The Lyceum: Cybersecurity Daily — Mar 21, 2026
Photo: lyceumnews.com
Saturday, March 21, 2026
The Big Picture
The window between "vulnerability disclosed" and "vulnerability weaponized" didn't just shrink this week — it effectively closed. A critical flaw in the AI platform Langflow was exploited within 20 hours of publication, CISA added five new actively exploited bugs to its watchlist in a single day (three of them Apple), and the tool developers use to find vulnerabilities — Trivy — was hijacked for the second time in a month to deliver malware through the very version tags teams pin for safety. Meanwhile, ransomware rolled through three U.S. cities in 24 hours and another healthcare provider went to paper charts. It's a lot. None of it is theoretical.
Today's Stories
CISA's Watchlist Gets Five New Entries — Three Apple Flaws, All Actively Exploited
On March 20, CISA added five vulnerabilities to its Known Exploited Vulnerabilities catalog — the government's official "someone is using this right now" list. Three are Apple flaws (CVE-2025-31277, CVE-2025-43510, CVE-2025-43520) spanning Safari, iOS, watchOS, visionOS, iPadOS, macOS, and tvOS — essentially every device Apple makes. The remaining two are code injection bugs in Craft CMS (CVE-2025-32432) and Laravel Livewire (CVE-2025-54068), both popular web frameworks that are public-facing by nature.
Federal civilian agencies are required to apply mitigations by April 3 under the CISA Known Exploited Vulnerabilities guidance. If you're not a federal agency, that two-week window is still too generous for actively exploited Apple kernel and WebKit flaws — an attacker only needs a user to visit a malicious website. Check Apple Software Update now; if anything's pending, install it before lunch. For Craft CMS and Laravel shops, these are internet-facing applications being targeted in live campaigns, which means your web application firewall logs may already have evidence of probing.
If Apple pushes an out-of-band emergency update in the next 48 hours, that would be a signal exploitation is escalating beyond what the initial KEV listing captured. Three Apple CVEs landing on the same day is not routine.
The Vulnerability Scanner Was the Vulnerability — Trivy Compromised Again
Trivy, the open-source vulnerability scanner maintained by Aqua Security that thousands of development teams rely on to find security flaws, was compromised for the second time in a month. An attacker force-pushed malicious code to 75 of 76 version tags in the GitHub Actions repositories aquasecurity/trivy-action and aquasecurity/setup-trivy, turning trusted version references into a distribution mechanism for an infostealer targeting CI/CD secrets — the cloud access keys, API tokens, and database credentials that are skeleton keys to an organization's infrastructure.
The attack is elegant in its cruelty: developers pin to specific version tags — a common practice intended to make builds reproducible and trustworthy. Force-pushing malicious code to those tags weaponizes that trust. If your team uses Trivy in any automated pipeline, verify the commit hashes of the version tags you're referencing against the official repository — don't just check the tag name.
Aqua Security's official incident report is expected imminently. If the scope is large — the popularity of these GitHub Actions suggests that possibility — downstream breach disclosures may follow. The structural question for every team running open-source security tooling in CI/CD: what's your verification layer when the scanner itself is the supply chain risk?
Langflow's Critical RCE Was Exploited in Under 20 Hours — A New Speed Record
CVE-2026-33017, a CVSS 9.3 remote code execution flaw in Langflow — the open-source platform for building AI agent workflows — went from public advisory to active exploitation in roughly 20 hours. Attackers didn't wait for proof-of-concept code; they derived working exploits directly from the advisory text.
The flaw is in Langflow's public build endpoint, which allows building flows without authentication. When an optional data parameter is supplied, the endpoint executes attacker-controlled Python code with zero sandboxing. Unauthenticated. No credentials needed. Attackers just need to find the instance. Community reports indicate all versions prior to 1.9.0.dev8 are affected.
If you're unsure whether your organization runs Langflow, check with your AI or platform engineering teams — it's often deployed experimentally without formal procurement. If you find an instance, patch immediately or take it offline. Weekend mass scanning is the next phase, and exposed instances will be found. The broader signal: for high-value AI tooling, treat advisory publication as the start of an active attack window, not the beginning of a comfortable patch cycle.
Ransomware Hits a Healthcare Provider and Three Cities in 24 Hours
At least one U.S. healthcare provider was forced onto paper workflows overnight by a LockBit ransomware campaign that affected services across multiple facilities and an estimated 500,000 patients annually. Separately, ransomware incidents were reported within 24 hours in Foster City, California; Blacksburg, Virginia; and Los Angeles — with Foster City temporarily losing both emergency and non-emergency police phone lines. Legacy Health LLC was also listed as a new victim by the Worldleaks group, with internal documents reportedly posted publicly.
The pattern suggests municipal networks and healthcare systems are being targeted as soft targets amid multiple simultaneous ransomware campaigns. LockBit's history of double extortion means patient data exposure is a live concern. If Foster City or Blacksburg formally declare states of emergency and confirm data theft, it would mark a shift from "IT outage" to recognized civic crisis — and if leak sites start posting actual datasets, expect a wave of targeted phishing using real appointment, billing, or permit data.
⚡ What Most People Missed
- Stryker employees still can't work — two weeks later. A Reddit thread with 300+ points has employees at the Portage, Michigan site reporting they were told to stay home nine days after the March 11 wiper attack. The structural recovery challenge — rebuilding 80,000 endpoints when the MDM tool itself was the weapon — is not being captured by mainstream coverage.
- Claude Code's trust dialog was a paper door. CVE-2026-33068 let a malicious repository skip Anthropic's Claude Code workspace trust confirmation entirely via a config-loading order bug. Patched in version 2.1.53, but the broader attack surface — including API key exfiltration and MCP consent bypass — means AI coding agents are inheriting every old IDE supply-chain problem. Run
claude --versionon developer workstations today. - macOS 26 broke encrypted DNS and Apple isn't talking. A developer-reported regression trending at 381 points on Hacker News: the system forces plaintext DNS on port 53 when encryption is enabled, silently breaking the security model. Users who think their queries are encrypted are sending them in cleartext. If your org uses encrypted DNS profiles or internal
.localdomains, hold off on macOS 26. - A fresh Metasploit module just made an old WordPress RCE turnkey. CVE-2023-6553 in the Backup Migration plugin (versions ≤1.3.7) has been patched since 2023, but a polished new exploit module on Exploit-DB lowers the skill floor dramatically. Hundreds of thousands of installs; Wordfence is already blocking active attempts.
- Windows NTLM hash disclosure just got a one-click exploit generator. CVE-2025-24054 lets a crafted
.library-msfile silently leak NTLM hashes when a user merely navigates to the file in Explorer. The new public tooling turns this into a "run one script, get a weaponized phishing attachment" workflow.
From the Foreign Press
Interpol: AI-Powered Fraud Now 4.5× More Profitable Than Traditional Schemes
Xakep.ru reports on new Interpol statistics showing that fraud operations leveraging AI tools — deepfake voice, generated identity documents, automated social engineering — are generating 4.5 times more revenue per operation than their non-AI equivalents. The data reportedly comes from Interpol's cross-border financial crime unit and tracks cases from 2024–2025. This quantifies what many have suspected: AI isn't just making fraud easier, it's making it dramatically more profitable, which means the investment in AI-powered attack tooling will only accelerate.
Source: Xakep.ru — Russian. No English-language coverage confirmed at time of publication.
New Banking Trojan "Perseus" Hunts Through Users' Notes Apps
Xakep.ru details a newly identified Android banking trojan dubbed "Perseus" that specifically targets note-taking and memo applications on infected devices, searching for passwords, seed phrases, and financial credentials that users store in plaintext notes. The malware reportedly uses accessibility services to read note content across multiple apps and exfiltrates matches to a C2 server. For anyone who's ever saved a password in their phone's Notes app — and that's most people — this is the threat model catching up with the habit.
Source: Xakep.ru — Russian. No English-language coverage confirmed at time of publication.
Stryker Data Wiped Without Malware, Russian Analysis Confirms
Xakep.ru published a technical analysis confirming that the Stryker attack used legitimate device management tools — not traditional malware — to wipe approximately 80,000 devices. The Russian-language writeup emphasizes that attackers obtained administrative access to Stryker's Microsoft Intune environment and pushed mass wipe commands through the platform's own functionality, making the attack nearly invisible to endpoint detection tools that look for malicious executables.
Source: Xakep.ru — Russian. No English-language coverage confirmed at time of publication.
📅 What to Watch
- If Aqua Security's Trivy incident report reveals that thousands of CI/CD pipelines pulled the malicious tags, expect a cascade of downstream breach disclosures — the blast radius of a compromised security scanner is uniquely recursive and will force many organizations into incident response simultaneously.
- If Apple pushes an emergency out-of-band update this weekend, it would indicate the three KEV-listed flaws are being exploited more broadly than the initial catalog entry suggested — install within the hour, not the week, to avoid drive-by web compromises.
- If Tycoon2FA operators rebrand or announce a new version publicly, that would suggest the March 4 law enforcement takedown of 330 domains had minimal lasting impact — and it would signal that MFA-bypass-as-a-service remains a resilient criminal market segment.
- If LockBit publishes patient data from the healthcare ransomware hit, expect a wave of targeted phishing and identity fraud using real appointment, billing, and medical data; monitor dark web forums and fraud-monitoring feeds for credential lists tied to local providers.
- If Langflow scanning spikes this weekend (check your honeypots), it would validate that advisory-to-exploit timelines for AI tooling are now measured in hours, not the days defenders budget for, and should accelerate emergency patch-and-isolate procedures for AI platforms.
The Closer
A vulnerability scanner delivering malware to the people scanning for malware, a trust dialog that loads after the code it's supposed to gate, and a city that lost its 911 lines to ransomware while three other municipalities fell in the same news cycle. The encrypted DNS on your Mac? Plaintext. The anonymous tip line? Not anonymous. The patch window? Closed 20 hours ago. Sleep well.
If someone you know is still saving passwords in their Notes app, forward this before Perseus finds them first.