Cartographie des acteurs étatiques du cyber en France

0
Avec l'aimable autorisation de Martial Le Guédard, nous reproduisons ci-dessous sa cartographie au sujet des différents acteurs étatiques évoluant dans le domaine du Cyber...

Hack-A-Sat avec NoLimitSecu (podcast)

0
Le dernier numéro de NoLimitSecu revient sur la compétition "Hack-a-Sat", un programme de bug bounty de l’armée de l’air américaine (US Air Force) sous...

Exploring the power of the METEORSTORM™ framework — a framework built for full-spectrum modeling...

0
I'm very proud to have successfully taken up a new challenge exam in beta version about METEORSTORM™ framework which allowed me to obtain the...

Install KYPO Cyber Range Platform on Openstack and Ubuntu in AWS cloud

4
KYPO is a Cyber Range Platform (KYPO CRP) developed by Masaryk University since 2013. KYPO CRP is entirely based on state-of-the-art approaches such as...

Qu’est-ce que le grand Commandement De l’Espace (CDE) créé par la France pour la...

0
Le Commandement De l’Espace (CDE) a été créé par arrêté le 3 septembre 2019. Il succède au Commandement interarmées de l’espace (CIE). Il rassemble...

ATT&CK v13 released with significant updates : Pseudocode, Swifter Search, Mobile Data Sources and...

0
🔥 On Tuesday 25 April 2023, the MITRE Corporation released ATT&CK v13, the new version of its framework. This new version includes significant updates and...

Pour dissuader les attaques contre les satellites, il est nécessaire d’avoir une stratégie efficace...

0
John J. Klein, un chercheur résident au sein de la société Falcon Research, en Virginie du Nord (États-Unis), a récemment publié un article sur...

Space Odyssey: An Experimental Software Security Analysis of Satellites

0
The abstact below is taken from a paper written by Johannes Willbold, Moritz Schloegel, Manuel Vogele, Maximilian Gerhardt, Thorsten Holz and Ali Abbasi. This paper...

Viasat Attack: A Space Cyber Attack Post Mortem Investigation

1
Introduction In this paper, I choose to investigate the Viasat cyber attack that occurred on 24 February, 2022. First, I will summarize the chronology of...

Est-il possible de hacker le lanceur Falcon9 de SpaceX ?

0
Cet article est traduit en français et publié sur notre site avec l'autorisation de son auteur Téodor Chabin. Vous pouvez retrouvez l'article original ici Chaque...

Last Posts

MITRE ESTM + EMB3D in Action : Analyzing OPS-SAT Through These Dual Frameworks

0
Disclaimer Please be informed that the analysis detailed in this article is entirely separate from the hacking experiment conducted by the Thales team on the...

Exploring how the new MITRE ESTM (Embedded Systems Threat Matrix) can work in conjunction...

0
Recently, MITRE released ESTM (Embedded Systems Threat Matrix), a new cybersecurity framework designed to protect embedded systems. Built on the proven ATT&CK® methodology, ESTM...

SPARTA v3.2: Raising the Bar for Threat‑Informed Space Cybersecurity

0
The Aerospace Corporation has released SPARTA v3.2, further strengthening its role as a practical, threat‑informed framework for securing modern space missions against sophisticated cyberattacks. This...

Introducing the new MITRE Embedded Systems Threat Matrix (ESTM)

0
Embedded systems have become the unsung heroes of modern technology. They power our satellites, medical devices, vehicles, and industrial infrastructures, quietly operating at the...

Mapping the Thales Satellite Hacking Demo using SPARTA TTPs and PWNSAT ATT&CK Flow Builder...

0
In 2023, during the CYSAT conference, Thales presented a live demonstration of a satellite hacking scenario, a milestone event that shed light on the...

Popular posts

Description of the Elements of a Satellite Command and Control System

1
In order to be able to analyse the various threats and identify the risks facing a space system, it is necessary to describe precisely...

Install KYPO Cyber Range Platform on Openstack and Ubuntu in AWS cloud

4
KYPO is a Cyber Range Platform (KYPO CRP) developed by Masaryk University since 2013. KYPO CRP is entirely based on state-of-the-art approaches such as...

What are the threats to space systems?

0
In this article, we will try to identify the various threats to space systems. This article is a synthesis of the CSIS (Center for Strategic...

An analysis of the Viasat cyber attack with the MITRE ATT&CK® framework

0
Disclaimer To do this analysis of the Viasat cyber attack, I used the open-source intelligence (1) of the team composed by Nicolò Boschetti (Cornell University),...

ESA released the SPACE-SHIELD, an ATT&CK® like knowledge-base framework for Space Systems

2
I dreamed about it, ESA did it! ESA (European Space Agency) released the SPACE-SHIELD (Space Attacks and Countermeasures Engineering Shield). This is an ATT&CK®...