
React2Shell Isn’t Just Another CVE
It’s a Warning About How We Secure Modern Web Apps When the React team disclosed CVE-2025-55182 in early December 2025, the initial reaction was familiar:
The team at Innoculator welcome you to our blog.

It’s a Warning About How We Secure Modern Web Apps When the React team disclosed CVE-2025-55182 in early December 2025, the initial reaction was familiar:

In the interconnected world of software development, understanding how dependencies interact and how they can collectively fail is more important than ever. Two concepts have

Calling it a collapse is perhaps a little melodramatic. It is really about highlighting how the prioritization of vulnerabilities as a solution to your vulnerability

We wrote a blog post 6 months ago titled “the Curious Case of the 10.0 CVSS Score”, and the industry was in shock: 2024 had

The number one question we hear at Innoculator from clients is “Where or how should I install the Inspectors?” and to be fair, it’s a

The world of cloud infrastructure received a wake-up call with the disclosure of CVE-2025-49844, a vulnerability that could rightfully be called a cloud-wide emergency. Uncovered

If you operate in Australia, you’ve likely heard of the Australian Cyber Security Centre’s (ACSC) Essential Eight — the government’s recommended baseline strategies to mitigate

At Innoculator, we believe cybersecurity should be accessible, predictable, and aligned with how modern teams actually operate. Too often, businesses are forced into complicated licensing

In 2025 we’ve seen organisations face a paradox: record-shattering numbers of new vulnerabilities, but only a handful ever lead to real-world breaches. As exploited CVEs

Yes, I know we tend to harp on about Log4J on this blog, and apologies for that upfront, but recent events have highlighted the importance

Apologies upfront, in writing this blog I couldn’t resist using lyrics from the Icehouse 1987 hit Electric Blue in the heading. In the ever-evolving landscape

Currently at Innoculator, the team are deep in testing our platform before making it generally available to the public (Not long now…). But whilst we

In the ever-evolving landscape of cybersecurity, lateral movement remains one of the most underestimated tactics utilised by attackers. While organizations often focus on securing their

As we look back at the cybersecurity landscape over the past few years, it is clear that 2024 stands out as a remarkable year in

What happens when you combine AI with virtual patching? You solve the vulnerability and legacy software problem. Melbourne, Australia – After a year of dedicated