Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

React and Next.js unauthenticated remote code execution (CVE-2025-55182, CVE-2025-66478)

On 29 November 2025, researcher Lachlan Davidson reported a critical React vulnerability that allows unauthenticated remote code execution via specially crafted React Server Function payloads. This vulnerability was disclosed as CVE-2025-55182 (React) and CVE-2025-66478 (Next.js) and is rated CVSS 10.0. A public proof concept has also been released so patching is of utmost importance.

How to measure the ROI of penetration testing and cyber security investments

Cyber security is a critical business enabler. Proactive cyber security measures, such as penetration testing, threat monitoring, and staff training, reduce the likelihood of breaches and operational disruption. However, demonstrating the return on investment (ROI) of these initiatives can be difficult to quantify.

How penetration testing supports ISO 27001 certification

ISO 27001 provides a comprehensive framework to ensure organisations understand and manage their information security risks, and validates that appropriate controls are in place to mitigate those risks. Penetration testing plays a critical role in this process by validating security measures and exposing vulnerabilities before they become incidents.

How a pentest strengthens audit evidence and adds value

Penetration testing and auditing are both methods of gaining assurance, but they operate from different angles. A pentest evaluates how well security controls stand up to real-world attack scenarios, while an audit examines whether those controls are designed, implemented, and maintained according to policy or recognised standards.

How penetration testing services prove security and build client trust

In a world where data breaches continue to rise, organisations have become more discerning about who they trust with their information. It is no longer enough to claim that security is a priority — businesses must be able to prove it. Penetration testing, when conducted by qualified professionals, is one measure used as part of a comprehensive security strategy to provide that proof.

Scoping a web application penetration test: What else you need to consider

One of the most important phases of any web application penetration test is scoping. It sets the parameters for the test, defines the methodology, and helps ensure the results are meaningful. A clearly defined scope reduces the chances of missing vulnerabilities by making sure both you (the client) and the testing team share a common understanding of goals, limits, and expected deliverables. Effective scoping is more than just listing a few URLs and moving on.

Penetration testing vs red teaming: What's the difference?

In cyber security, two terms are often used interchangeably but mean very different things: penetration testing and red teaming. Both involve authorised simulations of cyber attacks designed to uncover weaknesses, yet they differ in scope, intent, and the insights they provide. A penetration test reveals where defences can be strengthened, while a red team exercise demonstrates how those defences perform under pressure.

Black box penetration testing: pros and cons

Black box penetration testing is one method among many potential approaches to securing systems, applications, networks and cloud environments. As with anything, it has pros and cons. Black box penetration testing involves assessing an asset without any prior knowledge or access to its internals, for example authenticated features, application code, user credentials or network architecture.

Cyber Essentials certification: What business need to know

Cyber security is essential. Cyber attacks can have devastating consequences for all businesses, regardless of size, including financial losses, reputational damage and loss of customer trust. Cyber Essentials accreditation can help you improve your business’s overall cyber security posture. Developed by the UK Government’s National Cyber Security Centre (NCSC), Cyber Essentials is a certification programme that helps organisations protect themselves against common cyber threats.