React2Shell: Rapid, Large-Scale Exploitation Delivers Reverse Shells and XMRig Miners
Read Our Expert Analysis
Create an account or login for free to unlock our expert analysis and key takeaways for this development.
By continuing, you agree to receive marketing communications and our weekly newsletter. You can opt-out at any time.
Recommended for you

Metro4Shell: Active exploitation of critical React Native Metro bug raises global alarm
Researchers observed in-the-wild exploitation of a critical unauthenticated RCE in the React Native Metro bundler (CVE-2025-11953, CVSS 9.8), with attackers using staged PowerShell loaders and Rust payloads against internet-facing development servers. Given historical patterns where public fixes can speed adversary reconstruction of exploits, defenders should urgently inventory exposed Metro instances, accelerate patching or apply vendor mitigations, and deploy behavior-based telemetry to detect staged loader activity and downstream supply-chain tampering.
Critical SolarWinds Web Help Desk Flaw Exploited; CISA Orders Rapid Patching
A critical unauthenticated remote code execution bug in SolarWinds Web Help Desk (WHD) rooted in AjaxProxy deserialization is being exploited in the wild and was added to CISA’s Known Exploited Vulnerabilities list, triggering compressed federal remediation deadlines. The listing arrived alongside other high-priority KEV additions this patch cycle, reinforcing that administrative consoles and legacy proxy components are high-risk and require immediate patching and network controls.

Hackers Rapidly Exploit Critical BeyondTrust Remote-Access Flaw After PoC Emerges
A critical unauthenticated remote-code execution bug (CVE-2026-1731) in BeyondTrust Remote Support and Privileged Remote Access was probed and targeted within 24 hours of a public proof-of-concept, exposing thousands of internet-facing instances. Organizations should treat exposed BeyondTrust deployments as emergency patching and containment priorities, applying access restrictions, WAF/ACL rules, and focused threat-hunting while verifying remediation.
VS Code extensions left 128 million installs vulnerable to exploitation
A security review uncovered critical and high-severity flaws in four popular Visual Studio Code extensions, collectively reaching about 128 million installs and enabling file theft, remote code runs, and network reconnaissance. Three formal CVEs were published and researchers say multiple maintainers ignored notifications for months, forcing public disclosure and urgent mitigation guidance.

Langflow: Critical RCE Exploited Within a Day of Patch
Langflow suffered unauthenticated remote code execution that attackers weaponized roughly twenty hours after the fix shipped, enabling credential theft and potential supply-chain staging. Immediate action: rotate secrets, isolate pipelines, and hunt for indicator overlaps across CI/CD and cloud services.
Google: Multiple APTs and crime syndicates widely exploited a critical WinRAR flaw
Google Threat Intelligence Group says a high-severity WinRAR vulnerability (CVE-2025-8088) has been actively abused for months by both nation-state actors and financially motivated groups. Attackers leveraged crafted RAR archives and hidden alternate data streams to place persistent payloads — affecting government, military, technology, travel, and banking targets globally.

Dell RecoverPoint Zero-Day Exploited by China-Linked Cyberespionage Group
A China-linked espionage cluster abused a hardcoded-credential flaw in Dell RecoverPoint for Virtual Machines to escalate privileges, move laterally, and deploy bespoke malware; Dell released patch 6.0.3.1 HF1 and vendors published IoCs and behavioral indicators. The incident underscores a broader trend of rapid weaponization of management and recovery tooling, forcing organisations to pair urgent patching with compensating network controls and extended telemetry into virtualization stacks.

Cisco firewall zero-day exploited by Interlock, Amazon intel shows
Amazon threat researchers link a critical Cisco firewall flaw, tracked as CVE-2026-20131, to active Interlock ransomware operations and show exploitation began weeks before Cisco’s March patch. Government and vendor telemetry (including CISA advisories and independent vendor reports) broaden the picture: large-scale automated scanning and follow-on exploitation were observed across many appliances, prompting published IoCs and urgent hunt guidance.