Space and Satellites Security Conferences at DEF CON 32 (and a little bit Aviation...
The videos from the Def Con 32 conference held in Las Vegas from August 8th to 11th are now online. Perfect for keeping busy...
Enhancing Threat Understanding: Modeling the Viasat Cyber Attack with MITRE CTID’s Attack Flow Builder
Introduction
In the complex landscape of modern cybersecurity, understanding the intricate mechanisms of sophisticated cyber attacks has become paramount.
On February 24, 2022, Viasat, a global...
How I used MITRE EMB3D™ Threat Model to identify Siemens PLC vulnerabilities exploited by...
Introduction
In this article, I will show how I used the MITRE EMB3D™ Threat Model to identify vulnerabilities in SIEMENS PLCs that were exploited by...
Live Webinar on Aerospace Cybersecurity: Satellite Hacking
Find below the first ever webinar by PenTest Mag! Hosted by Timothy Hoffman, the talk will evolve around the topic of the online course...
Thales prepares to secure European infrastructures against attacks from future quantum computers
14 April 2023, Paris, La Défense (Press Release)
As a driving force in the second quantum revolution, Thales has joined forces with around twenty deep...
MITRE Releases EMB3D™ – A Cybersecurity Threat Model for Embedded Devices
Collaborative framework provides common understanding to mitigate cyber threats to critical infrastructure
MCLEAN, Va. & BEDFORD, Mass., May 13, 2024--(BUSINESS WIRE)--The EMB3D Threat Model is...
Mapping the Thales Satellite Hacking Demo using SPARTA TTPs and PWNSAT ATT&CK Flow Builder...
In 2023, during the CYSAT conference, Thales presented a live demonstration of a satellite hacking scenario, a milestone event that shed light on the...
Some very funny memes on space security
Below, I show some very funny memes on space security I created. Do not hesitate to download them and to share them.
SPAce Domain Cybersecurity framework aka. SpaDoCs
The space and cyber domains have developed in parallel over the past several decades. The two domains evolved separately and have employed different architectural...
Reaching for the Stars with Zero Trust: Space Domain Applications
In this article, we will explore if we can apply Zero Trust in space domain, for example in satellites or space missions, how and...





















