CSR

WELCOME TO THE
TECHNICAL BLOG

Why adopt EBIOS RM for your risk analysis?

Cyber risk analysis has become a fundamental component of securing ...

Behind the Scenes of a Hardware Penetration Test: Analysis – Diving into the Inner Workings

Blog post 2 #3 After disassembling and characterizing the electronic ...

Behind the scenes of a hardware pentest : disassembly and characterization

Blog post 2 #2 While the first interaction with an ...

Hardsploit NG : La nouvelle carte d'audit matériel

Behind the scenes of a hardware penetration test : a journey through the key steps

Blog Post 2 #1 Diving into the world of hardware ...

Static Analysis Overview

In recent years, the proliferation of cybersecurity regulations—whether issued by ...

Towards a SOC enhanced by sovereign AI

The multiplication of incidents, the rapid evolution of attackers’ TTPs ...

Integrating Artificial Intelligence into security projects

Cyberattacks continue to multiply and grow more sophisticated, targeting both ...

Formal methods

As embedded systems and critical software components become increasingly complex ...

The european regulation on Artificial Intelligence

The explosion in the development of AI (Artificial Intelligence) in ...

Firewall rule auditing: an all-too-often overlooked necessity

The firewall: a core security tool Imagine a company that ...

The basics of Cyberattacks against Modbus

1.1 PENETRATION TESTING ON MODBUS In this demonstration, we assume ...

HARDSPLOIT NG - Why are we launching this tool

Hardsploit NG – Towards a New Era of Hardware Security

Blog Post 1 In the Beginning, a Simple Ambition: Democratizing ...