First CTF in space with Hack-A-Sat: the US Air Force launches a Bug Bounty...

0
It was the TechCrunch site that revealed the information. The U.S. Air Force will launch a bug bounty program in the form of a...

MITRE realeased ATT&CK v14 with improvements to Detections, ICS, Mobile

0
🔥 On 31 October 2023, the MITRE Corporation realeased ATT&CK v14, the new version of its framework. This new version includes significant improvements to Detections,...

DEF CON 29 Aerospace Village Videos

1
DEF CON Aerospace Village is a researcher led, non-profit whose mission is to build a diverse community focussed on the security of everything from...

Un chercheur alerte sur le risque de piratage des petits satellites comme ceux de...

0
SpaceX et d'autres sociétés se précipitent pour mettre en orbite des milliers de petits satellites bon marché, mais la pression pour maintenir les coûts...

Very proud to have earned the Kelley School of Business – Space Cybersecurity Professional...

0
I’m pleased to announce that I have obtained a new certification: Kelley School of Business Executive Education Space Cybersecurity from Indiana University - Kelley...

Top 25 most dangerous software weaknesses than can affect satellites in 2023

0
Issues of vulnerabilities of space systems to cyber attacks has long been ignored for reasons common to industrial systems or SCADA (Supervisory Control And...

An analysis of the Thales satellite hacking demo CYSAT 2023 by SPARTA team

0
Brandon Bailey & Brad Roeher from the SPARTA team analyzed, in this article, Thales Group’s CYSAT ’23 presentation material to deconstruct the experiment, extract lessons...

CyberInflight is part of the contributor list of the SPARTA framework

0
CyberInflight team is part of the contributor list of the SPARTA framework. The last version published on July 18, 2023, adds more than 60...

Est-il possible de hacker le lanceur Falcon9 de SpaceX ?

0
Cet article est traduit en français et publié sur notre site avec l'autorisation de son auteur Téodor Chabin. Vous pouvez retrouvez l'article original ici Chaque...

Aerospace Corporation released SPARTA v1.3, a new version of the Space Attack Research and...

0
Thank's to Calogero Vinciguerra (Space Policy Officer & Space Threats Response Architecture DO at the European External Action Service, EEAS) and Kimberly King (Senior...

Last Posts

Exploring the power of the METEORSTORM™ framework — a framework built for full-spectrum modeling...

0
I'm very proud to have successfully taken up a new challenge exam in beta version about METEORSTORM™ framework which allowed me to obtain the...

An analysis of the Thales satellite hacking demo at CYSAT 2023 with the MITRE...

0
Disclaimer Please be informed that the analysis detailed in this article is entirely separate from the hacking experiment conducted by the Thales team on the...

Enhancing Threat Understanding: Modeling the Viasat Cyber Attack with MITRE CTID’s Attack Flow Builder

0
Introduction In the complex landscape of modern cybersecurity, understanding the intricate mechanisms of sophisticated cyber attacks has become paramount. On February 24, 2022, Viasat, a global...

My work about the Viasat attack analysis featured in the Angelina Tsuboi’s course on Satellite Cybersecurity...

0
I’m very proud and honored to be featured in the Angelina Tsuboi's course on Satellite Cybersecurity Foundations hosted on Udemy. Thank you very much...

The dark side of the DNS or the war of the port 53

0
I am very happy and proud that my article on DNS security has been accepted and published in the last issue of Hakin9 Magazine...

Popular posts

Description of the Elements of a Satellite Command and Control System

1
In order to be able to analyse the various threats and identify the risks facing a space system, it is necessary to describe precisely...

Install KYPO Cyber Range Platform on Openstack and Ubuntu in AWS cloud

4
KYPO is a Cyber Range Platform (KYPO CRP) developed by Masaryk University since 2013. KYPO CRP is entirely based on state-of-the-art approaches such as...

An analysis of the Viasat cyber attack with the MITRE ATT&CK® framework

0
Disclaimer To do this analysis of the Viasat cyber attack, I used the open-source intelligence (1) of the team composed by Nicolò Boschetti (Cornell University),...

What are the threats to space systems?

0
In this article, we will try to identify the various threats to space systems. This article is a synthesis of the CSIS (Center for Strategic...

Cartographie des acteurs étatiques du cyber en France

0
Avec l'aimable autorisation de Martial Le Guédard, nous reproduisons ci-dessous sa cartographie au sujet des différents acteurs étatiques évoluant dans le domaine du Cyber...