Top 25 most dangerous software weaknesses than can affect satellites in 2023
Issues of vulnerabilities of space systems to cyber attacks has long been ignored for reasons common to industrial systems or SCADA (Supervisory Control And...
Space Cyber Security Watch N°7 (November 7, 2021)
Find below the new Space Cyber Security Watch No 7 (November 7, 2021). In this paper, you will find everything that has caught our...
DroneSec, a private intelligence agency for drone threats, that provides UAS Threat Intelligence and...
DroneSec is a private intelligence agency for drone threats. DroneSec provides drone threat intelligence solutions to protect people and drones from malicious drones and...
Hack-A-Sat avec NoLimitSecu (podcast)
Le dernier numéro de NoLimitSecu revient sur la compétition "Hack-a-Sat", un programme de bug bounty de l’armée de l’air américaine (US Air Force) sous...
23 Tips to Pass CCSK (Certificate of Cloud Security Knowledge) from CSA at the...
At the beginning of April 2020, I successfully passed the CCSK certification (Certificate of Cloud Security Knowledge). Now, I give you some tips and...
Hacktivism Goes Orbital: Investigating NB65’s Breach of ROSCOSMOS
In March of 2022, Network battalion 65 (NB65), a hacktivist affiliate of Anonymous, publicly asserted its successful breach of ROSCOSMOS’s satellite imaging capabilities in...
Thales demo at CYSAT: what was the point again
CYSAT 2023 is over. It’s time to review everything that has happened during this amazing event. But first, let’s remember what CYSAT is.
CYSAT is the leading...
“Introduction to Cybersecurity in Space Systems” with Tim Fowler is coming up during the...
Tim Fowler will provide a training course called "Introduction to Cybersecurity in Space Systems" at "The Most Offensive Con that Ever Offensived – Bypass...
Very proud to have earned the Space Domain Cybersecurity digital badge from Teaching Science...
🚀 I’m proud to took part of the 3-day Space Domain Cybersecurity course provided by Teaching Science & Technology, Inc. (TSTI) in partnership with...
How I used MITRE EMB3D™ Threat Model to identify Siemens PLC vulnerabilities exploited by...
Introduction
In this article, I will show how I used the MITRE EMB3D™ Threat Model to identify vulnerabilities in SIEMENS PLCs that were exploited by...