Home Blog Page 5

Coverage by CyberInflight of the Russian satellite telecom Dozor-Teleport Attack

0

CyberInflight (www.cyberinflight.com) is an independant consulting and business intelligence company dedicated to the topic of Aerospace Cybersecurity. CyberInflight’s goal is to raise the global cybersecurity awareness of aerospace stakeholders providing them with refined information and analysis. Its expertise combines strategic market intelligence and technical proficiency, both required in the demanding field of cybersecurity.

With the permission of Florent Rizzo, founder and CEO of CyberInflight, we are sharing below an analysis by a CyberInflight analyst of the attack on the Russian satellite telecom.

Overview of cyberattacks on space ecosystem (excerpt) – Copyright CyberInflight

********

On June 28-29, 2023, a series of messages on a Telegram channel claimed a large-scale cyber attack against Dozor-Teleport. Along with the claim messages, numerous files to download, an audio recording, and several screenshots were made available. The attacker(s) claimed affiliation with the Wagner Group without providing any additional evidence.

The information was first picked up on Twitter by pro-Ukrainian accounts. It quickly leaked to numerous cybersecurity news sites worldwide. Within 12 hours, major news outlets such as The Washington Post reported the information. Within 24 hours, the information was present on a range of media platforms.

During this dissemination, the information underwent a true game of “Chinese whispers.” The initial articles simply reproduced the information as it was published on Twitter or Telegram, barely mentioning that it was what the attackers claimed. Subsequently, various media outlets started amplifying the information. Headlines suggested that a Russian military satellite network had been hacked before articles began appearing about hacked Russian military communication satellites.

Artist view of satellite

In general, several issues continue to arise regarding the treatment of information about attacks in the space domain:

  1. Once the word “satellite” is mentioned, the information suddenly gains interest in terms of cybersecurity. The reason is simple: the combination of space and cyber can quickly evoke fascination. The downside is that sensationalist headlines often multiply.
  2. There is a clear lack of perspective regarding information related to cyberattacks. The need to be the first to publish information (which is understandable) leads to approximate or poorly verified information spreading rapidly.
  3. The study and questioning of sources are rarely emphasized. Many press articles simply republish what has already been said without verifying the primary source of the information. As a result, basic information quickly becomes considered as true. For example, based on a given analysis on Twitter, it has been repeated by numerous media outlets that it was the first attack on a satellite provider since Viasat, which is false.In the era of OSINT (Open-Source Intelligence), the amount of available information is considerable, but there is a lack of necessary reflection for understanding the information. Consequently, certain major cyberattacks that occurred over a year ago, such as the Viasat attack, remain particularly vague in both their execution and impact.

********

CyberInflight’s Space Cybersecurity Market Intelligence report

CyberInflight released in April 2023, a strategic report as a unique resource on the space cybersecurity domain consolidating all necessary information to better comprehend the market and make insightful decision making.

SPACE CYBERSECURITY : Market Intelligence Report Presentation (Copyright CyberInflight)

CyberInflight is at the forefront of this domain and one of the only market intelligence company to have consolidated such amount of information in a single document.

In this Space Cybersecurity Market Intelligence report, you will find :

  • Strategic approach
  • Interview campaign (~30 interviewees from the entire value chain)
  • Market outlook
  • Sector trends and dynamics
  • Strategic analysis and forecast
  • Stakeholders’ profile
  • Regulatory landscape
  • Threat intelligence

You can find here the excerpt of the last Space Cybersecurity Market Intelligence 2023 Report edited by CyberInflight.

CyberInflight’s Space Cybersecurity Weekly Watch

CyberInflight are releasing also a Space Cybersecurity Weekly Watch. The team consolidates a weekly watch with all the space cybersecurity news you shouldn’t miss.

In this Space Cybersecurity Watch, you will find Articles, company’s communications, whitepapers, academic works, podcast, and sources not to be missed on the topic of space cybersecurity over a specified timeframe.

The areas covered by this watch are : geopolitic, market & competition, threat intelligence, regulation, technology, training & education, important news.

You can find here some samples of their last Space Cybersecurity Market Intelligence 2023 Report.

More about CyberInflight

CyberInflight : www.cyberinflight.com

A comprehensive 3-day Space Domain Cybersecurity course organized around the SPAce Domain Cybersecurity (SpaDoCs) Framework

0

This article describes a comprehensive 3-day Space Domain Cybersecurity course organized around the SPAce Domain Cybersecurity (SpaDoCs) Framework.

Course Description

This Space Domain Cybersecurity course examines the practical issues of developing and sustaining a secure cyber environment through all phases of the space mission lifecycle. The course is organized around the SPAce Domain Cybersecurity (SpaDoCs) Framework. The SpaDoCs Framework provides a comprehensive and systematic model for understanding and tackling all critical issues of cybersecurity in the space domain. An examination of the Key Objectives—confidentiality, integrity, availability—provides the foundation for the course. From there, the space domain is examined layer by layer starting from the enterprise layer, then drilling down through mission, system and DevSecOps layers. Threats and vulnerabilities at each layer are highlighted. Finally, first principles of cybersecurity are discussed (domain separation, process isolation, and others) as well as key enablers (such as vision and strategy) to help frame plans for action to address the cybersecurity issues exposed by this course. Course exercises center around practical application of the material to real- world space mission scenarios.

Course Objectives

At the end of this course you should be able to :

  • Describe the big picture challenges of cybersecurity in the space domain as organized in the SPAce Domain Cybersecurity (SpaDoCs) Framework
  • List and define key objectives of cybersecurity (CIA Triad), the first principles of secure systems, along with cybersecurity enablers
  • Identify cyber threats to and vulnerabilities of space missions and systems
  • Characterize the various layers of the space domain and the elements that comprise them
  • Apply cybersecurity first principles to specific space domain threats and vulnerabilities
  • Associate specific cybersecurity enablers with various space domain threat or vulnerability scenarios
  • Analyze threats and vulnerabilities and their attack vectors for various space domain scenarios at each layer
  • Formulate inputs and issues to a cybersecurity assessment plan for a given space domain scenario

Course Topics

  • Course Intro
  • Framework Overview
  • Cybersecurity Fundamentals
  • Space Domain Layers: Enterprise Layer, Mission Layer, System Layer, and DevOps Layer
  • Threats and Vulnerabilities
  • First Principles of cybersecurity applied in the space domain
  • Enablers of security and mission success in space enterprises

Course information

📅 August 23-25, 2023
⏲️ 9:00AM – 4:00PM MDT
📌 Price : $2,099
➡️ Registration : https://www.eventbrite.com/e/space-domain-cybersecurity-course-registration-631351438147

More information

SPAce Domain Cybersecurity framework aka. SpaDoCs

0

The space and cyber domains have developed in parallel over the past several decades. The two domains evolved separately and have employed different architectural frameworks to guide their evolution.

An example of this difference is the fact that space systems typically maintain distinct command and control networks that operate separately from mission data communications. Computer and cyber systems typically do not maintain separate networks. Establishing best practices for cyber protections and collaboration across space enterprises requires collaboration across the different architecture frameworks,
terminologies and even cultures.

The Space Domain Cyber Security (SPADOCS) framework has been introduced to bridge the space and cyber domains with the goal of enhancing collaboration and information sharing across mission, company, international and government boundaries.

The Space Domain Cybersecurity (SpaDoCs) Framework provides a comprehensive and systematic model for understanding and tackling cybersecurity in the space domain.

SpaDoCs Framework is a process framework to organize, understand and educate

What is SpaDoCs Framework ?

SpaDoCs Framework describes the big picture challenges of cybersecurity in the space domain.

The framework describes the space domain layer by layer starting from the enterprise layer, then drilling down through mission, system and DevSecOps layers.

Threats and vulnerabilities at each layer are highlighted, keeping in mind that Confidentiality, Integrity and Availability (aka CIA Triad) are the foundation and the key objectives of cybersecurity.

SpaDoCs Framework characterizes the various layers of the space domain and the elements that comprise them

SpaDoCs Framework describes the practical issues of developing and sustaining a secure cyber environment through all phases of the space mission lifecycle.

What can SpaDoCs Framework be used for ?

SpaDoCs Framework allows to identify cyber threats to and vulnerabilities of space missions and systems

SpaDoCs Framework allows to apply cybersecurity first principles to specific space domain threats and vulnerabilities

SpaDoCs Framework allows to associate specific cybersecurity enablers with various space domain threat or vulnerability scenarios

SpaDoCs Framework allows to analyze threats and vulnerabilities and their attack vectors for various space domain scenarios at each layer

SpaDoCs Framework allows cybersecurity professionals to formulate inputs and issues to a cybersecurity assessment plan for a given space domain scenario.

To go further

If you’re interested in cybersecurity applied to space domain or if you want to learn more about SpaDoCs Framework, I recommend the following training course. It is a comprehensive 3-day Space Domain Cybersecurity course organized around the SPAce Domain Cybersecurity (SpaDoCs) Framework.

You can find more informations about this course here or here.

Sources of the contents for this article

L’OSINT, le nouveau nerf de la guerre pour la cybersécurité et l’espace

1

Le 5 juin dernier avait lieu, dans le cadre des Lundi de l’IHEDN (Institut des hautes études de défense nationale), une conférence à l’École militaire (Paris 7e) sur le thème de l’OSINT = Le nouveau nerf de la guerre ?

Il y avait 3 connaisseurs de ce domaine qui en ont résumé les enjeux stratégiques sous la forme de 3 approches différentes :

  • L’OSINT pour le journalisme
  • L’OSINT dans le judiciaire pour les analyses criminelles et les investigations numériques (fraudes, #cybermenaces)
  • L’OSINT en géographie qu’on appelle aussi GEOINT (Geospatial intelligence).

Qu’est-ce que l’OSINT ?

OSINT signifie Open Source INTelligence, c’est à dire le renseignement en source ouverte. L’OSINT est une méthode de collecte et d’analyse de renseignements en utilisant des sources d’information accessibles au public. Il s’agit d’une approche qui consiste à recueillir des données à partir de sources telles que les médias sociaux, les sites web, les forums de discussion, les bases de données publiques, les rapports gouvernementaux, les articles de presse, etc.

L’objectif principal de l’OSINT est de rassembler des informations exploitables sur des sujets spécifiques, tels que des individus, des organisations, des événements ou des tendances, en utilisant des sources qui sont librement disponibles et accessibles à tous. Cette méthode permet d’obtenir des informations pertinentes pour divers domaines, tels que la sécurité, le renseignement, la défense, la lutte contre la criminalité, la veille concurrentielle, la gestion des risques, etc.

Les professionnels de l’OSINT utilisent souvent des techniques de collecte automatisée d’informations, telles que le web scraping (extraction de données à partir de sites web), l’analyse de données massives, la recherche avancée sur les moteurs de recherche, la surveillance des médias sociaux et d’autres outils spécialisés pour trouver, trier et analyser les informations pertinentes.

Il convient de souligner que l’OSINT se concentre uniquement sur des sources d’information publiques et légales, et ne viole pas les lois sur la confidentialité ou les droits d’auteur.

Il faut souligner que l’ère de l’internet de masse a notamment popularisé cette discipline qui est désormais accessible à tout un chacun.

Replay de la conférence OSINT = Le nouveau nerf de la guerre ?

Le résumé de la conférence sur “l’OSINT = Le nouveau nerf de la guerre ?” se trouve ici.

Le replay en vidéo se trouve ci-dessous

Au delà de l’OSINT

Il est important de noter que l’OSINT est souvent complété par d’autres méthodes de collecte de renseignements, telles que le renseignement humain (HUMINT), le renseignement signal (SIGINT) et le renseignement d’origine électromagnétique (ELINT), pour obtenir des informations plus complètes et précises.

On vient de parler de GEOINT (Geospatial intelligence), de SIGINT (Signals intelligence), de HUMINT (Human Intelligence), de ELINT (Electronic Entelligence).

Nous en profitons pour vous faire découvrir d’autres domaines de l’OSINT :

  • IMINT = Image Intelligence
  • COMINT = Communications Intelligence

L’OSINT et la cybersécurité

La cybersécurité est un autre domaine d’application de l’OSINT. En effet, l’OSINT permet d’enrichir sa stratégie de Cyber Threat Intelligence (CTI) comme l’explique cet article.

L’OSINT et le spatial

L’OSINT s’applique aussi au spatial avec ce qu’on appelle de façon informelle le Satellite-OSINT. A ce sujet, on peut vous recommander l’article sur le Space-Based Intelligence in Cybersecurity, abordé dans l’article ici ou ici.

Top 25 most dangerous software weaknesses than can affect satellites in 2023

0

Issues of vulnerabilities of space systems to cyber attacks has long been ignored for reasons common to industrial systems or SCADA (Supervisory Control And Data Acquisition) type.

Reality and experience show that today’s world is not the same as the old world. It’s now essential to consider the vulnerability of space systems to cyber attacks.

The latest generation of satellites, such as those from SpaceX, are looking to keep costs down, so most of them use Open Source software. This makes them just as vulnerable to cyber threats as any other piece of hardware.

In the age of globalisation, the supply chain is often internationalised. It’s difficult to control completely. The introduction of malicious components or software is not completely impossible for a motivated bad or adversary actor. For example, a backdoor could be introduced into the satellite’s components or software.

The ground stations with which satellites communicate are not all that isolated. The same applies to the command and control centres that pilot the satellites via the ground stations. Most of them need to communicate with the outside world, as they do with data centres, even if this is done via secure Internet links.

Access to the satellites may be physically impossible, but it’s still possible to gain access via their ground station or their command and control system. This is a potential gateway for a malicious actor.

Software is an inherent part of satellites, launchers and space systems. This is known as “on-board satellite software” or “software-defined satellite”.

Commercial players with an interest in cutting costs tend to ignore the cybersecurity of space systems by using Open Source software, reusing software code from other programmes, or even reusing old code.

Technically, the only way to avoid service interruptions is to ensure the technological redundancy of ground stations, electrical networks and hardware and software on board satellites. But poorly coded software, even if redundant, remains vulnerable.

With this in mind, we’ve decided to take an increasing interest in software. We take this opportunity to remind you that the MITRE has just released the Top 25 most dangerous software weaknesses for 2023.

The list is based on an analysis of public vulnerability data in the National Institute of Standards and Technology (NIST)’s National Vulnerability Data (NVD) for root cause mappings to CWE (Common Weaknesses Enumeration) for years 2021 and 2022.

A total of 43,996 CVE from the Known Exploited Vulnerabilities (KEV) database were examined and a score was attached to each of them based on prevalence and severity.

A the top, you have : Out-of-bounds Write, Cross-site Scripting, SQL Injection, Use After Free, OS Command Injection, Improper Input Validation, Out-of-bounds Read, Path Traversal, Cross-Site Request Forgery (CSRF), and Unrestricted Upload of File with Dangerous Type.

More info here : https://cwe.mitre.org/top25/

🌠🛰️ Space Cybersecurity Watch by CyberInflight, W25 – 2023

0

CyberInflight and Florent Rizzo released a new 🌠🛰️ Space Cybersecurity Weekly Watch 🛰️🌠 for Week 25 (June 13-19, 2023). The team consolidates a weekly watch with all the space cybersecurity news you shouldn’t miss 🎯

In this new Space Cybersecurity Watch, you will find Articles, company’s communications, whitepapers, academic works, podcast, and sources not to be missed on the topic of space cybersecurity over a specified timeframe.

The areas covered by this watch are : geopolitic, market & competition, threat intelligence, regulation, technology, training & education, important news.

📰 Do not hesitate to register to their weekly watch service !👍

You can download this Space Cybersecurity Weekly Watch for W25 here.

⭐Also, their Space Cybersecurity Market Intelligence Report, Edition 2023, is available with a set of databases gathering a list of space cybersecurity stakeholders, a list of cyberattacks on space systems, a list of contracts and so forth…⭐

You can check a sample here.

🌠🛰️ Space Cybersecurity Watch by CyberInflight, W23 – 2023

0

CyberInflight and Florent Rizzo released a new 🌠🛰️ Space Cybersecurity Weekly Watch 🛰️🌠 for Week 23 (May 30 – June 5, 2023). The team consolidates a weekly watch with all the space cybersecurity news you shouldn’t miss 🎯

In this new Space Cybersecurity Watch, you will find Articles, company’s communications, whitepapers, academic works, podcast, and sources not to be missed on the topic of space cybersecurity over a specified timeframe.

The areas covered by this watch are : geopolitic, market & competition, threat intelligence, regulation, technology, training & education, important news.

📰 Do not hesitate to register to their weekly watch service !👍

You can download this second Space Cybersecurity Weekly Watch here.

⭐Also, their Space Cybersecurity Market Intelligence Report, Edition 2023, is available with a set of databases gathering a list of space cybersecurity stakeholders, a list of cyberattacks on space systems, a list of contracts and so forth…⭐

You can check a sample here.

Sample of the last Space Cybersecurity Market Intelligence 2023 Report from CyberInflight

1

CyberInflight and Florent Rizzo shared an excerpt of their last Space Cybersecurity Market Intelligence 2023 Report.

Here is what Florent said in French about this report :

“📢 Les systèmes spatiaux 🚀 constituent l’infrastructure critique de toutes les infrastructures critiques.

2022 a marqué une rupture dans le domaine de la cybersécurité spatiale🛰️, tant au niveau de la croissance des menaces que de l’émergence de nouveaux modes d’actions.

C’est au cœur de ce contexte en rapide évolution que CyberInflight se positionne. Acteur clé de l’intelligence économique dans le domaine de la cybersécurité appliquée à l’aérospatiale, CyberInflight accompagne les acteurs du secteur en leur fournissant les données essentielles à leurs activités que ce soit par de la production d’études d’intelligence économique ou au travers d’activités de conseil et de formation.

Le marché de la cybersécurité spatiale est particulièrement complexe à définir et à délimiter. CyberInflight fournit l’effort de répertorier ces acteurs, de les catégoriser et d’observer leur évolution. De fait, notre « Space Cybersecurity Market Intelligence Report » apporte une approche particulièrement complète sur le marché de la cybersécurité spatiale🛰️. Cette étude de plus de 150 pages se veut exhaustive et analytique en s’appuyant sur un ensemble de base de données.

👉Retrouvez ici la table des matières et l’extrait de notre rapport d’intelligence économique sur le marché de la cybersécurité spatiale ainsi que le teaser des différentes bases de données constituées par CyberInflight.”

👉En cas de question ou de demande d’information, n’hésitez pas à contacter à l’adresse suivante : research@cyberinflight.com

Find below the executive summary of the report

“The ever-increasing demand for data and the growing dependency on space applications is pushing the need for processing more data on board and to send them to the ground. A new set of technologies is being developed allowing for higher performance, increased throughput and secure communications.

The improvement of existing technologies (RISC, ARM, FPGA), the creation or the adaption of new ones to space applications (lightweight cryptography, confidential computing,
containerization, quantum) the shift to new business models (such as GSaaS, and as-a-service models in general) are a set of new challenges to be overcome not only to meet the growing demand for space data but also to reliably secure these services in front of an expanding threat landscape.

Embedding more technologies within the spacecraft implies meeting current and future operational and environmental constraints. It requires additional performance, power, weight or size (the SWaP tradeoff).

The soar of COTS has pushed the use of technologies which are well-used within traditional IT applications such as containerization (virtualization, Kubernetes, Docker). Trust is implemented at different level from hardware (root-of-trust) to software (LWC or confidential computing). The ground segment is also sustaining significant transformation – becoming more and more cloud-oriented. Future technologies such as quantum or artificial intelligence or machine learning may be seen as disruptors when reaching a higher maturity level.

Cybersecurity technologies are evolving between current and future requirements mainly driven by the rapid evolution and growing interest for space by the cyberthreat landscape.”

Find below the excerpt of the last Space Cybersecurity Market Intelligence 2023 Report edited by Cyberinflight

This full excerpt of the report can be downloaded here

A quick comparaison of recently released Cybersecurity Frameworks for Space Sector

0

« The space sector is in need of frameworks and methodologies specific to our unique operating environment » said Gregory Falco (Aerospace Security & Space Technology Asst. Prof at Johns Hopkins, Cybersecurity PhD from MIT).

In this article, we will present some recently released cybersecurity frameworks for space domain :

  • SPARTA : The Aerospace Corporation’s Space Attack Research and Tactic Analysis
  • SPACE-SHIELD : The Space Attacks and Countermeasures Engineering Shield from ESA
  • TREKS : The Targeting, Reconnaissance, & Exploitation Kill-Chain for Space Vehicles Cybersecurity Framework

The Aerospace Corporation’s Space Attack Research and Tactic Analysis (SPARTA)

Space Attack Research and Tactic Analysis (SPARTA) matrix

The Aerospace Corporation’s Space Attack Research and Tactic Analysis (SPARTA) framework was already in place. SPARTA is an ATT&CK® like knowledge-base framework but for for Space Missions.

SPARTA matrix is intended to provide unclassified information to space professionals about how spacecraft may be compromised due to adversarial actions across the attack lifecycle.

You can learn more about SPARTA in our article here.

The SPACE-SHIELD (Space Attacks and Countermeasures Engineering Shield) from ESA

SPACE-SHIELD or ATT&CK Matric for Space

There was also the SPACE-SHIELD (Space Attacks and Countermeasures Engineering Shield) from ESA. SPACE-SHIELD is an ATT&CK® like knowledge-base framework for Space Systems.

It is a collection of adversary tactics and techniques, and a security tool applicable in the Space environment to strengthen the security level. The matrix covers the Space Segment and communication links, and it does not address specific types of mission.

You can learn more about SPACE-SHIELD in our article here.

The Targeting, Reconnaissance, & Exploitation Kill-Chain for Space Vehicles (TREKS) Cybersecurity Framework

Targeting, Reconnaissance, & Exploitation Kill-Chain for Space Vehicles (TREKS) Cybersecurity Framework

TREKS (Targeting, Reconnaissance, & Exploitation Kill-Chain for Space Vehicles) is a new Cybersecurity Framework that highlights the unique kill chain for the space vehicle.

It’s a Cybersecurity Framework released by Dr. Jacob Oakley after more than five years spent researching and working on space system cybersecurity.

You can learn more about TREKS in our article here.

What about SPARTA vs. ATT&CK MITRE ?

The current cyber-security frameworks – MITRE’s ATT&CK and Microsoft’s Kubernetes – while representing the industry standard for analyzing attacks on terrestrial devices, however, do not sufficiently cover the space segment scenarios.

What about SPARTA vs. SPACE-SHIELD ?

SPACE-SHIELD (Space Attacks and Countermeasures Engineering Shield) is an ATT&CK® like knowledge-base framework for Space Systems. It is a collection of adversary tactics and techniques, and a security tool applicable in the Space environment to strengthen the security level. The matrix covers the Space Segment and communication links, and it does not address specific types of mission. You can learn more about SPACE-SHIELD here.

What about TREKS vs. other frameworks

TREKS is intended to provide a bridge between the existing frameworks available to address, categorize, taxonomize and analyze cybersecurity compromises of traditional terrestrial based network architectures and the future of cybersecurity for space where those frameworks become more applicable as compromises become more frequent, prolific, and acknowledged. This framework can provide a taxonomy that can be used to characterize foundational aspects of cyber threats to SVs in a way that allows for the identification of trends and enables analysis of this niche target set at the intersection of the space and cyber domains.

Conclusion

In conlusion, “We need frameworks, this is sure. But we need also to ensure that we are not diverging or duplicating the efforts.” said Paul Varela, CyberSecurity/Risk Expert and Trainer at EUSPA.

My position is that it’s right but I think these frameworks are complementory.

An analysis of the Thales satellite hacking demo CYSAT 2023 by SPARTA team

0

Brandon Bailey & Brad Roeher from the SPARTA team analyzed, in this article, Thales Group’s CYSAT ’23 presentation material to deconstruct the experiment, extract lessons learned, and document potential countermeasures.

Summary of the full attack flow

Summary of the full Thales attack flow

The SPARTA (Space Attack Research and Tactic Analysis) Framework was used to identify the tactics, techniques, and associated countermeasures associated with the experiment/attack.

The SPARTA Framework

More about the SPARTA Framewok

They utilized the SPARTA Navigator tool to construct the attack chain and generated an Excel export to pinpoint relevant countermeasures. Subsequently, a thorough analysis is conducted to ensure the applicability of the associated countermeasures to the specific Tactics, Techniques, and Procedures (TTPs).

The SPARTA Navigator proves invaluable in presenting a comprehensive array of countermeasures categorized by defense-in-depth, effectively minimizing the risk posed by TTPs. By leveraging the SPARTA Navigator, we successfully map the attack chain to SPARTA TTPs, as exemplified below.

The attack chain mapped in SPARTA navigator

Upon exporting the data from the SPARTA Navigator, they have identified eight countermeasures. Out of these, five pertain to terrestrial countermeasures intended to prevent vulnerable software from infiltrating the spacecraft. The remaining three countermeasures are implemented onboard the spacecraft itself, serving to protect against and/or detect the TTPs executed during the experiment.

More about the analysis of the CYSAT 2023 Demo by SPARTA team

More about the demo

Check this demo in video

Last Posts

My experience and tips after successfully passed the CISM (Certified Information Security Manager) from...

0
🌟 I'm thrilled to share that I've earned the CISM (Certified Information Security Manager) from ISACA. You can view my achievement on Credly. 🌍 This...

How to model an attack on an Industrial Control Systems (ICS)

0
Attacks on OT (Operational Technology) systems are made easier due to the OT/IT convergence. The figure below is showing an example of OT/IT convergence. Attacks on OT...

Space and Satellites Security Conferences at DEF CON 32 (and a little bit Aviation...

0
The videos from the Def Con 32 conference held in Las Vegas from August 8th to 11th are now online. Perfect for keeping busy...

My cybersecurity review from the beginning of 2024

0
What an incredible start to 2024. I've had some incredible opportunities and I've been able to do some really interesting things. I continue my role as...

Very proud to receive the certificate of completion : « Introduction to Cybersecurity in...

0
I’m very proud to receive the following certificate of completion for having successfully completed the training course : « Introduction to Cybersecurity in Space...

Popular posts

Description of the Elements of a Satellite Command and Control System

1
In order to be able to analyse the various threats and identify the risks facing a space system, it is necessary to describe precisely...

Install KYPO Cyber Range Platform on Openstack and Ubuntu in AWS cloud

4
KYPO is a Cyber Range Platform (KYPO CRP) developed by Masaryk University since 2013. KYPO CRP is entirely based on state-of-the-art approaches such as...

Cartographie des acteurs étatiques du cyber en France

0
Avec l'aimable autorisation de Martial Le Guédard, nous reproduisons ci-dessous sa cartographie au sujet des différents acteurs étatiques évoluant dans le domaine du Cyber...

What are the threats to space systems?

0
In this article, we will try to identify the various threats to space systems. This article is a synthesis of the CSIS (Center for Strategic...

Qu’est-ce que le grand Commandement De l’Espace (CDE) créé par la France pour la...

0
Le Commandement De l’Espace (CDE) a été créé par arrêté le 3 septembre 2019. Il succède au Commandement interarmées de l’espace (CIE). Il rassemble...