Detecting Aircraft Spoofing With Fly-Catcher
Aviation technology is vulnerable to a wide range of cyber threats. Hackers can easily spoof "ghost" aircraft into the sky.
In order to tackle this...
Solarium CSC 2.0 has endorsed designation of space systems as a critical infrastructure sector
The Cyberspace Solarium Commission (CSC) was established in the John S. McCain National Defense Authorization Act for Fiscal Year 2019 to "develop a consensus...
An analysis of the Thales satellite hacking demo at CYSAT 2023 with the METEORSTORM™...
Disclaimer
Please be informed that the analysis detailed in this article is entirely separate from the hacking experiment conducted by the Thales team on the...
23 Tips to Pass CCSK (Certificate of Cloud Security Knowledge) from CSA at the...
At the beginning of April 2020, I successfully passed the CCSK certification (Certificate of Cloud Security Knowledge). Now, I give you some tips and...
An analysis of the Thales satellite hacking demo CYSAT 2023 by SPARTA team
Brandon Bailey & Brad Roeher from the SPARTA team analyzed, in this article, Thales Group’s CYSAT ’23 presentation material to deconstruct the experiment, extract lessons...
Pour dissuader les attaques contre les satellites, il est nécessaire d’avoir une stratégie efficace...
John J. Klein, un chercheur résident au sein de la société Falcon Research, en Virginie du Nord (États-Unis), a récemment publié un article sur...
De qui se MOOC-t-on ? Liste des meilleurs MOOCs sur la Cybersécurité
J'ai découvert, il y a un certain temps, le monde merveilleux des MOOCs. J'ai voulu découvrir de quoi il s'agissait en participant à des...
Hacktivism Goes Orbital: Investigating NB65’s Breach of ROSCOSMOS
In March of 2022, Network battalion 65 (NB65), a hacktivist affiliate of Anonymous, publicly asserted its successful breach of ROSCOSMOS’s satellite imaging capabilities in...
Top 25 most dangerous software weaknesses than can affect satellites in 2023
Issues of vulnerabilities of space systems to cyber attacks has long been ignored for reasons common to industrial systems or SCADA (Supervisory Control And...
The dark side of the DNS or the war of the port 53
I am very happy and proud that my article on DNS security has been accepted and published in the last issue of Hakin9 Magazine...






















