top of page

Media Coverage


React2Shell Timeline: Bypass that WAF! Analyzing the Exploit Payload & Implications to Japan's Digital Infrastructure
Author(s): Reyben T. Cortes Happy Friday! It was the calm before the storm, within the past 48 hours the security community finally came full circle after details of a working PoC (Proof of Concept) exploit recently went public for CVE-2025-66478, an unpublished Next.js vulnerability built on React created by Vercel. With Its focus on making beautiful interactive user interface, the widely used frontend library garnered over 82 million websites worldwide, becoming the world's
5 days ago


RiskSensor Wins Japan Security Award 2025 — Recognized for Innovation in Visualizing Invisible External Risks for Japanese Companies
Pipeline株式会社のサイバーリスク可視化プラットフォーム「RiskSensor」が、2025年の「日本セキュリティ大賞」においてセキュリティ運用支援部門 優秀賞を受賞しました。
Nov 17


The Nightmare Before Halloween: WSUS CVE-2025-59287 - Observing Post-Exploitations & Velociraptor C2
Author(s): Reyben T. Cortes, Md. Azim Uddin, Abdullah Al Mamun POST /ReportingWebService/ReportingWebService.asmx HTTP/1.1 Host: [redacted]:8530 User-Agent: Windows-Update-Agent Content-Length: 5244 Accept: text/xml Connection: Keep-Alive Content-Type: text/xml SOAPAction: "http://www.microsoft.com/SoftwareDistribution/ReportEventBatch" Accept-Encoding: gzip Connection: close Figure 0: HTTP POST Request ReportingWebService[.]asmx Trick or Treat! It's the nightmare before Hall
Nov 8


How to Mitigate Zero-Day Vulnerabilities in Your Organization
Zero-day vulnerabilities represent one of themost daunting challenges in cyber security. Unknown to software vendors anddevoid of available patches, these vulnerabilities provide cybercriminals witha golden opportunity to exploit organizational systems, often leading todevastating outcomes.
In this article, we aim to help youunderstand zero-day attacks, trace them from zero-day vulnerabilities, and armyou with actionable strategies to fortify your organization against the
Oct 21


How Zero-Day Vulnerabilities Are Discovered and Managed
Imagine a door that no one knows exists—except for the burglar who just walked through it. This is the essence of a zero-day vulnerability: a flaw in software or hardware that remains unknown to the vendor, but not to those who exploit it.
According to a 2024 report, zero-day vulnerabilities have seen a significant rise, with a 103% increase in exploitation attempts compared to the previous year.
These weaknesses are the quiet dangers of the digital age, lurking invis
Oct 21


Vision into Victory: Pipeline Wins Grand Prize at Japan Security Awards 2024
At Pipeline, we understand that effective cybersecurity transcends advanced technology; it fundamentally revolves around the people involved, the purpose behind their actions, and the passion they bring to the field. We are excited to share that our philosophy has led us to win the Grand Prize in the Cybersecurity Support Services category by Japan Digital Transformation Association, a prominent organization championing Japan’s Digital Transformation journey.
This award is
Oct 21

Visible risks, assets to protect
With real-time data, dark web intelligence, and expert response, we identify threats before they strike and protect your critical assets.
bottom of page