Premier vol habité pour la capsule Crew Dragon de SpaceX le 27 mai 2020
Sauf report de dernière minute, une capsule Crew Dragon de SpaceX décollera au sommet d'une fusée Falcon 9 le 27 mai prochain. Cette mission...
« Aerospace Cybersecurity: Satellite Hacking » course review
I just successfully completed the comprehensive course on « Aerospace Cybersecurity: Satellite Hacking » and passed successfully the final exam with a result of...
Solarium CSC 2.0 has endorsed designation of space systems as a critical infrastructure sector
The Cyberspace Solarium Commission (CSC) was established in the John S. McCain National Defense Authorization Act for Fiscal Year 2019 to "develop a consensus...
My work about the Viasat attack analysis featured at the BSIDES St. Louis 2023 hacking education conference
I'm very proud to be featured by Tim Fowler in his presentation at BSIDES St. Louis 2023 hacking education conference. Tim Fowler is an offensive security analyst at Black...
Un chercheur alerte sur le risque de piratage des petits satellites comme ceux de...
SpaceX et d'autres sociétés se précipitent pour mettre en orbite des milliers de petits satellites bon marché, mais la pression pour maintenir les coûts...
[Book] The Battle Beyond: Fighting and Winning the Coming War in Space
Fundamentally, Paul Szymanski and Jerry Drew remind us that--more than just simply a clash of weapons--all warfare manifests as a competition between human minds....
MITRE ESTM + EMB3D in Action : Analyzing OPS-SAT Through These Dual Frameworks
Disclaimer
Please be informed that the analysis detailed in this article is entirely separate from the hacking experiment conducted by the Thales team on the...
Exploring how the new MITRE ESTM (Embedded Systems Threat Matrix) can work in conjunction...
Recently, MITRE released ESTM (Embedded Systems Threat Matrix), a new cybersecurity framework designed to protect embedded systems. Built on the proven ATT&CK® methodology, ESTM...
SPAce Domain Cybersecurity framework aka. SpaDoCs
The space and cyber domains have developed in parallel over the past several decades. The two domains evolved separately and have employed different architectural...
An analysis of the Viasat cyber attack with the MITRE ATT&CK® framework
Disclaimer
To do this analysis of the Viasat cyber attack, I used the open-source intelligence (1) of the team composed by Nicolò Boschetti (Cornell University),...





![[Book] The Battle Beyond: Fighting and Winning the Coming War in Space](https://www.spacesecurity.info/wp-content/uploads/2023/12/The-Battle-Beyond-Fighting-and-Winning-the-Coming-War-in-Space-218x150.jpg)














