Hacking demo at CYSAT 2023: world first or “déjà vu”❓ Here is what I know 👇

0
CYSAT 2023 is over. It’s time to review everything that has happened during this amazing event. But first, let’s remember what CYSAT is. CYSAT is the leading...

My cybersecurity review for 2024

0
What an incredible end to 2024. I’ve had some wonderful experiences. I’ve successfully met many challenges in cybersecurity. I've had some incredible opportunities and I've...

Thales demo at CYSAT: what was the point again

0
CYSAT 2023 is over. It’s time to review everything that has happened during this amazing event. But first, let’s remember what CYSAT is. CYSAT is the leading...

Présentation du mastère “Defense and Security in Space” de l’École de l’Air et de...

0
Depuis plusieurs années, l’espace connaît un développement particulièrement important, que ce soit en lien avec des applications de la vie quotidienne (télécommunication, navigation &...

Thales prepares to secure European infrastructures against attacks from future quantum computers

0
14 April 2023, Paris, La Défense (Press Release) As a driving force in the second quantum revolution, Thales has joined forces with around twenty deep...

The Interstellar Integrity (i2) magazine interviewed me about my passion for space and cybersecurity

0
I'm very proud to be featured in the second edition (nov 2023) of Interstellar Integrity (i2) released by ethicallyHackingspace(eHs)®. Thank's to William Ferguson for this...

De qui se MOOC-t-on ? Liste des meilleurs MOOCs sur la Cybersécurité

0
J'ai découvert, il y a un certain temps, le monde merveilleux des MOOCs. J'ai voulu découvrir de quoi il s'agissait en participant à des...

Hack-A-Sat avec NoLimitSecu (podcast)

0
Le dernier numéro de NoLimitSecu revient sur la compétition "Hack-a-Sat", un programme de bug bounty de l’armée de l’air américaine (US Air Force) sous...

Thales seizes control of ESA demonstration satellite in first cybersecurity exercise of its kind

0
25 April 2023, Paris, For the third edition of CYSAT, the European event entirely dedicated to cybersecurity for the space industry, taking place on...

Airbus Defence and Space a été sélectionné pour construire l’orbiteur qui ramènera vers la...

0
L'annonce a été faite ce mercredi 29 juillet 2020 par Dirk Hoke, le Chief Executive Officer (CEO) d'Airbus Defence and Space (ADS). Airbus Defence and...

Last Posts

Exploring the power of the METEORSTORM™ framework — a framework built for full-spectrum modeling...

0
I'm very proud to have successfully taken up a new challenge exam in beta version about METEORSTORM™ framework which allowed me to obtain the...

An analysis of the Thales satellite hacking demo at CYSAT 2023 with the MITRE...

0
Disclaimer Please be informed that the analysis detailed in this article is entirely separate from the hacking experiment conducted by the Thales team on the...

Enhancing Threat Understanding: Modeling the Viasat Cyber Attack with MITRE CTID’s Attack Flow Builder

0
Introduction In the complex landscape of modern cybersecurity, understanding the intricate mechanisms of sophisticated cyber attacks has become paramount. On February 24, 2022, Viasat, a global...

My work about the Viasat attack analysis featured in the Angelina Tsuboi’s course on Satellite Cybersecurity...

0
I’m very proud and honored to be featured in the Angelina Tsuboi's course on Satellite Cybersecurity Foundations hosted on Udemy. Thank you very much...

The dark side of the DNS or the war of the port 53

0
I am very happy and proud that my article on DNS security has been accepted and published in the last issue of Hakin9 Magazine...

Popular posts

Description of the Elements of a Satellite Command and Control System

1
In order to be able to analyse the various threats and identify the risks facing a space system, it is necessary to describe precisely...

Install KYPO Cyber Range Platform on Openstack and Ubuntu in AWS cloud

4
KYPO is a Cyber Range Platform (KYPO CRP) developed by Masaryk University since 2013. KYPO CRP is entirely based on state-of-the-art approaches such as...

An analysis of the Viasat cyber attack with the MITRE ATT&CK® framework

0
Disclaimer To do this analysis of the Viasat cyber attack, I used the open-source intelligence (1) of the team composed by Nicolò Boschetti (Cornell University),...

What are the threats to space systems?

0
In this article, we will try to identify the various threats to space systems. This article is a synthesis of the CSIS (Center for Strategic...

Cartographie des acteurs étatiques du cyber en France

0
Avec l'aimable autorisation de Martial Le Guédard, nous reproduisons ci-dessous sa cartographie au sujet des différents acteurs étatiques évoluant dans le domaine du Cyber...