Skip to content

Aqsa Younis

Deserialization Attacks Unleashed: How Exploiting Data Formats Can Break Your Security

In the world of cybersecurity, new vulnerabilities are discovered almost every day, but some are more insidious than others. One such vulnerability, which has quietly caused havoc in countless applications, is the threat posed by deserialization attacks. Deserialization—the process of converting a data format into a usable object—seems like an innocent operation at first glance,… Read More »Deserialization Attacks Unleashed: How Exploiting Data Formats Can Break Your Security

Breaking the Trust: How SS7 Attacks Exploit Telecom Security Gaps

Breaking the Trust: How SS7 Attacks Exploit Telecom Security Gaps

In today’s world, it’s hard to envision life without telecommunication services. Individuals engaging in activities like online payments, online shopping, and social media are familiar with using one-time passwords for transaction verification and 2F authentication. The security of this authentication method relies primarily on restricting access to telecommunication networks. Introduction to SS7 Signaling System 7… Read More »Breaking the Trust: How SS7 Attacks Exploit Telecom Security Gaps