Holiday leave may be starting, but attacker activity isn’t slowing down. A council cyber incident, a critical React flaw, and ransomware timed for shutdown windows show how reduced coverage turns routine operations into attack paths.
Our SOC team break down what matters and the actions to take before reduced coverage becomes a liability.
Headlines:
- Shared services cyber incident hits multiple London councils
- Critical React vulnerability allows unauthenticated RCE
- Holiday shutdowns amplify ransomware and detection risk
- News: Messaging app phishing hits UK MPs
- Blog: Why patching habits still leave gaps
Shared services cyber incident hits multiple London councils
Several London boroughs are continuing to recover from a cyber incident that affected shared IT services, including internal systems and customer-facing platforms. Councils confirmed that systems were taken offline as a precaution, digital services were disrupted for an extended period, and investigations are ongoing into whether data was accessed during the intrusion.
What’s the risk?
- Shared service architectures increase blast radius when a core platform is compromised
- Extended recovery windows increase exposure to follow-on phishing and impersonation
- Incident communications create cover for fraudulent “support” and account takeover attempts
Recommended actions
Action point
Plan for recovery timelines measured in weeks, not days.
Critical React vulnerability allows unauthenticated RCE | CVE-2025-55182
A critical unauthenticated remote code execution vulnerability has been disclosed in React Server Components, rated CVSS 10.0. The flaw affects how React decodes payloads sent to Server Function endpoints and allows an attacker to execute arbitrary code on the server via a crafted HTTP request.
Importantly, applications may be vulnerable even if they do not explicitly implement React Server Functions, as long as they support React Server Components. The issue affects multiple React server packages and common frameworks, including Next.js and React Router. Patches were released on 3 December, and immediate upgrading is strongly advised.
What’s the risk?
- Unauthenticated attackers can achieve remote code execution on affected servers
- Exposure exists even where Server Functions are not intentionally used
- Widely used frameworks and bundlers expand the potential blast radius
Recommended actions
Action point
If you run React Server Components, patch now and validate exposure assumptions. Find the full set of update instructions on the React dev site.
Holiday shutdowns amplify ransomware and detection risk
Ransomware groups routinely time attacks for weekends and public holidays, when monitoring, escalation, and recovery are slower. Industry data shows that around 78% of organisations significantly reduce SOC coverage over holiday periods, while ransomware and phishing activity remains elevated.
That imbalance leaves fewer analysts validating alerts, greater reliance on automation, and temporary or elevated access persisting longer than intended, creating ideal conditions for attackers to escalate before containment can begin.
What’s the risk?
- Ransomware completes before detection or containment
- Alert backlogs delay investigation during reduced coverage
- Excess or temporary privileges enable rapid escalation
Recommended actions
Action point
Holiday ransomware succeeds when coverage drops and access persists.
From our blog
Why outdated patching habits are leaving organisations exposed
Patching is meant to be one of the simplest defensive controls, yet outdated habits continue to stretch exposure windows. This blog looks at the patching antipatterns still common in Microsoft-first environments and why slow, risk-averse processes now create more danger than protection.
It also explores how modern patching approaches, using tools many organisations already have, can reduce real-world risk by keeping pace with both software updates and attacker activity.
Resources & References
Westminster Gov | React | Semperis | Darktrace | Guardian
Thanks to the Kocho SOC team for their contributions.
Stay safe this Christmas and throughout 2026.
Get cyber confident
Real partnership. Microsoft expertise. Complete transparency.
Request a call back today.
- AI-powered rapid protection, from day one
- Dedicated Microsoft experts, by your side
- Powerful, intuitive reporting tools
- Collaboration and transparency as standard
Don't Miss
Great security & compliance resources
Microsoft Security Roadshow
Demos and expert insight to help you get the most from Microsoft's identity, security and cloud solutions.
Purview Demo: Securing data in the age of AI
Legal Breakfast Briefing: Managing data security and compliance
Cybersecurity a year in review: What happened in 2025, and what it means for your 2026 security strategy
Got a question? Need more information?
Our expert team is here to help.