Space and Satellites Security Conferences at DEF CON 32 (and a little bit Aviation...

0
The videos from the Def Con 32 conference held in Las Vegas from August 8th to 11th are now online. Perfect for keeping busy...

Un chercheur alerte sur le risque de piratage des petits satellites comme ceux de...

0
SpaceX et d'autres sociétés se précipitent pour mettre en orbite des milliers de petits satellites bon marché, mais la pression pour maintenir les coûts...

An analysis of the Viasat cyber attack with the MITRE ATT&CK® framework

0
Disclaimer To do this analysis of the Viasat cyber attack, I used the open-source intelligence (1) of the team composed by Nicolò Boschetti (Cornell University),...

Solarium CSC 2.0 has endorsed designation of space systems as a critical infrastructure sector

0
The Cyberspace Solarium Commission (CSC) was established in the John S. McCain National Defense Authorization Act for Fiscal Year 2019 to "develop a consensus...

The dark side of the DNS or the war of the port 53

0
I am very happy and proud that my article on DNS security has been accepted and published in the last issue of Hakin9 Magazine...

Coverage by CyberInflight of the Russian satellite telecom Dozor-Teleport Attack

0
CyberInflight (www.cyberinflight.com) is an independant consulting and business intelligence company dedicated to the topic of Aerospace Cybersecurity. CyberInflight’s goal is to raise the global cybersecurity...

An analysis of the Thales satellite hacking demo at CYSAT 2023 with the MITRE...

0
Disclaimer Please be informed that the analysis detailed in this article is entirely separate from the hacking experiment conducted by the Thales team on the...

Enhancing Threat Understanding: Modeling the Viasat Cyber Attack with MITRE CTID’s Attack Flow Builder

0
Introduction In the complex landscape of modern cybersecurity, understanding the intricate mechanisms of sophisticated cyber attacks has become paramount. On February 24, 2022, Viasat, a global...

Participez au challenge DG’hAck, un CTF organisé par la DGA

0
Vous êtes étudiant, professionnel ou simplement passionné en cybersécurité et vous aimez les défis ? Participez au challenge #DGhAck organisé par la DGA, la...

Est-il possible de hacker le lanceur Falcon9 de SpaceX ?

0
Cet article est traduit en français et publié sur notre site avec l'autorisation de son auteur Téodor Chabin. Vous pouvez retrouvez l'article original ici Chaque...

Last Posts

Mapping the Thales Satellite Hacking Demo using SPARTA TTPs and PWNSAT ATT&CK Flow Builder...

0
In 2023, during the CYSAT conference, Thales presented a live demonstration of a satellite hacking scenario, a milestone event that shed light on the...

2nd International Conference on Gravitation, Astrophysics and Cosmology (ICGAC2026) – April 16-18, 2026 in...

0
We are pleased to announce that the 2nd International Conference on Gravitation, Astrophysics and Cosmology (ICGAC2026) will be held on April 16-18, 2026, in...

Two big announcements : the release of SPARTA v3.1 with MITRE’s EMB3D mapping and...

0
In the following article, discover the major advancements announced with the release of SPARTA v3.1: the addition of new NIST space segment guidance, the...

An analysis of the Thales satellite hacking demo at CYSAT 2023 with the METEORSTORM™...

0
Disclaimer Please be informed that the analysis detailed in this article is entirely separate from the hacking experiment conducted by the Thales team on the...

Exploring the power of the METEORSTORM™ framework — a framework built for full-spectrum modeling...

0
I'm very proud to have successfully taken up a new challenge exam in beta version about METEORSTORM™ framework which allowed me to obtain the...

Popular posts

Description of the Elements of a Satellite Command and Control System

1
In order to be able to analyse the various threats and identify the risks facing a space system, it is necessary to describe precisely...

Install KYPO Cyber Range Platform on Openstack and Ubuntu in AWS cloud

4
KYPO is a Cyber Range Platform (KYPO CRP) developed by Masaryk University since 2013. KYPO CRP is entirely based on state-of-the-art approaches such as...

What are the threats to space systems?

0
In this article, we will try to identify the various threats to space systems. This article is a synthesis of the CSIS (Center for Strategic...

An analysis of the Viasat cyber attack with the MITRE ATT&CK® framework

0
Disclaimer To do this analysis of the Viasat cyber attack, I used the open-source intelligence (1) of the team composed by Nicolò Boschetti (Cornell University),...

ESA released the SPACE-SHIELD, an ATT&CK® like knowledge-base framework for Space Systems

2
I dreamed about it, ESA did it! ESA (European Space Agency) released the SPACE-SHIELD (Space Attacks and Countermeasures Engineering Shield). This is an ATT&CK®...