How to model an attack on an Industrial Control Systems (ICS)
Attacks on OT (Operational Technology) systems are made easier due to the OT/IT convergence.
The figure below is showing an example of OT/IT convergence.
Attacks on OT...
CYSAT ’23, a space cybersecurity conference : Full Keynotes and Presentations
CYSAT ’23 is the first conference in Europe dedicated to satellite and space industry cyber security. It took place from 26 to 27 April...
Exploring the power of the METEORSTORM™ framework — a framework built for full-spectrum modeling...
I'm very proud to have successfully taken up a new challenge exam in beta version about METEORSTORM™ framework which allowed me to obtain the...
My experience and tips after successfully passed the CISM (Certified Information Security Manager) from...
🌟 I'm thrilled to share that I've earned the CISM (Certified Information Security Manager) from ISACA. You can view my achievement on Credly.
🌍 This...
Indiana University – Kelley School of Business launches a new academic program dedicated to...
Russia’s cyberattack on ViaSat on the eve of its invasion of Ukraine put the cyber fragility of space systems high on the agenda and...
Pour dissuader les attaques contre les satellites, il est nécessaire d’avoir une stratégie efficace...
John J. Klein, un chercheur résident au sein de la société Falcon Research, en Virginie du Nord (États-Unis), a récemment publié un article sur...
CYSAT ’22, a space cybersecurity conference in Paris (April 6-7th 2022)
CYSAT is the first European event entirely dedicated to cybersecurity for space.
After a first successful edition over 2 days in March 2021 with over...
Des pirates informatiques annoncent avoir infiltré un sous-traitant de la NASA juste après le...
Les opérateurs du rançongiciel (ransomware) DoppelPaymer ont félicité la NASA ainsi que la société SpaceX d'Elon Musk pour le premier lancement d'une fusée privée...
Hack-A-Sat avec NoLimitSecu (podcast)
Le dernier numéro de NoLimitSecu revient sur la compétition "Hack-a-Sat", un programme de bug bounty de l’armée de l’air américaine (US Air Force) sous...
An analysis of the Thales satellite hacking demo at CYSAT 2023 with the METEORSTORM™...
Disclaimer
Please be informed that the analysis detailed in this article is entirely separate from the hacking experiment conducted by the Thales team on the...





















