Davos 2026 revealed an elite world torn between ambition and anxiety as AI promises growth while threatening jobs, power grids and geopolitics. From warnings of mass workforce disruption to energy bottlenecks and strategic rivalry, leaders framed AI as both engine risk shaping decades ahead
The Everest ransomware group has breached ASRock Rack, a major server hardware vendor, stealing 509GB of sensitive data including firmware, BIOS, and other critical files. The breach creates a significant supply chain risk, potentially allowing attackers to embed vulnerabilities in server hardware.
Berlin-based GeneralMind, founded by the team behind German unicorn Razor Group, has secured $12 million in pre-seed funding to develop its AI-driven "System of Action" for automating enterprise workflows. The platform acts as an autopilot for repetitive white-collar tasks across ERPs and email.
8th December Cyber Update: Critical 'React2Shell' Vulnerability Under Active Exploitation by State-Sponsored Actors
Critical React flaw React2Shell is under active state sponsored exploitation, allowing unauthenticated remote code execution across thousands of web apps. ACSC and US CISA have issued urgent warnings, calling on Australian organisations to patch immediately.
A newly disclosed critical vulnerability in the global React JavaScript ecosystem is now under active exploitation by state-linked threat actors, triggering urgent alerts from cybersecurity agencies worldwide, including Australia’s Cyber Security Centre (ACSC).
The flaw, formally tracked as CVE-2025-55182 and dubbed “React2Shell”, enables unauthenticated remote code execution (RCE) via unsafe deserialisation in React Server Components. In simple terms, attackers can take full control of affected servers without credentials or user interaction. Researchers say exploitation is “trivial” and successful in most default configurations.
The vulnerability was added to the US CISA Known Exploited Vulnerabilities catalogue on December 5, confirming real-world attacks. Australia’s ACSC followed with a critical national alert, warning businesses and government agencies to act immediately.
Threat intelligence firms including Wiz and Amazon have confirmed that multiple Chinese state-nexus threat groups began exploiting the flaw within hours of its public disclosure. Identified activity includes credential theft, malware deployment using Cobalt Strike and Sliver, and large-scale cryptomining.
The risk exposure is substantial. Researchers estimate that up to 39 per cent of cloud environments contain vulnerable libraries, while more than 77,000 internet-facing IP addresses remain exposed globally. At least 30 organisations are already confirmed as compromised.
The flaw affects multiple React Server packages and several versions of Next.js, a framework widely used by Australian enterprises across fintech, e-commerce, media, healthcare and government digital services.
Security leaders are unequivocal. The React team has issued urgent guidance to upgrade all affected packages immediately, while industry experts warn that automated mass exploitation is already underway.
Why It Matters
This is not a technical edge case. React underpins a significant portion of the modern internet, from banking portals and trading platforms to government services and national retailers. A remotely exploitable flaw at this scale represents a systemic cyber risk, not just an IT issue.
For Australian businesses, the implications are immediate and commercial. Any organisation running exposed React or Next.js applications now faces potential data breaches, operational shutdowns, ransomware events, regulatory penalties and brand damage. Given the ease of exploitation, this vulnerability dramatically lowers the barrier for both state-based and criminal attackers.
The confirmed involvement of state-sponsored actors also elevates the threat beyond routine cybercrime. It signals that this flaw is already being tested for espionage, strategic access and pre-positioning in critical infrastructure environments. That places pressure on boards, regulators and cyber insurers alike.
From a governance perspective, this event reinforces a harsh reality of modern software supply chains. A vulnerability in a shared open-source component can instantly cascade across thousands of organisations, regardless of size or sector. It underlines why patch management, real-time vulnerability monitoring and executive-level cyber oversight are now matters of business resilience, not technical hygiene.
For Australia specifically, the ACSC’s rare “critical” classification reflects the potential for national-scale impact. Financial services, healthcare, logistics and media platforms are all at heightened risk due to their heavy reliance on React-based architectures.
In short, React2Shell is a textbook example of how a single software flaw can become a global economic and security event within days. Organisations that delay patching now are not just accepting technical risk, they are assuming strategic, legal and financial exposure in one of the most active cyber threat environments seen in years.
Get the stories that matter to you. Subscribe to Cyber News Centre and update your preferences to follow our Daily 4min Cyber Update, Innovative AI Startups, The AI Diplomat series, or the main Cyber News Centre newsletter — featuring in-depth analysis on major cyber incidents, tech breakthroughs, global policy, and AI developments.
Sign up for Cyber News Centre
Where cybersecurity meets innovation, the CNC team delivers AI and tech breakthroughs for our digital future. We analyze incidents, data, and insights to keep you informed, secure, and ahead.
The Everest ransomware group has breached ASRock Rack, a major server hardware vendor, stealing 509GB of sensitive data including firmware, BIOS, and other critical files. The breach creates a significant supply chain risk, potentially allowing attackers to embed vulnerabilities in server hardware.
A newly disclosed vulnerability in Schneider Electric's Foxboro DCS, a widely used industrial control system, could allow attackers to disrupt critical infrastructure operations. The flaw, originally from Intel, affects energy and manufacturing sectors worldwide, including Australia.
Microsoft has issued an emergency patch for a critical zero-day vulnerability (CVE-2026-20805) in its Windows operating system that is being actively exploited by attackers. The flaw affects all supported versions of Windows.
Japanese automaker Nissan is the latest victim of the Everest ransomware group, which claims to have stolen 900GB of sensitive data. The breach, announced January 10, threatens internal records, dealer info, and possibly customer data —raising serious concerns for its Australian operations.
Where cybersecurity meets innovation, the CNC team delivers AI and tech breakthroughs for our digital future. We analyze incidents, data, and insights to keep you informed, secure, and ahead. Sign up for free!