Blitzy has raised $200 million at a $1.4 billion valuation to push fully autonomous enterprise software development. By mapping entire legacy codebases and coordinating thousands of AI agents, it promises faster modernization for heavily regulated, slow-moving industries worldwide.
Sierra’s US$950 million raise and US$15 billion valuation signal the acceleration of enterprise agentic AI. Backed by Tiger Global, GV, Sequoia and Benchmark, the company is moving customer service from call-centre queues to autonomous AI agents executing real workflows at global scale, very fast.
Instructure has confirmed that a criminal threat actor accessed Canvas user information and messages, while ShinyHunters claims a far larger education-sector data haul affecting millions of students, teachers, and institutions worldwide.
8th December Cyber Update: Critical 'React2Shell' Vulnerability Under Active Exploitation by State-Sponsored Actors
Critical React flaw React2Shell is under active state sponsored exploitation, allowing unauthenticated remote code execution across thousands of web apps. ACSC and US CISA have issued urgent warnings, calling on Australian organisations to patch immediately.
A newly disclosed critical vulnerability in the global React JavaScript ecosystem is now under active exploitation by state-linked threat actors, triggering urgent alerts from cybersecurity agencies worldwide, including Australia’s Cyber Security Centre (ACSC).
The flaw, formally tracked as CVE-2025-55182 and dubbed “React2Shell”, enables unauthenticated remote code execution (RCE) via unsafe deserialisation in React Server Components. In simple terms, attackers can take full control of affected servers without credentials or user interaction. Researchers say exploitation is “trivial” and successful in most default configurations.
The vulnerability was added to the US CISA Known Exploited Vulnerabilities catalogue on December 5, confirming real-world attacks. Australia’s ACSC followed with a critical national alert, warning businesses and government agencies to act immediately.
Threat intelligence firms including Wiz and Amazon have confirmed that multiple Chinese state-nexus threat groups began exploiting the flaw within hours of its public disclosure. Identified activity includes credential theft, malware deployment using Cobalt Strike and Sliver, and large-scale cryptomining.
The risk exposure is substantial. Researchers estimate that up to 39 per cent of cloud environments contain vulnerable libraries, while more than 77,000 internet-facing IP addresses remain exposed globally. At least 30 organisations are already confirmed as compromised.
The flaw affects multiple React Server packages and several versions of Next.js, a framework widely used by Australian enterprises across fintech, e-commerce, media, healthcare and government digital services.
Security leaders are unequivocal. The React team has issued urgent guidance to upgrade all affected packages immediately, while industry experts warn that automated mass exploitation is already underway.
Why It Matters
This is not a technical edge case. React underpins a significant portion of the modern internet, from banking portals and trading platforms to government services and national retailers. A remotely exploitable flaw at this scale represents a systemic cyber risk, not just an IT issue.
For Australian businesses, the implications are immediate and commercial. Any organisation running exposed React or Next.js applications now faces potential data breaches, operational shutdowns, ransomware events, regulatory penalties and brand damage. Given the ease of exploitation, this vulnerability dramatically lowers the barrier for both state-based and criminal attackers.
The confirmed involvement of state-sponsored actors also elevates the threat beyond routine cybercrime. It signals that this flaw is already being tested for espionage, strategic access and pre-positioning in critical infrastructure environments. That places pressure on boards, regulators and cyber insurers alike.
From a governance perspective, this event reinforces a harsh reality of modern software supply chains. A vulnerability in a shared open-source component can instantly cascade across thousands of organisations, regardless of size or sector. It underlines why patch management, real-time vulnerability monitoring and executive-level cyber oversight are now matters of business resilience, not technical hygiene.
For Australia specifically, the ACSC’s rare “critical” classification reflects the potential for national-scale impact. Financial services, healthcare, logistics and media platforms are all at heightened risk due to their heavy reliance on React-based architectures.
In short, React2Shell is a textbook example of how a single software flaw can become a global economic and security event within days. Organisations that delay patching now are not just accepting technical risk, they are assuming strategic, legal and financial exposure in one of the most active cyber threat environments seen in years.
Get the stories that matter to you. Subscribe to Cyber News Centre and update your preferences to follow our Daily 4min Cyber Update, Innovative AI Startups, The AI Diplomat series, or the main Cyber News Centre newsletter — featuring in-depth analysis on major cyber incidents, tech breakthroughs, global policy, and AI developments.
Sign up for Cyber News Centre
Where cybersecurity meets innovation, the CNC team delivers AI and tech breakthroughs for our digital future. We analyze incidents, data, and insights to keep you informed, secure, and ahead.
Instructure has confirmed that a criminal threat actor accessed Canvas user information and messages, while ShinyHunters claims a far larger education-sector data haul affecting millions of students, teachers, and institutions worldwide.
Trellix says attackers gained unauthorised access to part of its source code repository, but has found no evidence that its release pipeline was affected or that code was exploited.
The UK’s 2025/2026 Cyber Security Breaches Survey shows 43% of businesses and 28% of charities reported a cyber incident in the past year. The headline is not just persistence; it is operational exposure. Phishing remains the dominant route in, education is absorbing heavier pressure, and supplier-r
SAP npm packages poisoned with credential-stealing malware in "Mini Shai-Hulud" attack. Malicious preinstall hooks harvest GitHub tokens, cloud keys and CI/CD secrets. Attackers weaponise AI agent configs for persistence, turning Claude and VS Code settings into execution paths.
Where cybersecurity meets innovation, the CNC team delivers AI and tech breakthroughs for our digital future. We analyze incidents, data, and insights to keep you informed, secure, and ahead. Sign up for free!