< back to blog

Security briefing: March 2026

Crystal Morin
Security briefing: March 2026
Published by:
Crystal Morin
Sr. Cybersecurity Strategist
@
Security briefing: March 2026
Sr. Cybersecurity Strategist
@
Security briefing: March 2026
Published:
April 6, 2026
falco feeds by sysdig

Falco Feeds extends the power of Falco by giving open source-focused companies access to expert-written rules that are continuously updated as new threats are discovered.

learn more
Green background with a circular icon on the left and three bullet points listing: Automatically detect threats, Eliminate rule maintenance, Stay compliant, with three black and white cursor arrows pointing at the text.

Exploitation at machine speed

I couldn’t have picked a more suitable name than “March Madness.” Last month, we may have seen more exploits than 3-pointers. From authentication bypasses to AI pipeline compromises and shortened exploitation timelines, March showed how quickly small weaknesses can turn into full-blown breaches. 

Sysdig’s March security briefing provides the receipts: vulnerabilities are being weaponized in real time, and if you aren’t watching your back(end), someone else probably is. Let’s dig in.

Mar 3: Pac4j authentication bypass CVE-2026-29000

  • This critical vulnerability is a flaw in Pac4j’s JWT signature validation.
  • By manipulating how public keys are interpreted during verification, attackers could bypass authentication controls. This means they basically tricked the system into letting them through the front door without an ID.
  • Takeaway: Never assume signature validation logic is safe by default. Instead, enforce strict key validation and allowlists, reject tokens with mismatched or untrusted key sources, and monitor for anomalies such as session spikes from new users or IPs. 
  • Affected organizations should rotate keys and kill active sessions after applying the patch. 

Mar 9: Ingress-NGINX RCE CVE-2026-3288

  • A configuration injection vulnerability in Ingress-NGINX enabled remote code execution within Kubernetes clusters. 
  • This flaw is a sibling of February’s path-injection vulnerability CVE-2026-24512.
  • These vulnerabilities result from improper input sanitization in buildLocation() and buildProxyPass(). By inserting a “ or \ character into the Ingress path field, attackers can break out of intended boundaries. 
  • NGINX Ingress Controllers often have access to secrets and internal services. Therefore, unexpected changes to Ingress resources, network traffic anomalies, and config reloads are red flags that warrant inspection. 

Additional Sysdig TRT findings

Langflow AI pipeline exploitation

  • CVE-2026-33017 is a critical vulnerability that allows unauthenticated remote code execution in exposed Langflow instances. 
  • The Sysdig Threat Research Team (TRT) identified active attacks within twenty hours of public disclosure, before any public proof of concept exploits were even available on GitHub.
  • With a single HTTP request, attackers are able to exfiltrate keys and credentials from a potentially massive number of victims due to the popularity of Langflow for building AI agents and RAG pipelines. No credentials needed.
  • If you can’t patch your Langflow instance right away, restrict network access to the endpoint or disable public flow building. 
  • Fortunately for Sysdig users, out-of-the-box detections will trigger on multiple behaviors seen in this particular attack.

Rapid supply chain threat expansion 

  • TeamPCP exploited a misconfigured GitHub Actions workflow in Trivy on March 19 and demonstrated how quickly attackers can expand and evolve their campaign throughout the rest of the month. 
  • The Sysdig TRT identified the campaign moving from Trivy’s GitHub Actions to Checkmarx on March 23 with identical credential-stealing activity. 
  • PyPI’s LiteLLM and Telnyx were also hijacked within a week of the original breach, and as of March 31, Databricks and Cisco were also investigating possibly linked compromises. Beware: this campaign will very likely continue to expand. 
  • Security tools are targets because they provide trusted execution, pipeline, and secrets access, and potentially an organization-wide blast radius. 
  • This open source supply chain attack shows us that pipeline tools cannot be inherently trusted, and execution should be monitored in real time at runtime. Additionally, organizations should verify dependency integrity and alert on unexpected CI/CD pipeline behavior, irregular outbound calls, and changes in tool integrity. 

Educational spotlight: Securing AI coding agents

  • The Sysdig TRT highlighted the risks of AI coding agents running inside environments with minimal oversight.
  • These agents can execute code, access organizational repos, and interact with infrastructure. They act as privileged users, without human judgment.
  • The team built four high-confidence Falco detections for Sysdig Secure users, but the blog is an important asset for anyone to read who is looking to secure Claude Code or otherwise. 

Also in the news

  • The Zero Day Clock: Sysdig’s CISO, Sergej Epp, published the Zero Day Clock on March 4. A project backed by industry leaders, this webpage shows the terrifyingly shortened timescale between “vulnerability found” and “vulnerability exploited,” and it’s backed by hard evidence.
  • Ubiquiti UniFi: CVE-2026-22557 is a maximum-severity vulnerability in Ubiquiti’s UniFi Network Application that was published on March 19. Exploitation allows attackers without privileges to steal user accounts and access files.
  • Botnet takedown: Federal authorities dismantled the C2 infrastructure of four DDoS botnets on March 19. But the reality is, the previously infected IoT devices remain vulnerable. Attackers can quickly stand up new botnet infrastructure, and the capacity of these botnets will return. Organizations must assume compromised devices are still compromised and keep IoT devices segmented from other networks, or, ya know, update the security of all devices.
  • Anthropic leaks: On March 30, Anthropic’s new Mythos model, built specifically for cybersecurity use cases, was leaked. Then, on March 31, the source code for Claude Code was also made public. Be prepared for the cat-and-mouse game between AI-driven attackers and defenders to get a lot more interesting in April. 

Closing thoughts

Speed is the only metric that mattered in March. Between the exploits coming in at machine speed and intensive supply chain pivots, the defender’s shot clock is shrinking. Unfortunately, there’s no off-season in cybersecurity. If you’re not detecting and stopping malicious behaviors in real-time, you’re going to cramp up. Stay frosty, my friends. 

CISO corner

By: Conor Sherman, Sysdig CISO in Residence

By the numbers

Metric / Timeline Description
20 hours CVE disclosure → active exploitation of Langflow AI pipelines
>12 days TeamPCP supply chain campaign: Trivy → Checkmarx → LiteLLM → Databricks → and more
76 of 77 Trivy GitHub Action version tags force-pushed to malicious commits in a single operation

AI infrastructure is the emerging battleground

In 2024, I framed the threat actor's AI playbook in three moves: more of the same attacks with greater effectiveness, pivoting to target the new infrastructure being built to support AI, and leveraging AI for autonomous attacks. 2026 is the year all three are bearing out simultaneously.

Langflow was compromised with zero authentication required. LiteLLM, which routes requests to over 100 LLM providers and stores API keys for all of them, was backdoored through its own CI pipeline. AI coding agents are running on developer machines with access to credentials, source code, and infrastructure, operating as privileged users without human judgment or monitoring. 

These production compromises are happening now, against tools your teams are actively deploying. If AI infrastructure isn't in your asset inventory, it's in your blind spot.

Three program-level actions for April:

Priority Action
Inventory and govern AI infrastructure Catalog every Langflow, LiteLLM, coding agent, and LLM-connected service in your environment. Treat internet-exposed instances as critical assets that require authentication, network restrictions, and runtime monitoring.
Deploy real-time protections for CI/CD Static analysis and dependency scanning failed against TeamPCP. The malicious code was injected into trusted, signed actions. Runtime detection succeeded because attackers must execute system calls to steal and exfiltrate data, and those are observable regardless of how they gained code execution.
Prepare for autonomous remediation Machine-speed exploitation demands machine-speed response. While building toward autonomous remediation, deploy real-time protections that prioritize post-exploit activity. Detect at the point of exploitation, contain the blast radius, and mitigate impact before the campaign scales.

About the author

Threat Research
featured resources

Test drive the right way to defend the cloud
with a security expert