My work about the Viasat attack analysis featured at the BSIDES St. Louis 2023 hacking education conference
I'm very proud to be featured by Tim Fowler in his presentation at BSIDES St. Louis 2023 hacking education conference. Tim Fowler is an offensive security analyst at Black...
How I used MITRE EMB3D™ Threat Model to identify Siemens PLC vulnerabilities exploited by...
Introduction
In this article, I will show how I used the MITRE EMB3D™ Threat Model to identify vulnerabilities in SIEMENS PLCs that were exploited by...
Reaching for the Stars with Zero Trust: Space Domain Applications
In this article, we will explore if we can apply Zero Trust in space domain, for example in satellites or space missions, how and...
Very proud to have earned the Kelley School of Business – Space Cybersecurity Professional...
I’m pleased to announce that I have obtained a new certification: Kelley School of Business Executive Education Space Cybersecurity from Indiana University - Kelley...
My work about the Viasat attack analysis featured in the SIGN.MEDIA #2 newsletter
I’m very proud to be featured by Olga Nasibullina and Tatiana Skydan in THE SIGN.MEDIA #2 newsletter.
Olga Nasibullina works mainly on cybersecurity workforce development,...
23 Tips to Pass CCSK (Certificate of Cloud Security Knowledge) from CSA at the...
At the beginning of April 2020, I successfully passed the CCSK certification (Certificate of Cloud Security Knowledge). Now, I give you some tips and...
SPAce Domain Cybersecurity framework aka. SpaDoCs
The space and cyber domains have developed in parallel over the past several decades. The two domains evolved separately and have employed different architectural...
Aerospace Corporation released SPARTA v1.3, a new version of the Space Attack Research and...
Thank's to Calogero Vinciguerra (Space Policy Officer & Space Threats Response Architecture DO at the European External Action Service, EEAS) and Kimberly King (Senior...
Enhancing Threat Understanding: Modeling the Viasat Cyber Attack with MITRE CTID’s Attack Flow Builder
Introduction
In the complex landscape of modern cybersecurity, understanding the intricate mechanisms of sophisticated cyber attacks has become paramount.
On February 24, 2022, Viasat, a global...
The dark side of the DNS or the war of the port 53
I am very happy and proud that my article on DNS security has been accepted and published in the last issue of Hakin9 Magazine...






















