Top des comptes #Cyber à suivre sur Linkedin

0
Souvent on pense à Twitter pour réaliser sa veille sécu. Mais Linkedin reste une excellente source d'information dans le domaine du cyber. Je vous...

Space Cybersecurity Weekly Watch by CyberInflight – 20 26/03/2023

0
HOT NEWS CyberInflight and Florent Rizzo have just announced the release of their first Space Cybersecurity Weekly Watch. They have been working on a weekly...

Very proud to receive the certificate of completion : « Introduction to Cybersecurity in...

0
I’m very proud to receive the following certificate of completion for having successfully completed the training course : « Introduction to Cybersecurity in Space...

Introduction to Cybersecurity for Commercial Satellite Operations: Draft NISTIR 8270

1
Space operations are vital to advancing the security, economic prosperity, and scientific knowledge of the Nation. However, cyber-related threats to space assets and supporting...

La chine réalise la première communication sécurisée par cryptographie quantique basée sur l’intrication depuis...

0
Selon une étude publiée le 15 juin dans la revue Nature, des scientifiques chinois ont réalisé la première distribution de clés quantiques au monde...

Sample of the last Space Cybersecurity Market Intelligence 2023 Report from CyberInflight

1
CyberInflight and Florent Rizzo shared an excerpt of their last Space Cybersecurity Market Intelligence 2023 Report. Here is what Florent said in French about this...

Exploring the power of the METEORSTORM™ framework — a framework built for full-spectrum modeling...

0
I'm very proud to have successfully taken up a new challenge exam in beta version about METEORSTORM™ framework which allowed me to obtain the...

ethicallyHackingspace (eHs)® h4ck32n4u75™ (Hackernauts) Community Member

0
I'm very proud to have been choosen as ethicallyHackingspace(eHs)® h4ck32n4u75™ (Hackernauts) Community Member. Thank's to William Ferguson for this distinction. The "h4ck32n4u75™" badge, pronounced "hackernauts,"...

Key Takeaways from CYSAT 2023 by Mathieu Bailly, VP at CYSEC and Director of...

0
CYSAT 2023 is over. It's time to review everything that has happened during this amazing event. But first, let's remember what CYSAT is. CYSAT is the...

A comprehensive 3-day Space Domain Cybersecurity course organized around the SPAce Domain Cybersecurity (SpaDoCs)...

0
This article describes a comprehensive 3-day Space Domain Cybersecurity course organized around the SPAce Domain Cybersecurity (SpaDoCs) Framework. Course Description This Space Domain Cybersecurity course examines...

Last Posts

MITRE ESTM + EMB3D in Action : Analyzing OPS-SAT Through These Dual Frameworks

0
Disclaimer Please be informed that the analysis detailed in this article is entirely separate from the hacking experiment conducted by the Thales team on the...

Exploring how the new MITRE ESTM (Embedded Systems Threat Matrix) can work in conjunction...

0
Recently, MITRE released ESTM (Embedded Systems Threat Matrix), a new cybersecurity framework designed to protect embedded systems. Built on the proven ATT&CK® methodology, ESTM...

SPARTA v3.2: Raising the Bar for Threat‑Informed Space Cybersecurity

0
The Aerospace Corporation has released SPARTA v3.2, further strengthening its role as a practical, threat‑informed framework for securing modern space missions against sophisticated cyberattacks. This...

Introducing the new MITRE Embedded Systems Threat Matrix (ESTM)

0
Embedded systems have become the unsung heroes of modern technology. They power our satellites, medical devices, vehicles, and industrial infrastructures, quietly operating at the...

Mapping the Thales Satellite Hacking Demo using SPARTA TTPs and PWNSAT ATT&CK Flow Builder...

0
In 2023, during the CYSAT conference, Thales presented a live demonstration of a satellite hacking scenario, a milestone event that shed light on the...

Popular posts

Description of the Elements of a Satellite Command and Control System

1
In order to be able to analyse the various threats and identify the risks facing a space system, it is necessary to describe precisely...

Install KYPO Cyber Range Platform on Openstack and Ubuntu in AWS cloud

4
KYPO is a Cyber Range Platform (KYPO CRP) developed by Masaryk University since 2013. KYPO CRP is entirely based on state-of-the-art approaches such as...

What are the threats to space systems?

0
In this article, we will try to identify the various threats to space systems. This article is a synthesis of the CSIS (Center for Strategic...

An analysis of the Viasat cyber attack with the MITRE ATT&CK® framework

0
Disclaimer To do this analysis of the Viasat cyber attack, I used the open-source intelligence (1) of the team composed by Nicolò Boschetti (Cornell University),...

ESA released the SPACE-SHIELD, an ATT&CK® like knowledge-base framework for Space Systems

2
I dreamed about it, ESA did it! ESA (European Space Agency) released the SPACE-SHIELD (Space Attacks and Countermeasures Engineering Shield). This is an ATT&CK®...