CSR

WELCOME TO THE
TECHNICAL BLOG

Behind the scenes of a hardware pentest : disassembly and characterization

Blog post 2 #2 While the first interaction with an ...

Hardsploit NG : La nouvelle carte d'audit matériel

Behind the scenes of a hardware penetration test : a journey through the key steps

Blog Post 2 #1 Diving into the world of hardware ...

Static Analysis Overview

In recent years, the proliferation of cybersecurity regulations—whether issued by ...

Towards a SOC enhanced by sovereign AI

The multiplication of incidents, the rapid evolution of attackers’ TTPs ...

Integrating Artificial Intelligence into security projects

Cyberattacks continue to multiply and grow more sophisticated, targeting both ...

Formal methods

As embedded systems and critical software components become increasingly complex ...

The european regulation on Artificial Intelligence

The explosion in the development of AI (Artificial Intelligence) in ...

Firewall rule auditing: an all-too-often overlooked necessity

The firewall: a core security tool Imagine a company that ...

The basics of Cyberattacks against Modbus

1.1 PENETRATION TESTING ON MODBUS In this demonstration, we assume ...

HARDSPLOIT NG - Why are we launching this tool

Hardsploit NG – Towards a New Era of Hardware Security

Blog Post 1 In the Beginning, a Simple Ambition: Democratizing ...

Rockwell_MES-678×381-1

OT System security level assessment and secured architecture

Industrial Control Systems (ICS) play a vital role in critical ...

The methodologies of functional safety to manage the risks of technological developments related to the ecological transition.

The current issues related to global warming have led to ...