CYSAT ’22, a space cybersecurity conference in Paris (April 6-7th 2022)
CYSAT is the first European event entirely dedicated to cybersecurity for space.
After a first successful edition over 2 days in March 2021 with over...
How to model an attack on an Industrial Control Systems (ICS)
Attacks on OT (Operational Technology) systems are made easier due to the OT/IT convergence.
The figure below is showing an example of OT/IT convergence.
Attacks on OT...
Live Webinar on Aerospace Cybersecurity: Satellite Hacking
Find below the first ever webinar by PenTest Mag! Hosted by Timothy Hoffman, the talk will evolve around the topic of the online course...
Sample of the last Space Cybersecurity Market Intelligence 2023 Report from CyberInflight
CyberInflight and Florent Rizzo shared an excerpt of their last Space Cybersecurity Market Intelligence 2023 Report.
Here is what Florent said in French about this...
The dark side of the DNS or the war of the port 53
I am very happy and proud that my article on DNS security has been accepted and published in the last issue of Hakin9 Magazine...
Espaces extra-atmosphériques et cyberespace : éléments d’approches croisées
Le cyberespace et les espaces extra-atmosphériques sont les deux « nouveaux » milieux de conflictualité du 21ème siècle. Leur nouveauté tient moins à leur création (le...
CNSSI 1253 and NIST released the Space Platform Overlay
The CNSSI 1253 (Committee on National Security Systems Instruction No. 1253) has released (Attachment 2) the Space Platform Overlay as a companion of the...
My cybersecurity review for 2023
What an incredible end to 2023. I've had some wonderful experiences. I've successfully met many challenges in cybersecurity.
I took part of the 3-day...
Top des comptes #Cyber à suivre sur Linkedin
Souvent on pense à Twitter pour réaliser sa veille sécu. Mais Linkedin reste une excellente source d'information dans le domaine du cyber. Je vous...
An analysis of the Thales satellite hacking demo at CYSAT 2023 with the METEORSTORM™...
Disclaimer
Please be informed that the analysis detailed in this article is entirely separate from the hacking experiment conducted by the Thales team on the...






















