top of page


Pipeline Blog


Pipeline Co. Ltd.
Jul 7
All Posts


React2Shell Timeline: Bypass that WAF! Analyzing the Exploit Payload & Implications to Japan's Digital Infrastructure
Author(s): Reyben T. Cortes Happy Friday! It was the calm before the storm, within the past 48 hours the security community finally came full circle after details of a working PoC (Proof of Concept) exploit recently went public for CVE-2025-66478, an unpublished Next.js vulnerability built on React created by Vercel. With Its focus on making beautiful interactive user interface, the widely used frontend library garnered over 82 million websites worldwide, becoming the world's
2 days ago


RiskSensor Wins Japan Security Award 2025 — Recognized for Innovation in Visualizing Invisible External Risks for Japanese Companies
Pipeline株式会社のサイバーリスク可視化プラットフォーム「RiskSensor」が、2025年の「日本セキュリティ大賞」においてセキュリティ運用支援部門 優秀賞を受賞しました。
Nov 17


The Nightmare Before Halloween: WSUS CVE-2025-59287 - Observing Post-Exploitations & Velociraptor C2
Author(s): Reyben T. Cortes, Md. Azim Uddin, Abdullah Al Mamun POST /ReportingWebService/ReportingWebService.asmx HTTP/1.1 Host: [redacted]:8530 User-Agent: Windows-Update-Agent Content-Length: 5244 Accept: text/xml Connection: Keep-Alive Content-Type: text/xml SOAPAction: "http://www.microsoft.com/SoftwareDistribution/ReportEventBatch" Accept-Encoding: gzip Connection: close Figure 0: HTTP POST Request ReportingWebService[.]asmx Trick or Treat! It's the nightmare before Hall
Nov 8


How to Mitigate Zero-Day Vulnerabilities in Your Organization
Zero-day vulnerabilities represent one of themost daunting challenges in cyber security. Unknown to software vendors anddevoid of available patches, these vulnerabilities provide cybercriminals witha golden opportunity to exploit organizational systems, often leading todevastating outcomes.
In this article, we aim to help youunderstand zero-day attacks, trace them from zero-day vulnerabilities, and armyou with actionable strategies to fortify your organization against the
Oct 21


How Zero-Day Vulnerabilities Are Discovered and Managed
Imagine a door that no one knows exists—except for the burglar who just walked through it. This is the essence of a zero-day vulnerability: a flaw in software or hardware that remains unknown to the vendor, but not to those who exploit it.
According to a 2024 report, zero-day vulnerabilities have seen a significant rise, with a 103% increase in exploitation attempts compared to the previous year.
These weaknesses are the quiet dangers of the digital age, lurking invis
Oct 21


Vision into Victory: Pipeline Wins Grand Prize at Japan Security Awards 2024
At Pipeline, we understand that effective cybersecurity transcends advanced technology; it fundamentally revolves around the people involved, the purpose behind their actions, and the passion they bring to the field. We are excited to share that our philosophy has led us to win the Grand Prize in the Cybersecurity Support Services category by Japan Digital Transformation Association, a prominent organization championing Japan’s Digital Transformation journey.
This award is
Oct 21


7 Essential Cloud Security Measures to Protect Your Data
7 Essential Cloud Security Measures to Protect Your Data Cloud technology provides significant advantages over its traditional counterpart, so it's no wonder that businesses are increasingly relying on it to drive efficiency and innovation. With a significant shift towards cloud storage, the importance of robust cloud security measures has never been more critical. The rise in cyberattacks and data breaches targeting cloud-based systems highlights businesses' vulnerabilities
Oct 21


Cloud Security vs. On-Premises: Which Is Safer?
As businesses continue to transition from traditional IT infrastructures to the cloud, two crucial questions linger: "Is cloud security better than on-premises solutions? Which one is safer?"
Oct 21


Best Practices for Securing Cloud-Native Applications
Cloud-native applications are changing the game. They bring flexibility, scalability, and speed to businesses of all sizes. But with all these perks come big security risks. As your infrastructure evolves, so do the threats. Cybercrime, malware, and hacking are relentless, and they’re constantly looking for new ways to exploit vulnerabilities.
Oct 21
bottom of page

