Remove vulnerabilities-threats satellite-communications-wide-open-to-hackers
article thumbnail

"In our modern world, countless applications rely on radio frequency elements" - an Interview with Larbi Ouiyzme

Pen Test

About the Author: Larbi OUIYZME Cybersecurity Consultant and Licensed Ham Radio Operator since 1988 with prefix CN8FF, deeply passionate about RF measurement, antennas, satellites, Software-defined radio, Digital Mobile Radio and RF Pentesting. Are there any interesting case studies?

article thumbnail

The Hacker Mind: Hacking Aerospace

ForAllSecure

A satellite in orbit? And the fact that hackers are thinking about this now is a very good thing. Steve Luczynski and Matt Mayes join The Hacker Mind to talk about the importance of getting hackers, vendors, and the government to get together and work through problems. Or a satellite in space? Turns out we can.

Hacking 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

‘Unpacking’ technical attribution and challenges for ensuring stability in cyberspace

SecureList

Security researchers and private cybersecurity companies can typically analyse cyber incidents from a technical standpoint and cluster them into groups, which they then tie to particular threat actors. When reports of a cyberattack appear in the headlines, questions abound regarding who launched it and why.

article thumbnail

Black Hat USA 2022: Creating Hacker Summer Camp

Cisco Security

Building the Hacker Summer Camp network, by Evan Basta. Looking at the three Ps (people, process, platform), flexibility, communication, and an awesome Cisco platform allowed us to build and roll with the changes and challenges in the network. The Cisco Stack’s Potential in Action, by Paul Fidler. The Buck Stops Here.

article thumbnail

APT trends report Q2 2022

SecureList

For five years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of advanced persistent threat (APT) activity. They are designed to highlight the significant events and findings that we feel people should be aware of. The most remarkable findings. Russian-speaking activity.

Malware 134
article thumbnail

Advanced threat predictions for 2024

SecureList

Advanced persistent threats (APTs) are the most dangerous threats, as they employ complex tools and techniques, and often are highly targeted and hard to detect. Amid the global crisis and escalating geopolitical confrontations, these sophisticated cyberattacks are even more dangerous, as there is often more at stake.

Hacking 108
article thumbnail

Advanced threat predictions for 2023

SecureList

While the geopolitical landscape has durably shifted, cyberattacks remain a constant threat and show no signs of receding – quite the contrary. Mobile devices exposed to wide attacks. It is fair to say that since last year’s predictions , the world has dramatically changed. What we predicted in 2022.

Firmware 110