NIST released IR 8401, a new Cybersecurity Framework applied to the ground segment of...

0
NIST released IR 8401, a new guidance named “Satellite Ground Segment: Applying the Cybersecurity Framework to Assure Satellite Command and Control”. NIST IR 8401 is...

DEF CON 29 Aerospace Village Videos

1
DEF CON Aerospace Village is a researcher led, non-profit whose mission is to build a diverse community focussed on the security of everything from...

Space Security Challenge 2021: Hack-A-Sat 2 is back to hack an on-orbit US satellite

0
The U.S. Air and Space Forces in collaboration with the security research community opened registration May 4 for the qualification round of the second annual Space...

Est-il possible de hacker le lanceur Falcon9 de SpaceX ?

0
Cet article est traduit en français et publié sur notre site avec l'autorisation de son auteur Téodor Chabin. Vous pouvez retrouvez l'article original ici Chaque...

Un chercheur alerte sur le risque de piratage des petits satellites comme ceux de...

0
SpaceX et d'autres sociétés se précipitent pour mettre en orbite des milliers de petits satellites bon marché, mais la pression pour maintenir les coûts...

Des pirates informatiques annoncent avoir infiltré un sous-traitant de la NASA juste après le...

0
Les opérateurs du rançongiciel (ransomware) DoppelPaymer ont félicité la NASA ainsi que la société SpaceX d'Elon Musk pour le premier lancement d'une fusée privée...

Tous les LIVEs pour suivre en direct le premier lancement d’une fusée SpaceX avec...

0
Ce soir, mercredi 27 mai 2020, l'histoire va se dérouler sous vos yeux. La NASA et SpaceX lancent les astronautes Robert Behnken et Douglas...

Try to dock the SpaceX Crew Dragon at the space station in this simulator

0
Put yourself in the shoes of a NASA astronaut and try to dock to the ISS with this Crew Dragon capsule simulator. Will you...

First manned SpaceX Crew Dragon flight set for May 27 liftoff

0
Barring a last-minute postponement, a SpaceX Crew Dragon capsule will take off from the top of a Falcon 9 rocket on May 27th. The...

What are the threats to space systems?

0
In this article, we will try to identify the various threats to space systems. This article is a synthesis of the CSIS (Center for Strategic...

Last Posts

Enhancing Threat Understanding: Modeling the Viasat Cyber Attack with MITRE CTID’s Attack Flow Builder

0
Introduction In the complex landscape of modern cybersecurity, understanding the intricate mechanisms of sophisticated cyber attacks has become paramount. On February 24, 2022, Viasat, a global...

My work about the Viasat attack analysis featured in the Angelina Tsuboi’s course on Satellite Cybersecurity...

0
I’m very proud and honored to be featured in the Angelina Tsuboi's course on Satellite Cybersecurity Foundations hosted on Udemy. Thank you very much...

The dark side of the DNS or the war of the port 53

0
I am very happy and proud that my article on DNS security has been accepted and published in the last issue of Hakin9 Magazine...

My cybersecurity review for 2024

0
What an incredible end to 2024. I’ve had some wonderful experiences. I’ve successfully met many challenges in cybersecurity. I've had some incredible opportunities and I've...

My experience and tips after successfully passed the CISM (Certified Information Security Manager) from...

0
🌟 I'm thrilled to share that I've earned the CISM (Certified Information Security Manager) from ISACA. You can view my achievement on Credly. 🌍 This...

Popular posts

Description of the Elements of a Satellite Command and Control System

1
In order to be able to analyse the various threats and identify the risks facing a space system, it is necessary to describe precisely...

Install KYPO Cyber Range Platform on Openstack and Ubuntu in AWS cloud

4
KYPO is a Cyber Range Platform (KYPO CRP) developed by Masaryk University since 2013. KYPO CRP is entirely based on state-of-the-art approaches such as...

Cartographie des acteurs étatiques du cyber en France

0
Avec l'aimable autorisation de Martial Le Guédard, nous reproduisons ci-dessous sa cartographie au sujet des différents acteurs étatiques évoluant dans le domaine du Cyber...

What are the threats to space systems?

0
In this article, we will try to identify the various threats to space systems. This article is a synthesis of the CSIS (Center for Strategic...

An analysis of the Viasat cyber attack with the MITRE ATT&CK® framework

0
Disclaimer To do this analysis of the Viasat cyber attack, I used the open-source intelligence (1) of the team composed by Nicolò Boschetti (Cornell University),...