Skip to the main content.

 

Applied Security Research

Cyber Security through Science

28 min read

An Evolutionary Analysis of Cellular Network Security: Vulnerabilities and Protections from 2G to 5G

27 min read An Evolutionary Analysis of Cellular Network Security: Vulnerabilities and Protections from 2G to 5G Palindrome Technologies: Jul 25, 2025 10:51:35 AM Introduction GSMA 5G Reliability Adversarial Security Research Private 5G zero trust...

Read More

3 min read

Securing the Next Horizon: Insights from the IEEE 6G Security Briefing (June 19, 2025)

27 min read An Evolutionary Analysis of Cellular Network Security: Vulnerabilities and Protections from 2G to 5G Palindrome Technologies: Jul 25,...

Read More

3 min read

George H. Heilmeier: Architect of Innovation and the Enduring Catechism

27 min read An Evolutionary Analysis of Cellular Network Security: Vulnerabilities and Protections from 2G to 5G Palindrome Technologies: Jul 25,...

Read More

NetBackup - RabbitMQ Authentication Bypass Vulnerability

The Palindrome Team discovered a vulnerability in Veritas NetBackup Snapshot Manager which allowed untrusted clients to interact with the RabbitMQ...

Read More

1 min read

Pi (π)

Pi (π) is more than just an irrational number; it is a fundamental constant in mathematics that has shaped numerous aspects of our world.

Read More

1 min read

Surveying Five years of Java Deserialization CVE’s

The Java programming language has been one of the most popular programming languages for years. Starting in 2015, a flaw in a core function of the...

Read More

2 min read

Research on Heterogeneous Networks

27 min read An Evolutionary Analysis of Cellular Network Security: Vulnerabilities and Protections from 2G to 5G Palindrome Technologies: Jul 25,...

Read More