Description of the Elements of a Satellite Command and Control System
In order to be able to analyse the various threats and identify the risks facing a space system, it is necessary to describe precisely...
Est-il possible de hacker le lanceur Falcon9 de SpaceX ?
Cet article est traduit en français et publié sur notre site avec l'autorisation de son auteur Téodor Chabin. Vous pouvez retrouvez l'article original ici
Chaque...
Space Odyssey: An Experimental Software Security Analysis of Satellites
The abstact below is taken from a paper written by Johannes Willbold, Moritz Schloegel, Manuel Vogele, Maximilian Gerhardt, Thorsten Holz and Ali Abbasi.
This paper...
The dark side of the DNS or the war of the port 53
I am very happy and proud that my article on DNS security has been accepted and published in the last issue of Hakin9 Magazine...
Aerospace cybersecurity manuals bundle : satellites, drones, airplanes, and signals intelligence systems
Angelina Tsuboi is a programmer, mechatronics developer and Engineer, a pilot, a Scientific Researcher and cybersecurity researcher. She is currently working for NASA. She...
Back to Turla or how a Russian-speaking cyber-espionage group exploits satellites
Kaspersky Lab experts were the first to reveal in 2015 that the Russian hacker group Turla APT had exploited and hijacked satellite feeds to...
My cybersecurity review for 2024
What an incredible end to 2024. I’ve had some wonderful experiences. I’ve successfully met many challenges in cybersecurity.
I've had some incredible opportunities and I've...
CYSAT: The leading European cybersecurity and space exhibition to take place 26th-27th April in...
The biggest European event entirely focused on cybersecurity for the space industry will take place in Paris in April 2023. Since 2021, the event...
« Aerospace Cybersecurity: Satellite Hacking » course review
I just successfully completed the comprehensive course on « Aerospace Cybersecurity: Satellite Hacking » and passed successfully the final exam with a result of...
Enhancing Threat Understanding: Modeling the Viasat Cyber Attack with MITRE CTID’s Attack Flow Builder
Introduction
In the complex landscape of modern cybersecurity, understanding the intricate mechanisms of sophisticated cyber attacks has become paramount.
On February 24, 2022, Viasat, a global...






















