{"href":"https://api.simplecast.com/oembed?url=https%3A%2F%2Fsecuritytools.simplecast.com%2Fepisodes%2Fthe-react2shell-crisis-vA_Viesx","width":444,"version":"1.0","type":"rich","title":"The React2Shell Crisis","thumbnail_width":300,"thumbnail_url":"https://image.simplecastcdn.com/images/59617cff-d258-400b-81f9-af733334da9f/c52cd99a-25d2-4ac1-ba5d-1fd490c79884/soc-podcastart.jpg","thumbnail_height":300,"provider_url":"https://simplecast.com","provider_name":"Simplecast","html":"<iframe src=\"https://player.simplecast.com/72d1ad32-920b-4afe-a220-1f8bee7d72fd\" height=\"200\" width=\"100%\" title=\"The React2Shell Crisis\" frameborder=\"0\" scrolling=\"no\"></iframe>","height":200,"description":"React2Shell, the zero-click RCE exploit, is rapidly becoming one of the most significant cybersecurity incidents this year.\n\nFrom emergency patches causing a massive Cloudflare outage to active exploitation by China and North Korea-linked groups, this flaw may be the next Log4Shell moment for enterprises and developers alike.\n\nJoin Matt and David for an episode of State of Cybercrime that breaks down how attackers are weaponizing this vulnerability and what organizations must do to stay safe. They will also dive into the Shai-hulud 2.0 assault on cloud infrastructure as well as the biggest DDoS attack ever recorded.\n\nMore from Varonis ⬇️ \nVisit our website: https://www.varonis.com\nLinkedIn:  linkedin.com/company/varonis  \nX/Twitter:  x.com/varonis  \nInstagram: instagram.com/varonislife  \n"}