SpaceSec, the Workshop on the Security of Space and Satellite Systems

0
SpaceSec is the Workshop on the Security of Space and Satellite Systems https://spacesec.info/ SpaceSec 2023 took place on the 27 February 2023 in San Diego, California. https://www.ndss-symposium.org/ndss-program/spacesec-2023/ The...

Un chercheur alerte sur le risque de piratage des petits satellites comme ceux de...

0
SpaceX et d'autres sociétés se précipitent pour mettre en orbite des milliers de petits satellites bon marché, mais la pression pour maintenir les coûts...

Very proud to receive the certificate of completion : « Introduction to Cybersecurity in...

0
I’m very proud to receive the following certificate of completion for having successfully completed the training course : « Introduction to Cybersecurity in Space...

Top 25 most dangerous software weaknesses than can affect satellites in 2023

0
Issues of vulnerabilities of space systems to cyber attacks has long been ignored for reasons common to industrial systems or SCADA (Supervisory Control And...

DroneSec, a private intelligence agency for drone threats, that provides UAS Threat Intelligence and...

0
DroneSec is a private intelligence agency for drone threats. DroneSec provides drone threat intelligence solutions to protect people and drones from malicious drones and...

An analysis of the Viasat cyber attack with the MITRE ATT&CK® framework

0
Disclaimer To do this analysis of the Viasat cyber attack, I used the open-source intelligence (1) of the team composed by Nicolò Boschetti (Cornell University),...

Back to the lastest “In-Flight Abort Test” from SpaceX before the first manned flight...

0
On Sunday, January 19, 2020, the last big test for SpaceX, Elon Musk's company, took place successfully. It was to simulate a failure of...

Space Security Challenge 2021: Hack-A-Sat 2 is back to hack an on-orbit US satellite

0
The U.S. Air and Space Forces in collaboration with the security research community opened registration May 4 for the qualification round of the second annual Space...

Try to dock the SpaceX Crew Dragon at the space station in this simulator

0
Put yourself in the shoes of a NASA astronaut and try to dock to the ISS with this Crew Dragon capsule simulator. Will you...

My work about the Viasat attack analysis featured in the Angelina Tsuboi’s course on Satellite Cybersecurity...

0
I’m very proud and honored to be featured in the Angelina Tsuboi's course on Satellite Cybersecurity Foundations hosted on Udemy. Thank you very much...

Last Posts

Exploring the power of the METEORSTORM™ framework — a framework built for full-spectrum modeling...

0
I'm very proud to have successfully taken up a new challenge exam in beta version about METEORSTORM™ framework which allowed me to obtain the...

An analysis of the Thales satellite hacking demo at CYSAT 2023 with the MITRE...

0
Disclaimer Please be informed that the analysis detailed in this article is entirely separate from the hacking experiment conducted by the Thales team on the...

Enhancing Threat Understanding: Modeling the Viasat Cyber Attack with MITRE CTID’s Attack Flow Builder

0
Introduction In the complex landscape of modern cybersecurity, understanding the intricate mechanisms of sophisticated cyber attacks has become paramount. On February 24, 2022, Viasat, a global...

My work about the Viasat attack analysis featured in the Angelina Tsuboi’s course on Satellite Cybersecurity...

0
I’m very proud and honored to be featured in the Angelina Tsuboi's course on Satellite Cybersecurity Foundations hosted on Udemy. Thank you very much...

The dark side of the DNS or the war of the port 53

0
I am very happy and proud that my article on DNS security has been accepted and published in the last issue of Hakin9 Magazine...

Popular posts

Description of the Elements of a Satellite Command and Control System

1
In order to be able to analyse the various threats and identify the risks facing a space system, it is necessary to describe precisely...

Install KYPO Cyber Range Platform on Openstack and Ubuntu in AWS cloud

4
KYPO is a Cyber Range Platform (KYPO CRP) developed by Masaryk University since 2013. KYPO CRP is entirely based on state-of-the-art approaches such as...

An analysis of the Viasat cyber attack with the MITRE ATT&CK® framework

0
Disclaimer To do this analysis of the Viasat cyber attack, I used the open-source intelligence (1) of the team composed by Nicolò Boschetti (Cornell University),...

What are the threats to space systems?

0
In this article, we will try to identify the various threats to space systems. This article is a synthesis of the CSIS (Center for Strategic...

Cartographie des acteurs étatiques du cyber en France

0
Avec l'aimable autorisation de Martial Le Guédard, nous reproduisons ci-dessous sa cartographie au sujet des différents acteurs étatiques évoluant dans le domaine du Cyber...