Skip to the main content.

 

Applied Security Research

Cyber Security through Science

2 min read

Securing VoIP Networks (Book)

Securing VoIP Networks presents a rigorous analysis of the security landscape surrounding Voice over IP (VoIP) and converged network infrastructures. Authored by Peter Thermos and Ari Takanen, this text moves beyond deployment basics to provide a...

Read More

4 min read

Beyond the Checklist: Why Penetration Testing Needs a Smarter Upgrade

The Walls Have Ears: Why Your Penetration Testing Is Stuck in the Past Penetration testing has long been a vital tool in our cybersecurity arsenals,...

Read More

29 min read

An Evolutionary Analysis of Cellular Network Security: Vulnerabilities and Protections from 2G to 5G

2 min read Securing VoIP Networks (Book) Palindrome Technologies: Dec 30, 2025 1:04:31 PM Securing VoIP Networks presents a rigorous analysis of the...

Read More

3 min read

Securing the Next Horizon: Insights from the IEEE 6G Security Briefing (June 19, 2025)

2 min read Securing VoIP Networks (Book) Palindrome Technologies: Dec 30, 2025 1:04:31 PM Securing VoIP Networks presents a rigorous analysis of the...

Read More

3 min read

George H. Heilmeier: Architect of Innovation and the Enduring Catechism

2 min read Securing VoIP Networks (Book) Palindrome Technologies: Dec 30, 2025 1:04:31 PM Securing VoIP Networks presents a rigorous analysis of the...

Read More

NetBackup - RabbitMQ Authentication Bypass Vulnerability

The Palindrome Team discovered a vulnerability in Veritas NetBackup Snapshot Manager which allowed untrusted clients to interact with the RabbitMQ...

Read More

1 min read

Pi (π)

Pi (π) is more than just an irrational number; it is a fundamental constant in mathematics that has shaped numerous aspects of our world.

Read More

1 min read

Surveying Five years of Java Deserialization CVE’s

The Java programming language has been one of the most popular programming languages for years. Starting in 2015, a flaw in a core function of the...

Read More

2 min read

Research on Heterogeneous Networks

2 min read Securing VoIP Networks (Book) Palindrome Technologies: Dec 30, 2025 1:04:31 PM Securing VoIP Networks presents a rigorous analysis of the...

Read More