{"id":2908,"date":"2024-12-28T08:52:23","date_gmt":"2024-12-28T07:52:23","guid":{"rendered":"https:\/\/www.spacesecurity.info\/my-cybersecurity-review-from-the-beginning-of-2024\/"},"modified":"2025-01-06T09:15:06","modified_gmt":"2025-01-06T08:15:06","slug":"my-cybersecurity-review-from-the-beginning-of-2024","status":"publish","type":"post","link":"https:\/\/www.spacesecurity.info\/en\/my-cybersecurity-review-from-the-beginning-of-2024\/","title":{"rendered":"My cybersecurity review for 2024"},"content":{"rendered":"<p><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/my-TOP-2024-achievements-in-cybersecurity.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-3003\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/my-TOP-2024-achievements-in-cybersecurity-1024x585.jpg\" alt=\"\" width=\"696\" height=\"398\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/my-TOP-2024-achievements-in-cybersecurity-1024x585.jpg 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/my-TOP-2024-achievements-in-cybersecurity-300x171.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/my-TOP-2024-achievements-in-cybersecurity-768x439.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/my-TOP-2024-achievements-in-cybersecurity-1536x878.jpg 1536w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/my-TOP-2024-achievements-in-cybersecurity-696x398.jpg 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/my-TOP-2024-achievements-in-cybersecurity-1068x610.jpg 1068w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/my-TOP-2024-achievements-in-cybersecurity.jpg 1792w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/a><\/p>\n<p>What an incredible end to 2024. I\u2019ve had some wonderful experiences. I\u2019ve successfully met many challenges in cybersecurity.<\/p>\n<p>I&#8217;ve had some incredible opportunities and I&#8217;ve been able to do some really interesting things.<\/p>\n<p><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/12\/LAERO-RECRUTE.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2592\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/12\/LAERO-RECRUTE.jpg\" alt=\"\" width=\"890\" height=\"476\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/12\/LAERO-RECRUTE.jpg 890w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/12\/LAERO-RECRUTE-300x160.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/12\/LAERO-RECRUTE-768x411.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/12\/LAERO-RECRUTE-696x372.jpg 696w\" sizes=\"auto, (max-width: 890px) 100vw, 890px\" \/><\/a><\/p>\n<p>I continue my role as <a href=\"https:\/\/www.spacesecurity.info\/laero-recrute-un-nouveau-programme-dont-je-suis-ambassadeur-pour-mettre-en-avant-la-filiere-de-laeronautique-du-spatiale-de-la-defense-et-de-la-securite\/\">ambassador for the Aerospace industry<\/a> within the &#8220;L&#8217;A\u00e9ro Recrute&#8221; program with the support of <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/my-job-glasses\/\" target=\"_self\" rel=\"noopener\" data-test-app-aware-link=\"\">My Job Glasses<\/a> and <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/gifas\/\" target=\"_self\" rel=\"noopener\" data-test-app-aware-link=\"\">GIFAS \u2013 Groupement des Industries Fran\u00e7aises A\u00e9ronautiques et Spatiales<\/a>, to promote the Aerospace, Sace, Defense and Security sector.<\/p>\n<p><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/01\/Tim-Fowler-1024x576-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2804\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/01\/Tim-Fowler-1024x576-1.png\" alt=\"\" width=\"1024\" height=\"576\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/01\/Tim-Fowler-1024x576-1.png 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/01\/Tim-Fowler-1024x576-1-300x169.png 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/01\/Tim-Fowler-1024x576-1-768x432.png 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/01\/Tim-Fowler-1024x576-1-696x392.png 696w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p>I took part of the \u00ab <a href=\"https:\/\/www.spacesecurity.info\/introduction-to-cybersecurity-in-space-systems-with-tim-fowler-is-coming-up-during-the-march-summit-the-most-offensive-con-that-ever-offensived-bypass-edition\/\">Introduction to Cybersecurity in Space Systems<\/a> \u00bb course provided by <a href=\"https:\/\/www.linkedin.com\/in\/ACoAAApzumcBvXX__cQgK51FzVjQ8DQcjMQRKlY\">Tim Fowler<\/a> during the march summit, The Most Offensive Con that Ever Offensived \u2013 Bypass Edition! organized by Antisyphon Training. More <a href=\"https:\/\/www.spacesecurity.info\/very-proud-to-receive-the-certificate-of-completion-introduction-to-cybersecurity-in-space-systems-with-tim-fowler\/\">here<\/a>.<\/p>\n<p><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/10\/MITRE-ATTCK-viasat-attack.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-2459\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/10\/MITRE-ATTCK-viasat-attack-1024x435.jpg\" alt=\"\" width=\"696\" height=\"296\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/10\/MITRE-ATTCK-viasat-attack-1024x435.jpg 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/10\/MITRE-ATTCK-viasat-attack-300x128.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/10\/MITRE-ATTCK-viasat-attack-768x327.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/10\/MITRE-ATTCK-viasat-attack-1536x653.jpg 1536w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/10\/MITRE-ATTCK-viasat-attack-696x296.jpg 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/10\/MITRE-ATTCK-viasat-attack-1068x454.jpg 1068w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/10\/MITRE-ATTCK-viasat-attack.jpg 1879w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/a><\/p>\n<p>My work about the analysis of the Viasat Cyber Attack has been quoted and highlighted by <strong>Tim Fowler<\/strong> and <strong>Angelina Tsuboi<\/strong> in there courses:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.spacesecurity.info\/introduction-to-cybersecurity-in-space-systems-with-tim-fowler-is-coming-up-during-the-march-summit-the-most-offensive-con-that-ever-offensived-bypass-edition\/\">Introduction to Cybersecurity in Space Systems<\/a>\u00a0with Tim Fowler<\/li>\n<li><a href=\"https:\/\/www.spacesecurity.info\/my-work-about-the-viasat-attack-analysis-featured-in-the-angelina-tsubois-course-on-satellite-cybersecurity-foundations-hosted-on-udemy\/\">Satellite Cybersecurity Foundations course<\/a> by Angelina Tsuboi<\/li>\n<li>My article about the\u00a0<a href=\"https:\/\/www.spacesecurity.info\/an-analysis-of-the-viasat-cyber-attack-with-the-mitre-attck-framework\/\">analysis of the Viasat cyber attack with the MITRE ATT&amp;CK framework<\/a><\/li>\n<li>I also wrote a <a href=\"https:\/\/www.spacesecurity.info\/space-cyber-attack-post-mortem-a-viasat-attack-investigation\/\">post mortem investigation about the Viasat Cyber Attack<\/a><\/li>\n<li>My LinkedIn group about\u00a0<a href=\"https:\/\/www.linkedin.com\/groups\/12399648\/\">Space Cybersecurity Community<\/a><\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/02\/CCZT1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-2823\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/02\/CCZT1-1024x792.jpg\" alt=\"\" width=\"696\" height=\"538\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/02\/CCZT1-1024x792.jpg 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/02\/CCZT1-300x232.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/02\/CCZT1-768x594.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/02\/CCZT1-696x538.jpg 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/02\/CCZT1-1068x826.jpg 1068w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/02\/CCZT1.jpg 1179w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/a><\/p>\n<p>I <a href=\"https:\/\/www.spacesecurity.info\/successfully-passed-the-certificate-of-competence-in-zero-trust-cczt-the-first-zero-trust-certificate-in-the-industry\/\">successfully passed the Certificate of Competence in Zero Trust (CCZT)<\/a> from the Cloud Security Alliance (CSA). CCZT enables you to understand and implement Zero Trust principles into business planning, enterprise architectures, and technology deployments. More about <a href=\"https:\/\/www.spacesecurity.info\/cloud-security-alliance-launched-cczt-the-industry-first-certificate-of-competence-in-zero-trust\/\">CCZT<\/a>.<\/p>\n<p><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/la-cybersecurite-pour-les-debutants-1217x533-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-2894\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/la-cybersecurite-pour-les-debutants-1217x533-1-1024x448.png\" alt=\"\" width=\"696\" height=\"305\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/la-cybersecurite-pour-les-debutants-1217x533-1-1024x448.png 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/la-cybersecurite-pour-les-debutants-1217x533-1-300x131.png 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/la-cybersecurite-pour-les-debutants-1217x533-1-768x336.png 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/la-cybersecurite-pour-les-debutants-1217x533-1-696x305.png 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/la-cybersecurite-pour-les-debutants-1217x533-1-1068x468.png 1068w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/la-cybersecurite-pour-les-debutants-1217x533-1.png 1217w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/a><\/p>\n<p>I was quoted in the following article alongside <a href=\"https:\/\/www.linkedin.com\/in\/gbillois\/\">Gerome Billois<\/a> (Partner &#8211; Cybersecurity and Digital Trust &#8211; Wavestone) and <a href=\"https:\/\/www.linkedin.com\/in\/martial-gervaise-840737a4\/\">Martial Gervaise<\/a> (Cybersecurity Expert &#8211; Former Deputy Director at Orange Group). This article shows how important it&#8217;s to have <a href=\"https:\/\/blog.lesjeudis.com\/se-former-a-la-cybersecurite-debutant\">a guideline in your cybersecurity career<\/a>. This article shows also how it&#8217;s important to share whith others. It&#8217;s not by staying on your own that you grow the community. It&#8217;s by sharing that we collectively increase our skills. Cybersecurity grows when it&#8217;s shared.<\/p>\n<p><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/1693052221035.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2896\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/1693052221035.jpg\" alt=\"\" width=\"800\" height=\"356\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/1693052221035.jpg 800w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/1693052221035-300x134.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/1693052221035-768x342.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/1693052221035-696x310.jpg 696w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/a><\/p>\n<p>I was elected as a <a href=\"https:\/\/www.linkedin.com\/posts\/cyberstaaar_yohann-bauzil-sur-linkedin-cyberstaaar-activity-7180599996696678400-mf8r\/\">CyberStar<\/a> (or SpaceCyberStar) by Yohann BAUZIL. CyberStar is a program that highlights those who work to make cybersecurity a reality on a daily basis, either by sharing their knowledge or by their work.<\/p>\n<p><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/01\/h4ck32n4u75\u2122-Hackernauts.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2769\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/01\/h4ck32n4u75\u2122-Hackernauts.jpg\" alt=\"\" width=\"358\" height=\"347\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/01\/h4ck32n4u75\u2122-Hackernauts.jpg 358w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/01\/h4ck32n4u75\u2122-Hackernauts-300x291.jpg 300w\" sizes=\"auto, (max-width: 358px) 100vw, 358px\" \/><\/a><\/p>\n<p>I was choosen as <a href=\"https:\/\/www.spacesecurity.info\/ethicallyhackingspace-ehs-h4ck32n4u75-hackernauts-community-member\/\">ethicallyHackingspace(eHs)\u00ae h4ck32n4u75\u2122 (Hackernauts) Community Member<\/a>. Thank&#8217;s to <a href=\"https:\/\/www.linkedin.com\/company\/h4ck32n4u75\/\">William Ferguson<\/a> for this distinction.<\/p>\n<p><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-Threat-Heat-Map-for-Siemens-S7-PLCs.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-2886\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-Threat-Heat-Map-for-Siemens-S7-PLCs-1024x367.jpg\" alt=\"\" width=\"696\" height=\"249\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-Threat-Heat-Map-for-Siemens-S7-PLCs-1024x367.jpg 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-Threat-Heat-Map-for-Siemens-S7-PLCs-300x107.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-Threat-Heat-Map-for-Siemens-S7-PLCs-768x275.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-Threat-Heat-Map-for-Siemens-S7-PLCs-1536x550.jpg 1536w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-Threat-Heat-Map-for-Siemens-S7-PLCs-2048x734.jpg 2048w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-Threat-Heat-Map-for-Siemens-S7-PLCs-696x249.jpg 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-Threat-Heat-Map-for-Siemens-S7-PLCs-1068x383.jpg 1068w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-Threat-Heat-Map-for-Siemens-S7-PLCs-1920x688.jpg 1920w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/a><\/p>\n<p>I wrote an article to explain <a href=\"https:\/\/www.spacesecurity.info\/how-i-used-mitre-emb3d-threat-model-to-identify-siemens-plc-vulnerabilities-exploited-by-stuxnet-worm\/\">how I used the new MITRE EMB3D\u2122 threat model<\/a> to identify Siemens PLC vulnerabilities potentially exploited by the Stuxnet worm. On May 13, 2024, MITRE released <a href=\"https:\/\/www.spacesecurity.info\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\/\">EMB3D\u2122, a cybersecurity threat model for embedded devices<\/a>. I carried out the following exercise to test and evaluate this new model.<\/p>\n<ul>\n<li>The first step was to identify the properties of the Siemens PLC by analyzing the data sheet.<\/li>\n<li>Next, I used the Properties tool to select the properties relevant to Siemens PLCs.<\/li>\n<li>Finally, I used the mapping tool to list the threats that represent a viable risk for Siemens PLCs.<\/li>\n<li>I checked to confirm that these vulnerabilities have been exploited by the Stuxnet worm.<\/li>\n<li>I used the Associated mitigations to propose a list of mitigations to the threats that pose a viable risk to the Siemens S7 series PLC.<\/li>\n<li>I finally mapped the associated mitigations with IEC 62443 4-2 framework<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/12\/CISM-from-ISACA.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-2981\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/12\/CISM-from-ISACA-1024x442.jpg\" alt=\"\" width=\"696\" height=\"300\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/12\/CISM-from-ISACA-1024x442.jpg 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/12\/CISM-from-ISACA-300x130.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/12\/CISM-from-ISACA-768x332.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/12\/CISM-from-ISACA-1536x663.jpg 1536w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/12\/CISM-from-ISACA-2048x885.jpg 2048w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/12\/CISM-from-ISACA-696x301.jpg 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/12\/CISM-from-ISACA-1068x461.jpg 1068w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/12\/CISM-from-ISACA-1920x829.jpg 1920w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/a><\/p>\n<p>I successfully passed the CISM (Certified Information Security Manager) from ISACA. You can view my experience and tips after successfully passed this amazing certification <a href=\"https:\/\/www.spacesecurity.info\/my-experience-and-tips-after-successfully-passed-the-cism-certified-information-security-manager-from-isaca\/\">here<\/a>.<\/p>\n<p>This journey has been both challenging and rewarding, filled with extensive study and deep dives into security governance, incident management, risk management and information security programs.<\/p>\n<p>I\u2019m proud to have achieved this important milestone in my career. I look forward to leveraging these skills and expertise to drive impactful security initiatives and contribute to the community.<\/p>\n<p><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/OT-IT-convergence.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2950\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/OT-IT-convergence.jpg\" alt=\"\" width=\"1018\" height=\"468\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/OT-IT-convergence.jpg 1018w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/OT-IT-convergence-300x138.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/OT-IT-convergence-768x353.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/OT-IT-convergence-696x320.jpg 696w\" sizes=\"auto, (max-width: 1018px) 100vw, 1018px\" \/><\/a><\/p>\n<p>I wrote an article on <a href=\"https:\/\/www.spacesecurity.info\/how-to-attack-industrial-control-systems-ics\/\">how to model an attack on an Industrial Control Systems (ICS)<\/a>. In this article, I explain why attacks on OT (Operational Technology) systems are made easier due to the OT\/IT convergence.<\/p>\n<p>Then, I describe that attacks on OT and ICS systems are modeled by the ICS Cyber Kill Chain and the MITRE ATT&amp;CK for ICS Matrix described below.<\/p>\n<p><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/12\/DNS-Attacks.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2991\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/12\/DNS-Attacks.png\" alt=\"\" width=\"830\" height=\"467\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/12\/DNS-Attacks.png 830w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/12\/DNS-Attacks-300x169.png 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/12\/DNS-Attacks-768x432.png 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/12\/DNS-Attacks-696x392.png 696w\" sizes=\"auto, (max-width: 830px) 100vw, 830px\" \/><\/a><\/p>\n<p>I am very happy and proud that my article on DNS security has been accepted and published in the last issue of Hakin9 Magazine after being reviewed by the editorial board.<\/p>\n<p>This new issue of Hakin9 Magazine, titled \u00ab Dark Web Vol.3 \u00bb, is an exploratory journey into the shadowy realms of the internet and the cybersecurity challenges that lurk within.<\/p>\n<p>The title of my article is \u00ab The dark side of the DNS or the war of the port 53 \u00bb. To know more <a href=\"https:\/\/www.spacesecurity.info\/the-dark-side-of-the-dns-or-the-war-of-the-port-53\/\">here<\/a>.<\/p>\n<p style=\"text-align: center;\">=========<\/p>\n<p>I&#8217;d like to thank everyone who has followed me, encouraged me and supported me.<\/p>\n<p>I hope all the information I share with you is interesting and helps you keep up to date and learn more.<\/p>\n<p>But stay tuned because 2025 promises to be just as incredible and intense.<\/p>\n<p>Until then, take care.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What an incredible end to 2024. I\u2019ve had some wonderful experiences. I\u2019ve successfully met many challenges in cybersecurity. I&#8217;ve had some incredible opportunities and I&#8217;ve been able to do some really interesting things. I continue my role as ambassador for the Aerospace industry within the &#8220;L&#8217;A\u00e9ro Recrute&#8221; program with the support of My Job Glasses [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3004,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[38,21,40,22,28,19],"tags":[],"class_list":{"0":"post-2908","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-en","8":"category-europe-en","9":"category-france-en","10":"category-hacking-en","11":"category-satellite-en","12":"category-united-states"},"a3_pvc":{"activated":false,"total_views":0,"today_views":0},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>My cybersecurity review for 2024 - Space &amp; Cybersecurity Info<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.spacesecurity.info\/en\/my-cybersecurity-review-from-the-beginning-of-2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"My cybersecurity review for 2024 - Space &amp; Cybersecurity Info\" \/>\n<meta property=\"og:description\" content=\"What an incredible end to 2024. I\u2019ve had some wonderful experiences. I\u2019ve successfully met many challenges in cybersecurity. I&#8217;ve had some incredible opportunities and I&#8217;ve been able to do some really interesting things. I continue my role as ambassador for the Aerospace industry within the &#8220;L&#8217;A\u00e9ro Recrute&#8221; program with the support of My Job Glasses [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.spacesecurity.info\/en\/my-cybersecurity-review-from-the-beginning-of-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"Space &amp; Cybersecurity Info\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-28T07:52:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-06T08:15:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/my-TOP-2024-achievements-in-cybersecurity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1792\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fran\u00e7ois Quiquet\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fran\u00e7ois Quiquet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/my-cybersecurity-review-from-the-beginning-of-2024\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/my-cybersecurity-review-from-the-beginning-of-2024\\\/\"},\"author\":{\"name\":\"Fran\u00e7ois Quiquet\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/person\\\/5e36ba49bf1d87a387c9ab60c233013c\"},\"headline\":\"My cybersecurity review for 2024\",\"datePublished\":\"2024-12-28T07:52:23+00:00\",\"dateModified\":\"2025-01-06T08:15:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/my-cybersecurity-review-from-the-beginning-of-2024\\\/\"},\"wordCount\":810,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/my-cybersecurity-review-from-the-beginning-of-2024\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/my-TOP-2024-achievements-in-cybersecurity.jpg\",\"articleSection\":[\"Cyber\",\"Europe\",\"France\",\"Hacking\",\"Satellite\",\"United-States\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/my-cybersecurity-review-from-the-beginning-of-2024\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/my-cybersecurity-review-from-the-beginning-of-2024\\\/\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/my-cybersecurity-review-from-the-beginning-of-2024\\\/\",\"name\":\"My cybersecurity review for 2024 - Space &amp; Cybersecurity Info\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/my-cybersecurity-review-from-the-beginning-of-2024\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/my-cybersecurity-review-from-the-beginning-of-2024\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/my-TOP-2024-achievements-in-cybersecurity.jpg\",\"datePublished\":\"2024-12-28T07:52:23+00:00\",\"dateModified\":\"2025-01-06T08:15:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/my-cybersecurity-review-from-the-beginning-of-2024\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/my-cybersecurity-review-from-the-beginning-of-2024\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/my-cybersecurity-review-from-the-beginning-of-2024\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/my-TOP-2024-achievements-in-cybersecurity.jpg\",\"contentUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/my-TOP-2024-achievements-in-cybersecurity.jpg\",\"width\":1792,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/my-cybersecurity-review-from-the-beginning-of-2024\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"My cybersecurity review for 2024\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\",\"name\":\"Space Cybersecurity Info\",\"description\":\"La cybers\u00e9curit\u00e9 appliqu\u00e9e au domaine de l&#039;espace\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\",\"name\":\"Space Security Info\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/SSI-Logo-4.jpg\",\"contentUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/SSI-Logo-4.jpg\",\"width\":594,\"height\":144,\"caption\":\"Space Security Info\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/person\\\/5e36ba49bf1d87a387c9ab60c233013c\",\"name\":\"Fran\u00e7ois Quiquet\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g\",\"caption\":\"Fran\u00e7ois Quiquet\"},\"description\":\"(EN) I'm a cybersecurity engineer in network, telecommunication and embedded\\\/integrated systems. Founder of the website spacesecurity.info. Passionate about cybersecurity and space, I share my two passions through this site. My goal is to federate a community around these two themes. Join my LinkedIn Group. (FR) Je suis ing\u00e9nieur cybers\u00e9curit\u00e9 en r\u00e9seau, t\u00e9l\u00e9communication et syst\u00e8mes embarqu\u00e9s et int\u00e9gr\u00e9s. Fondateur du site spacesecurity.info. Passionn\u00e9 de cybers\u00e9curit\u00e9 et du monde de l'espace, j'ai souhait\u00e9 partager mes deux passions \u00e0 travers ce site. Mon objectif est de f\u00e9d\u00e9rer une communaut\u00e9 autour de ces deux th\u00e8mes. Rejoindre mon groupe LinkedIn.\",\"sameAs\":[\"https:\\\/\\\/www.spacesecurity.info\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/francoisquiquet\\\/\"],\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/author\\\/francois\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"My cybersecurity review for 2024 - Space &amp; Cybersecurity Info","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.spacesecurity.info\/en\/my-cybersecurity-review-from-the-beginning-of-2024\/","og_locale":"en_US","og_type":"article","og_title":"My cybersecurity review for 2024 - Space &amp; Cybersecurity Info","og_description":"What an incredible end to 2024. I\u2019ve had some wonderful experiences. I\u2019ve successfully met many challenges in cybersecurity. I&#8217;ve had some incredible opportunities and I&#8217;ve been able to do some really interesting things. I continue my role as ambassador for the Aerospace industry within the &#8220;L&#8217;A\u00e9ro Recrute&#8221; program with the support of My Job Glasses [&hellip;]","og_url":"https:\/\/www.spacesecurity.info\/en\/my-cybersecurity-review-from-the-beginning-of-2024\/","og_site_name":"Space &amp; Cybersecurity Info","article_published_time":"2024-12-28T07:52:23+00:00","article_modified_time":"2025-01-06T08:15:06+00:00","og_image":[{"width":1792,"height":1024,"url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/my-TOP-2024-achievements-in-cybersecurity.jpg","type":"image\/jpeg"}],"author":"Fran\u00e7ois Quiquet","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fran\u00e7ois Quiquet","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.spacesecurity.info\/en\/my-cybersecurity-review-from-the-beginning-of-2024\/#article","isPartOf":{"@id":"https:\/\/www.spacesecurity.info\/en\/my-cybersecurity-review-from-the-beginning-of-2024\/"},"author":{"name":"Fran\u00e7ois Quiquet","@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/person\/5e36ba49bf1d87a387c9ab60c233013c"},"headline":"My cybersecurity review for 2024","datePublished":"2024-12-28T07:52:23+00:00","dateModified":"2025-01-06T08:15:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.spacesecurity.info\/en\/my-cybersecurity-review-from-the-beginning-of-2024\/"},"wordCount":810,"commentCount":0,"publisher":{"@id":"https:\/\/www.spacesecurity.info\/en\/#organization"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/my-cybersecurity-review-from-the-beginning-of-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/my-TOP-2024-achievements-in-cybersecurity.jpg","articleSection":["Cyber","Europe","France","Hacking","Satellite","United-States"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.spacesecurity.info\/en\/my-cybersecurity-review-from-the-beginning-of-2024\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.spacesecurity.info\/en\/my-cybersecurity-review-from-the-beginning-of-2024\/","url":"https:\/\/www.spacesecurity.info\/en\/my-cybersecurity-review-from-the-beginning-of-2024\/","name":"My cybersecurity review for 2024 - Space &amp; Cybersecurity Info","isPartOf":{"@id":"https:\/\/www.spacesecurity.info\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.spacesecurity.info\/en\/my-cybersecurity-review-from-the-beginning-of-2024\/#primaryimage"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/my-cybersecurity-review-from-the-beginning-of-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/my-TOP-2024-achievements-in-cybersecurity.jpg","datePublished":"2024-12-28T07:52:23+00:00","dateModified":"2025-01-06T08:15:06+00:00","breadcrumb":{"@id":"https:\/\/www.spacesecurity.info\/en\/my-cybersecurity-review-from-the-beginning-of-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.spacesecurity.info\/en\/my-cybersecurity-review-from-the-beginning-of-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spacesecurity.info\/en\/my-cybersecurity-review-from-the-beginning-of-2024\/#primaryimage","url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/my-TOP-2024-achievements-in-cybersecurity.jpg","contentUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/my-TOP-2024-achievements-in-cybersecurity.jpg","width":1792,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.spacesecurity.info\/en\/my-cybersecurity-review-from-the-beginning-of-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.spacesecurity.info\/en\/"},{"@type":"ListItem","position":2,"name":"My cybersecurity review for 2024"}]},{"@type":"WebSite","@id":"https:\/\/www.spacesecurity.info\/en\/#website","url":"https:\/\/www.spacesecurity.info\/en\/","name":"Space Cybersecurity Info","description":"La cybers\u00e9curit\u00e9 appliqu\u00e9e au domaine de l&#039;espace","publisher":{"@id":"https:\/\/www.spacesecurity.info\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.spacesecurity.info\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.spacesecurity.info\/en\/#organization","name":"Space Security Info","url":"https:\/\/www.spacesecurity.info\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/SSI-Logo-4.jpg","contentUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/SSI-Logo-4.jpg","width":594,"height":144,"caption":"Space Security Info"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/person\/5e36ba49bf1d87a387c9ab60c233013c","name":"Fran\u00e7ois Quiquet","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g","caption":"Fran\u00e7ois Quiquet"},"description":"(EN) I'm a cybersecurity engineer in network, telecommunication and embedded\/integrated systems. Founder of the website spacesecurity.info. Passionate about cybersecurity and space, I share my two passions through this site. My goal is to federate a community around these two themes. Join my LinkedIn Group. (FR) Je suis ing\u00e9nieur cybers\u00e9curit\u00e9 en r\u00e9seau, t\u00e9l\u00e9communication et syst\u00e8mes embarqu\u00e9s et int\u00e9gr\u00e9s. Fondateur du site spacesecurity.info. Passionn\u00e9 de cybers\u00e9curit\u00e9 et du monde de l'espace, j'ai souhait\u00e9 partager mes deux passions \u00e0 travers ce site. Mon objectif est de f\u00e9d\u00e9rer une communaut\u00e9 autour de ces deux th\u00e8mes. Rejoindre mon groupe LinkedIn.","sameAs":["https:\/\/www.spacesecurity.info","https:\/\/www.linkedin.com\/in\/francoisquiquet\/"],"url":"https:\/\/www.spacesecurity.info\/en\/author\/francois\/"}]}},"_links":{"self":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts\/2908","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/comments?post=2908"}],"version-history":[{"count":6,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts\/2908\/revisions"}],"predecessor-version":[{"id":3019,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts\/2908\/revisions\/3019"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/media\/3004"}],"wp:attachment":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/media?parent=2908"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/categories?post=2908"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/tags?post=2908"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}