Hacking demo at CYSAT 2023: world first or “déjà vu”❓ Here is what I know 👇

0
CYSAT 2023 is over. It’s time to review everything that has happened during this amazing event. But first, let’s remember what CYSAT is. CYSAT is the leading...

Thales demo at CYSAT: what was the point again

0
CYSAT 2023 is over. It’s time to review everything that has happened during this amazing event. But first, let’s remember what CYSAT is. CYSAT is the leading...

Solarium CSC 2.0 has endorsed designation of space systems as a critical infrastructure sector

0
The Cyberspace Solarium Commission (CSC) was established in the John S. McCain National Defense Authorization Act for Fiscal Year 2019 to "develop a consensus...

Key Takeaways from CYSAT 2023 by Mathieu Bailly, VP at CYSEC and Director of...

0
CYSAT 2023 is over. It's time to review everything that has happened during this amazing event. But first, let's remember what CYSAT is. CYSAT is the...

Aerospace Corporation released SPARTA v1.3, a new version of the Space Attack Research and...

0
Thank's to Calogero Vinciguerra (Space Policy Officer & Space Threats Response Architecture DO at the European External Action Service, EEAS) and Kimberly King (Senior...

NIST released IR 8401, a new Cybersecurity Framework applied to the ground segment of...

0
NIST released IR 8401, a new guidance named “Satellite Ground Segment: Applying the Cybersecurity Framework to Assure Satellite Command and Control”. NIST IR 8401 is...

ESA released the SPACE-SHIELD, an ATT&CK® like knowledge-base framework for Space Systems

0
I dreamed about it, ESA did it! ESA (European Space Agency) released the SPACE-SHIELD (Space Attacks and Countermeasures Engineering Shield). This is an ATT&CK®...

Thales prepares to secure European infrastructures against attacks from future quantum computers

0
14 April 2023, Paris, La Défense (Press Release) As a driving force in the second quantum revolution, Thales has joined forces with around twenty deep...

Thales veut développer l’Internet quantique via satellite

0
Marko Erman, le directeur scientifique de Thales, est intervenu dans l'émission Tech&Co de BFM Business, sur le thème de l'Internet quantique via satellite. Dans cet...

Thales seizes control of ESA demonstration satellite in first cybersecurity exercise of its kind

0
25 April 2023, Paris, For the third edition of CYSAT, the European event entirely dedicated to cybersecurity for the space industry, taking place on...

Last Posts

How to model an attack on an Industrial Control Systems (ICS)

0
Attacks on OT (Operational Technology) systems are made easier due to the OT/IT convergence. The figure below is showing an example of OT/IT convergence. Attacks on OT...

Space and Satellites Security Conferences at DEF CON 32 (and a little bit Aviation...

0
The videos from the Def Con 32 conference held in Las Vegas from August 8th to 11th are now online. Perfect for keeping busy...

My cybersecurity review from the beginning of 2024

0
What an incredible start to 2024. I've had some incredible opportunities and I've been able to do some really interesting things. I continue my role as...

Very proud to receive the certificate of completion : « Introduction to Cybersecurity in...

0
I’m very proud to receive the following certificate of completion for having successfully completed the training course : « Introduction to Cybersecurity in Space...

How I used MITRE EMB3D™ Threat Model to identify Siemens PLC vulnerabilities exploited by...

0
Introduction In this article, I will show how I used the MITRE EMB3D™ Threat Model to identify vulnerabilities in SIEMENS PLCs that were exploited by...

Popular posts

Description of the Elements of a Satellite Command and Control System

1
In order to be able to analyse the various threats and identify the risks facing a space system, it is necessary to describe precisely...

Install KYPO Cyber Range Platform on Openstack and Ubuntu in AWS cloud

4
KYPO is a Cyber Range Platform (KYPO CRP) developed by Masaryk University since 2013. KYPO CRP is entirely based on state-of-the-art approaches such as...

Cartographie des acteurs étatiques du cyber en France

0
Avec l'aimable autorisation de Martial Le Guédard, nous reproduisons ci-dessous sa cartographie au sujet des différents acteurs étatiques évoluant dans le domaine du Cyber...

What are the threats to space systems?

0
In this article, we will try to identify the various threats to space systems. This article is a synthesis of the CSIS (Center for Strategic...

Qu’est-ce que le grand Commandement De l’Espace (CDE) créé par la France pour la...

0
Le Commandement De l’Espace (CDE) a été créé par arrêté le 3 septembre 2019. Il succède au Commandement interarmées de l’espace (CIE). Il rassemble...