Accueil Blog Page 4

The Interstellar Integrity (i2) magazine interviewed me about my passion for space and cybersecurity

0

I’m very proud to be featured in the second edition (nov 2023) of Interstellar Integrity (i2) released by ethicallyHackingspace(eHs)®.

Thank’s to William Ferguson for this interview :

  • I introduce myself and my personal background
  • I explain my passion for space and cybersecurity
  • I explain my work about the analysis of the Viasat Cyber Attack with the MITRE ATT&CK Framework (MITRE)
  • I describe my engagement and how I built the best community on LinkedIn and Discord for space and cybersecurit

An excerpt of the Interstellar Integrity (i2) – second edition (nov 2023)

I’m very proud to be featured alongside the following space cybersecurity professionals:

Full issue of the Interstellar Integrity (i2) – second edition (nov 2023)

In this issue, you can also check Data Space with SpaceGPT.

More informations

  • You can read the full issue of the second edition of Interstellar Integrity (i2) here.
  • You can read my article about the analysis of the Viasat cyber attack with the MITRE ATT&CK framework here.
  • You can join my LinkedIn group about Space Cybersecurity Community here.

L’Aéro Recrute, un nouveau programme dont je suis Ambassadeur : Pour mettre en avant la filière de l’Aéronautique, du Spatiale, de la Défense et de la Sécurité

1

Je suis fier de rejoindre le programme L’Aéro Recrute. Je suis nommé Ambassadeur pour la filière Aéronautique et Spatiale.

A ce titre, vous pouvez me contacter via mon profil Ambassadeur sur My Job Glasses afin d’échanger avec moi.

L’aéronautique et le spatial sont à l’aube de plusieurs révolutions. Pour relever ces défis environnementaux et technologiques, L’AÉRO RECRUTE.

Notre filière est spécialisée dans l’étude, le développement, la réalisation, la commercialisation et la maintenance de tous programmes et matériels aéronautiques et spatiaux, civils et militaires, ainsi que de systèmes de défense et de sécurité.

De l’ingénierie à la production, en passant par la maintenance, plus de 25 000 recrutements sont prévus en 2023 partout en France, tendance qui devrait se confirmer les prochaines années.

Talents de tous horizons, du CAP au Bac+8, ouvrez-vous à de nouvelles opportunités dans des métiers de pointe et de passion où l’innovation est partout.

Pour en savoir plus sur L’ Aéro Recrute

My work about the Viasat attack analysis featured in the SIGN.MEDIA #2 newsletter

0

I’m very proud to be featured by Olga Nasibullina and Tatiana Skydan in THE SIGN.MEDIA #2 newsletter.

Olga Nasibullina works mainly on cybersecurity workforce development, government relationships, cyber diplomacy and space cybersecurity.

Tatiana Skydan is the founder of the Podcast Bar & co-founder of The SIGN media.

Tatiana and Olga mentionned my work about the Viasat attack analysis:

  • I compared the 4 frameworks that can be used for the space sector: MITRE ATT&CK, SPARTA, SPACE-SHIELD and TREKS.
  • I explain why I choose the MITRE ATT&CK Framework
  • I identified Tactics, Techniques and Procedures (TTPs) from the MITRE ATT&CK matrix that have been used by the hackers
  • I mapped them on the MITRE ATT&CK Navigator in order to have the complete attack chain.

  • I drawn a diagram as a Cyber Kill Chain showing all TTPs mapped on the entire attack life cycle of the Viasat cyber attack.

Thank’s again to Tatiana and Olga to have referenced my work in their THE SIGN’s newsletter.

To know more

Some very funny memes on space security

0

Below, I show some very funny memes on space security I created. Do not hesitate to download them and to share them.

SpaceSec, the Workshop on the Security of Space and Satellite Systems

0

SpaceSec is the Workshop on the Security of Space and Satellite Systems
https://spacesec.info/

SpaceSec 2023 took place on the 27 February 2023 in San Diego, California.
https://www.ndss-symposium.org/ndss-program/spacesec-2023/

The videos of the 2023 edition of the SpaceSec workshop have recently been uploaded, and you can view them for free and get an overview of current space security research topics! Also, in case you missed the excellent keynote by James Pavur this is your chance to view it again, where he gave us an extensive overview of open research topics.

All SpaceSec 2023 videos are avalaible here.

SpaceSec will be co-located with the Network and Distributed System Security Symposium (NDSS) in San Diego on March 1, 2024.

You can space submit your security research project.
They will have two deadlines:
– December 7, 2023
– January 12, 2024.

They accept 4-page and 8-page papers on all aspects of space security. This is the perfect opportunity to publish your insights, vetted by a rigorous peer review of academic experts on the subject.

They are accepting papers from an extensive spectrum of space security topics, including space system security, networks and communication security, privacy and usability of space systems, and space security strategies.

My work about the Viasat attack analysis featured at the BSIDES St. Louis 2023 hacking education conference

0

I’m very proud to be featured by Tim Fowler in his presentation at BSIDES St. Louis 2023 hacking education conference. Tim Fowler is an offensive security analyst at Black Hills Information Security.

Tim mentionned my work about the Viasat attack analysis:

  • I compared the 4 frameworks that can be used for the space sector: MITRE ATT&CK, SPARTA, SPACE-SHIELD and TREKS.
  • I explain why I choose the MITRE ATT&CK Framework
  • I identified Tactics, Techniques and Procedures (TTPs) from the MITRE ATT&CK matrix that have been used by the hackers
  • I mapped them on the MITRE ATT&CK Navigator in order to have the complete attack chain.

  • I drawn a diagram as a Cyber Kill Chain showing all TTPs mapped on the entire attack life cycle of the Viasat cyber attack.

Thank’s again to Tim Fowler to have referenced my work in his talk at BSIDES St. Louis.

BSIDES St. Louis 2023 is a hacking education conference that took place on Oct 14, 2023 at St. Charles Community College in Missouri state (United States).

The presentation of Tim Fowler is called: A brief introduction to cybersecurity in Space; The Past, Present, & Future.

To know more

DroneSec, a private intelligence agency for drone threats, that provides UAS Threat Intelligence and drone security training

0

DroneSec is a private intelligence agency for drone threats. DroneSec provides drone threat intelligence solutions to protect people and drones from malicious drones and people.

DroneSec provides the Notify UAS Threat Intelligence Platform for real-time visibility of drone threats. DroneSec solutions allow to put organizations 10 steps ahead of the threat.

DroneSec are pioneers in UAS Threat Intelligence. Their leading intelligence subscription service provides organizations with the latest emerging trends, threat actor TTPs, technology types and component analysis.

Drone Threat Intelligence Platform (DTIP)

DroneSec provides also drone security and C-UAS training. Their courses have helped train organisations in offensive and defensive drone operations.

DroneSec Courses and training

Find below the Featured Courses. This includes three courses : Drone Security Fundamentals, Regulations and SECOPS. These three courses can be taken individually, or together as a bundle (recommended) to achieve certification.

The DROSINT and C-UAS Site Vulnerability courses can be taken only individually.

Our readers can get the following discount code for 10% off the course fees : SPACESECURITY

Drone Security Fundamentals

Participants will come away with a comprehensive understanding of:

  • Drones, Counter-Drone and UTM Systems
  • Current and future threat vectors and risk surface
  • Various case studies, methodologies and threat modelling techniques

Drone Security Regulations

Participants will come away with a comprehensive understanding of:

  • Drones, Counter-Drone and UTM system legal requirements
  • Problems, Case Studies and Precedents within the Industry
  • Current and future regulatory requirements and considerations

Drone SecOps: Offense & Defense

Participants will come away with a comprehensive understanding of:

  • Security Risks and Attack Vectors within the Drone Industry
  • Cyber, Physical and Kinetic Security Vectors
  • Responding to, Simulating and Preparing for Intrusions

Beginner to Advanced: Drone Security Bundle

This bundle courses cover the entire drone ecosystem. Fundamental drone security concepts, counter-drone essentials and actionable playbooks based on threat-intelligence, and DroneSec case studies are included.

DroneSec Conferences

The State of Drone Security: Analysing 1000+ drone incidents – Mike Monnik (DroneSec) GDSN #2

Global Drone Security Network #2

AAUS RPAS in Australian Skies 2022 – Unique Trends in the Malicious use of RPAS

To know more

MITRE realeased ATT&CK v14 with improvements to Detections, ICS, Mobile

0

🔥 On 31 October 2023, the MITRE Corporation realeased ATT&CK v14, the new version of its framework.

This new version includes significant improvements to Detections, ICS, Mobile.

In this article, we summarize the biggest changes : and will go through more details.

🔥 Find below the Key Highlights of ATT&CK v14

👉 ATT&CK Version 14 contains 760 Pieces of Software, 143 Groups, and 24 Campaigns. Broken out by domain:

  • ✔️ Enterprise: 201 Techniques, 424 Sub-Techniques, 141 Groups, 648 Pieces of Software, 23 Campaigns, 43 Mitigations, and 109 Data Sources
  • ✔️ Mobile: 72 Techniques, 42 Sub-Techniques, 8 Groups, 108 Pieces of Software, 1 Campaign, 12 Mitigations, and 15 Data Sources
  • ✔️ ICS: 81 Techniques, 13 Groups, 21 Pieces of Software, 52 Mitigations, 3 Campaigns, 14 Assets, and 34 Data Sources

👉 ATT&CK v14 features 14 inaugural Assets (Assets represent the devices and systems commonly found within Industrial Control System environments), representing the primary functional components of the systems associated with the ICS domain. These Asset pages include in-depth definitions, meticulous mappings to techniques, and a list of related Assets.

🔥 MITRE has published a blog post detailing some of the major updates in ATT&CK v14, as well as release notes listing new techniques and version changes. A detailed changelog is also available.

More about MITRE ATT&CK framework

The MITRE ATT&CK framework is a globally recognized knowledge base and methodology for understanding, organizing, and classifying cyber threats and tactics used by adversaries during different stages of a cyber attack. ATT&CK stands for Adversarial Tactics, Techniques, and Common Knowledge.

The framework was developed by MITRE, a not-for-profit organization that operates federally funded research and development centers (FFRDCs) to address various challenges faced by the U.S. government. However, the framework has gained widespread adoption in the cybersecurity community and is used by organizations around the world.

The MITRE ATT&CK framework provides a comprehensive model that describes the entire lifecycle of a cyber attack, from initial reconnaissance and weaponization to lateral movement, data exfiltration, and impact. It consists of a matrix that outlines various tactics and techniques employed by adversaries, along with information on the platforms they target (e.g., Windows, macOS, Linux) and the types of software they use.

The framework is organized into several categories, including Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Exfiltration, and Impact. Each category is further divided into specific techniques and sub-techniques that adversaries may employ.

For each technique, the framework provides detailed information on how it works, the potential impact, and real-world examples of its usage by known threat actors. This knowledge base allows organizations to better understand the tactics and techniques employed by adversaries and assists in building effective defensive strategies and improving incident response capabilities.

By utilizing the MITRE ATT&CK framework, organizations can map observed adversary behaviors to specific techniques, identify security gaps, prioritize defenses, develop threat intelligence, and share information with the broader cybersecurity community. The framework serves as a common language and reference point for cybersecurity professionals, enabling them to collaborate and exchange knowledge on emerging threats and effective defense strategies.

Overall, the MITRE ATT&CK framework plays a crucial role in enhancing cybersecurity awareness and readiness, facilitating the development of proactive defense measures, and improving the overall resilience of organizations against cyber attacks.

Go to the MITRE ATT&CK framework here.

Very proud to have earned the Space Domain Cybersecurity digital badge from Teaching Science and Technology, Inc.

0

🚀 I’m proud to took part of the 3-day Space Domain Cybersecurity course provided by Teaching Science & Technology, Inc. (TSTI) in partnership with Space ISAC. and to have earned the Space Domain Cybersecurity digital badge.

🗓️ I took part in this course on my own time and as an evening course. The course is organized around the SPAce Domain Cybersecurity (SpaDoCs) Framework.

📑 The SpaDoCs Framework provides a comprehensive and systematic model for understanding and tackling all critical issues of cybersecurity in the space domain.

🛰️ As cybersecurity professional and space domain passionate, my wish was to develop my knowledge and skills and to better understand cybersecurity for space systems.

💪 In this course, I gained knowledge and skills to secure the space mission lifecycle. The space domain is examined layer by layer starting from the enterprise layer, then drilling down through mission, system and DevSecOps layers. Threats and vulnerabilities at each layer are highlighted. Finally, first principles of cybersecurity are discussed (domain separation, process isolation, etc.) as well as key enablers (vision, strategy, etc.) to help frame plans for action to address the cybersecurity issues exposed by this course.

After the 18-hour course, I now have an understanding of the Space Domain Cybersecurity Framework. I can define key threats and vulnerabilities that may affect space missions and systems and explain the impact on each layer of the space domain. I can apply cybersecurity first principles throughout the mission lifecycle and use these concepts to identify issues and potential mitigations. I can discuss NIST and other guidance, including the upcoming CMMC requirements.

👊 It was a great opportunity for me to explore #cybersecurity challenges specific to space missions. Now, I own skills to secure cyber environments throughout the space mission lifecycle.

🙏 I would like to thanks :

  • Dr. Bruce Chesley, Ph.D. an experienced space program manager and industry executive
  • Terri Johnson, an #cybersecurity management instructor at the University of Colorado Colorado Springs (UCCS)

👉 All informations about this course here
🏅 Check my certification digital badge here
👉 More about the SPAce Domain Cybersecurity (#SpaDoCs) Framework here

Live Webinar on Aerospace Cybersecurity: Satellite Hacking

0

Find below the first ever webinar by PenTest Mag! Hosted by Timothy Hoffman, the talk will evolve around the topic of the online course – « Aerospace Cybersecurity: Satellite Hacking », designed and instructed by Angelina Tsuboi.

During the event, the discussion will touch the practical aspects of the fascinating field of aerospace cybersecurity. You will have a chance to listen about tools, techniques, and even real-life case studies from the realm of satellite ethical hacking. After the talk, there will be a chance to ask our instructor some questions. Also, those of participants, who have not decided to enroll yet, will get a chance to seize a special deal to secure their seats.

To know more about the course : « Aerospace Cybersecurity: Satellite Hacking » made by Angelina Tsuboi in collaboration with PenTestMag, go to the following link.

Derniers articles

An analysis of the Thales satellite hacking demo at CYSAT 2023 with the METEORSTORM™...

0
Disclaimer Please be informed that the analysis detailed in this article is entirely separate from the hacking experiment conducted by the Thales team on the...

Exploring the power of the METEORSTORM™ framework — a framework built for full-spectrum modeling...

1
I'm very proud to have successfully taken up a new challenge exam in beta version about METEORSTORM™ framework which allowed me to obtain the...

An analysis of the Thales satellite hacking demo at CYSAT 2023 with the MITRE...

1
Disclaimer Please be informed that the analysis detailed in this article is entirely separate from the hacking experiment conducted by the Thales team on the...

Enhancing Threat Understanding: Modeling the Viasat Cyber Attack with MITRE CTID’s Attack Flow Builder

0
Introduction In the complex landscape of modern cybersecurity, understanding the intricate mechanisms of sophisticated cyber attacks has become paramount. On February 24, 2022, Viasat, a global...

My work about the Viasat attack analysis featured in the Angelina Tsuboi’s course on Satellite Cybersecurity...

0
I’m very proud and honored to be featured in the Angelina Tsuboi's course on Satellite Cybersecurity Foundations hosted on Udemy. Thank you very much...

Articles les plus lus

Cartographie des acteurs étatiques du cyber en France

0
Avec l'aimable autorisation de Martial Le Guédard, nous reproduisons ci-dessous sa cartographie au sujet des différents acteurs étatiques évoluant dans le domaine du Cyber...

Cartographie des services spécialisés de la communauté du renseignement (1er et 2ème cercle)

0
L'illustration ci-dessous est une carte heuristique qui présente les services spécialisés de la communauté du renseignement du 1er cercle. Cette cartographie est mise à...

Qu’est-ce que le grand Commandement De l’Espace (CDE) créé par la France pour la...

2
Le Commandement De l’Espace (CDE) a été créé par arrêté le 3 septembre 2019. Il succède au Commandement interarmées de l’espace (CIE). Il rassemble...

Cartographie des acteurs français et européens de la cybersécurité satellitaire et spatiale

1
La France est leader de la politique spatiale en Europe. Elle met en oeuvre des projets innovants et performants avec en permanence de nouveaux...

Etude sur la cybersécurité des systèmes spatiaux : menaces, vulnérabilités et risques

4
A la différence des attaques électroniques qui interférent avec la transmission des signaux de Radio Fréquence, les cyberattaques visent quant à elles, les données...

Popular posts

Cartographie des acteurs étatiques du cyber en France

0
Avec l'aimable autorisation de Martial Le Guédard, nous reproduisons ci-dessous sa cartographie au sujet des différents acteurs étatiques évoluant dans le domaine du Cyber...

Cartographie des services spécialisés de la communauté du renseignement (1er et 2ème cercle)

0
L'illustration ci-dessous est une carte heuristique qui présente les services spécialisés de la communauté du renseignement du 1er cercle. Cette cartographie est mise à...

Qu’est-ce que le grand Commandement De l’Espace (CDE) créé par la France pour la...

2
Le Commandement De l’Espace (CDE) a été créé par arrêté le 3 septembre 2019. Il succède au Commandement interarmées de l’espace (CIE). Il rassemble...

Cartographie des acteurs français et européens de la cybersécurité satellitaire et spatiale

1
La France est leader de la politique spatiale en Europe. Elle met en oeuvre des projets innovants et performants avec en permanence de nouveaux...

Etude sur la cybersécurité des systèmes spatiaux : menaces, vulnérabilités et risques

4
A la différence des attaques électroniques qui interférent avec la transmission des signaux de Radio Fréquence, les cyberattaques visent quant à elles, les données...