Sample of the last Space Cybersecurity Market Intelligence 2023 Report from CyberInflight
CyberInflight and Florent Rizzo shared an excerpt of their last Space Cybersecurity Market Intelligence 2023 Report.
Here is what Florent said in French about this...
My cybersecurity review for 2024
What an incredible end to 2024. I’ve had some wonderful experiences. I’ve successfully met many challenges in cybersecurity.
I've had some incredible opportunities and I've...
Description of the Elements of a Satellite Command and Control System
In order to be able to analyse the various threats and identify the risks facing a space system, it is necessary to describe precisely...
Hack-A-Sat avec NoLimitSecu (podcast)
Le dernier numéro de NoLimitSecu revient sur la compétition "Hack-a-Sat", un programme de bug bounty de l’armée de l’air américaine (US Air Force) sous...
Mapping the Thales Satellite Hacking Demo using SPARTA TTPs and PWNSAT ATT&CK Flow Builder...
In 2023, during the CYSAT conference, Thales presented a live demonstration of a satellite hacking scenario, a milestone event that shed light on the...
Detecting Aircraft Spoofing With Fly-Catcher
Aviation technology is vulnerable to a wide range of cyber threats. Hackers can easily spoof "ghost" aircraft into the sky.
In order to tackle this...
The Interstellar Integrity (i2) magazine interviewed me about my passion for space and cybersecurity
I'm very proud to be featured in the second edition (nov 2023) of Interstellar Integrity (i2) released by ethicallyHackingspace(eHs)®.
Thank's to William Ferguson for this...
Hack-A-Sat Challenge, a satellite hacking challenge from the Us Air Force, shifts to fully...
It's official, DEF CON 28, the famous international hackers conference, becomes virtual, as does the Hack-A-Sat event, the US Air Force program that invites...
How I used MITRE EMB3D™ Threat Model to identify Siemens PLC vulnerabilities exploited by...
Introduction
In this article, I will show how I used the MITRE EMB3D™ Threat Model to identify vulnerabilities in SIEMENS PLCs that were exploited by...
An analysis of the Viasat cyber attack with the MITRE ATT&CK® framework
Disclaimer
To do this analysis of the Viasat cyber attack, I used the open-source intelligence (1) of the team composed by Nicolò Boschetti (Cornell University),...





















