ethicallyHackingspace (eHs)® h4ck32n4u75™ (Hackernauts) Community Member

0
I'm very proud to have been choosen as ethicallyHackingspace(eHs)® h4ck32n4u75™ (Hackernauts) Community Member. Thank's to William Ferguson for this distinction. The "h4ck32n4u75™" badge, pronounced "hackernauts,"...

My cybersecurity review for 2023

0
What an incredible end to 2023. I've had some wonderful experiences. I've successfully met many challenges in cybersecurity. I took part of the 3-day...

[Book] The Battle Beyond: Fighting and Winning the Coming War in Space

0
Fundamentally, Paul Szymanski and Jerry Drew remind us that--more than just simply a clash of weapons--all warfare manifests as a competition between human minds....

Reaching for the Stars with Zero Trust: Space Domain Applications

0
In this article, we will explore if we can apply Zero Trust in space domain, for example in satellites or space missions, how and...

Very proud to have earned the Kelley School of Business – Space Cybersecurity Professional...

0
I’m pleased to announce that I have obtained a new certification: Kelley School of Business Executive Education Space Cybersecurity from Indiana University - Kelley...

Viasat Attack: A Space Cyber Attack Post Mortem Investigation

0
Introduction In this paper, I choose to investigate the Viasat cyber attack that occurred on 24 February, 2022. First, I will summarize the chronology of...

Some very funny memes on space security

0
Below, I show some very funny memes on space security I created. Do not hesitate to download them and to share them.

SpaceSec, the Workshop on the Security of Space and Satellite Systems

0
SpaceSec is the Workshop on the Security of Space and Satellite Systems https://spacesec.info/ SpaceSec 2023 took place on the 27 February 2023 in San Diego, California. https://www.ndss-symposium.org/ndss-program/spacesec-2023/ The...

Very proud to have earned the Space Domain Cybersecurity digital badge from Teaching Science...

0
🚀 I’m proud to took part of the 3-day Space Domain Cybersecurity course provided by Teaching Science & Technology, Inc. (TSTI) in partnership with...

Live Webinar on Aerospace Cybersecurity: Satellite Hacking

0
Find below the first ever webinar by PenTest Mag! Hosted by Timothy Hoffman, the talk will evolve around the topic of the online course...

Last Posts

Enhancing Threat Understanding: Modeling the Viasat Cyber Attack with MITRE CTID’s Attack Flow Builder

0
Introduction In the complex landscape of modern cybersecurity, understanding the intricate mechanisms of sophisticated cyber attacks has become paramount. On February 24, 2022, Viasat, a global...

My work about the Viasat attack analysis featured in the Angelina Tsuboi’s course on Satellite Cybersecurity...

0
I’m very proud and honored to be featured in the Angelina Tsuboi's course on Satellite Cybersecurity Foundations hosted on Udemy. Thank you very much...

The dark side of the DNS or the war of the port 53

0
I am very happy and proud that my article on DNS security has been accepted and published in the last issue of Hakin9 Magazine...

My cybersecurity review for 2024

0
What an incredible end to 2024. I’ve had some wonderful experiences. I’ve successfully met many challenges in cybersecurity. I've had some incredible opportunities and I've...

My experience and tips after successfully passed the CISM (Certified Information Security Manager) from...

0
🌟 I'm thrilled to share that I've earned the CISM (Certified Information Security Manager) from ISACA. You can view my achievement on Credly. 🌍 This...

Popular posts

Description of the Elements of a Satellite Command and Control System

1
In order to be able to analyse the various threats and identify the risks facing a space system, it is necessary to describe precisely...

Install KYPO Cyber Range Platform on Openstack and Ubuntu in AWS cloud

4
KYPO is a Cyber Range Platform (KYPO CRP) developed by Masaryk University since 2013. KYPO CRP is entirely based on state-of-the-art approaches such as...

Cartographie des acteurs étatiques du cyber en France

0
Avec l'aimable autorisation de Martial Le Guédard, nous reproduisons ci-dessous sa cartographie au sujet des différents acteurs étatiques évoluant dans le domaine du Cyber...

What are the threats to space systems?

0
In this article, we will try to identify the various threats to space systems. This article is a synthesis of the CSIS (Center for Strategic...

An analysis of the Viasat cyber attack with the MITRE ATT&CK® framework

0
Disclaimer To do this analysis of the Viasat cyber attack, I used the open-source intelligence (1) of the team composed by Nicolò Boschetti (Cornell University),...