Android 16 will include alerts for fake cell towers and suspicious networks
July 5, 2025

The upcoming Android 16 release introduces a critical new security feature: Network Notification Warnings This enhancement is designed to alert users in real time when their mobile devices are exposed […]

O2 UK Fixed VoLTE Flaw that Exposed User Mobile Location Data UPDATE
June 28, 2025

Vulnerability Details: CVE-2024-53026. It is a vulnerability affecting O2 UK’s VoLTE/IMS service, disclosed in mid-May 2025. Rated Low, with a CVSS v3 score of 3.5. It has a limited impact on confidentiality […]

Global Title Lease is BANNED in UK
April 26, 2025

I wrote an article before about ” What is GT (Global Title)? Why Do We Need It?” What is Global Title Leasing?  GT leasing is the practice of a mobile […]

What is Calling Line Identification (CLI) Spoofing?
April 25, 2025

Last weekend, by coincidence, I found a fraud story related to the Telecom domain called “Spoofing CLI” or “Calling Line Identification (CLI) spoofing.” which is a technique used in mobile […]

Common SS7 Attacks through Data Leakage
April 19, 2025

The SS7 network was once considered an environment that controls users’ access to network-based content and services, allowing licensed mobile operators to access customer data. However, many unlicensed entities currently […]

The Importance of Firewall in 5G Network
April 12, 2025

Many types of firewalls are often categorized by system protection, form factor, network placement, and data filtering method. Regarding 5G, Firewalls protect different network layers — especially in the Service-Based […]

Common SS7 Attacks through Data Leakage
March 29, 2025

? The SS7 network was once considered an environment that controls users’ access to network-based content and services, allowing licensed mobile operators to access customer data. However, many unlicensed entities […]

Evolution of Network Core Signaling protocols
March 22, 2025

?Previous generations relied on the SS7 and Diameter protocols. The 5G network core is built on well-known Internet protocols such as HTTP and TLS. ? Security threats associated with 3G […]

What is 5GHoul in 5G Security World?
March 14, 2025

?5Ghoul is the name given to a set of 14 newly discovered vulnerabilities in Qualcomm and MediaTek 5G modems, disclosed in December 2023 by researchers from the Singapore University of […]

Network Signaling and Firewall Journey from 2G to 5G
February 18, 2025

The journey started with 2G and 3G, where Voice was the leading service, and the main protocols were SS7 and SIGTRAN (Signaling Transport). At this time, the primary Firewalls are: […]

What is the importance of SS7 Firewall?
February 11, 2025

SS7 was never designed with security in mind, so it has always been open to internal and external threats. S7 Firewall is a smart, rules-based system that can monitor, create […]