How to model an attack on an Industrial Control Systems (ICS)
Attacks on OT (Operational Technology) systems are made easier due to the OT/IT convergence.
The figure below is showing an example of OT/IT convergence.
Attacks on OT and ICS systems are modeled by the ICS Cyber Kill...
Space and Satellites Security Conferences at DEF CON 32 (and a little bit Aviation...
The videos from the Def Con 32 conference held in Las Vegas from August 8th to 11th are now online. Perfect for keeping busy during the long winter evenings ahead.
I have made a small...
My cybersecurity review from the beginning of 2024
What an incredible start to 2024.
I've had some incredible opportunities and I've been able to do some really interesting things.
I continue my role as ambassador for the Aerospace industry within the "L'Aéro Recrute" program...
Very proud to receive the certificate of completion : « Introduction to Cybersecurity in...
I’m very proud to receive the following certificate of completion for having successfully completed the training course : « Introduction to Cybersecurity in Space Systems » with Tim Fowler.
This training course took place at...
How I used MITRE EMB3D™ Threat Model to identify Siemens PLC vulnerabilities exploited by...
Introduction
In this article, I will show how I used the MITRE EMB3D™ Threat Model to identify vulnerabilities in SIEMENS PLCs that were exploited by the Stuxnet worm to sabotage the Iran's nuclear centrifuges.
About the MITRE...
MITRE Releases EMB3D™ – A Cybersecurity Threat Model for Embedded Devices
Collaborative framework provides common understanding to mitigate cyber threats to critical infrastructure
MCLEAN, Va. & BEDFORD, Mass., May 13, 2024--(BUSINESS WIRE)--The EMB3D Threat Model is now publicly available at https://emb3d.mitre.org. The model provides a cultivated...
Hacktivism Goes Orbital: Investigating NB65’s Breach of ROSCOSMOS
In March of 2022, Network battalion 65 (NB65), a hacktivist affiliate of Anonymous, publicly asserted its successful breach of ROSCOSMOS’s satellite imaging capabilities in response to Russia’s invasion of Ukraine.
NB65 disseminated a series of...
Successfully passed the « Certificate of Competence in Zero Trust » (CCZT), the first Zero Trust...
I february 2024, I successfully passed the Certificate of Competence in Zero Trust (CCZT) from the Cloud Security Alliance (CSA).
This certificate is a logical follow-up to the CCSK (Certificate of Cloud Security Knowledge) awarded...
Hors-Série « Space Cybersecurity » édité par PenTest et Hakin9
Cet article est issu d'un post de Stéphane MORICO (Information Security Analyst | CEO @SMRC) sur LinkedIn.
Le hors série "Space Cybersecurity" édité par PenTest et Hakin9 se consacre à l'examen approfondi de la cybersécurité dans...
« Introduction to Cybersecurity in Space Systems » with Tim Fowler is coming up during the...
Tim Fowler will provide a training course called "Introduction to Cybersecurity in Space Systems" at "The Most Offensive Con that Ever Offensived – Bypass Edition" event.
This event is organized by Antisyphon Training. This event will...