHER Offensive Security Deep Reference

    offensive

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← FBI Data Purchases, FISA Reauthorization Push, and Breathalyzer Firm Breach

Next Article

Critical Oracle RCE, Beast Gang Exposed, Interlock Hits Cisco: Weekly Threat Roundup →