
Intuitive Machines completes its purchase of KinetX. Varda extends its partnership with Koonibba. Space Applications Services has joined Starlab. And more.
Loading summary
A
Foreign you're listening to the N2K space network.
B
At Thales. They know cybersecurity can be tough and you can't protect everything. But with Thales, you can secure what matters most. With Thales industry leading platforms, you can protect critical applications, data and identities anywhere and at scale with the highest roi. That's why the most trusted brands and largest banks, retailers and healthcare companies in the world rely on Thales to protect what matters most applications, data and identity. That's Talas T H A L E S learn more@talasgroup.com Cyber.
A
Today is October 2, 2025. I'm Maria Varmazas and this is T minus T minus 22nd Los.
C
My voice is coming from a Satellite.
A
5 the European Space Agency has signed a Memorandum of understanding with the Korea Aerospace, Axiom Space and Resonac to collaborate on the research, development and manufacturing of high performance semiconductor materials in the environment of space. Belgium's Space Applications Services has joined StarlabSpace as a joint venture partner and investor Barda Space Industries has reached an agreement with Southern Launch to extend their partnership for 20 re entries into the Kuneva test range in South Australia through 2021. Intuitive Machines has completed a previously announced acquisition of Kinetics and founder of T Minus, Brandon Karpf is joining me later in today's show for our monthly cyber and space segment. Now last month we tackled the migration of communication infrastructure to the poles. This month we're going to be talking about cyber warfare in space. By the way, do you know how many anti satellite weapons are currently being tracked in orbit? Yeah, it's probably more than you think. You'll want to hear more about that after today's headlines. Happy Thursday everybody. We are on day two of a US Government shutdown and none the wiser on when or if US politicians can come to some kind of an agreement on funding federal agencies. We do hope that those of you who are impacted by the shutdown are keeping in good spirits. Let's dive into today's intel briefing. Or there's that old saying, if you can't beat them, join them. Let's take a skewed angle today in M and A mergers and acquisitions. It's more like if you can't beat them, merge with them. We see this kind of thing a lot with large companies like SpaceX acquiring companies that produce products or services that are needed by the launch company. And we're seeing that trend trickle down to other space organizations. For example, take Intuitive Machines. They have completed a previously announced acquisition of Kinetics. Now Kinetics offers Intuitive Machines access to deep space navigation systems engineering and Constellation mission design. Ultimately, the acquisition enhances Intuitive Machines ability to provide customers secure, reliable communications and precision navigation for lunar and interplanetary missions by combining its data service platform with Kinetics Deep space navigation technology. Sounds like a win win, right? Kinetics is certified by NASA for deep space navigation and has supported some of the most ambitious planetary missions in history including navigation services to Mercury, Pluto, some asteroids and yeah, the moon. Kinetics expertise in deep space navigation and mission planning enhances Intuitive Machines ability to to deliver end to end space data relay solutions for lunar and interplanetary missions. Data is king after all. The stock acquisition was completed for $30,000,000 before closing adjustments, including approximately $15,000,000 in cash and approximately 1,400,000 shares of Intuitive Machines common stock. We're predicting some big things for commercial lunar exploration in the near future. Varda Space has reached an agreement with Southern Launch to extend their partnership for 20 reentries into the Kuniba test range in South Australia through 2028. So far, Varda has used Kuniba as a RE entry site for the W2 and W3 missions which re entered in February and May of this year. Capsules W4 and W5 are scheduled to reenter at the 15,830 square mile Kuniba test range by the end of 2025. The two companies say that this new agreement will cement Australia's role as the leader in commercial space launch and returns and secure landing space for Varda's future missions, which are planned to increase to a near monthly cadence by the end of 2028. Belgium Space Application Services has joined Starlab Space as a joint venture partner and investor. Space Apps will bring to the partnership experience in space systems, mission operations and payload integration with capabilities that include avionics, payload development, the end to end international commercial experiment cubes or icecubes service, as well as mission integration and operations control software. The company also works closely with the European Space Agency and international partners, broadening starlab's access to global markets and research communities. The partnership will also include collaboration on space apps. Space Innovation Laboratories Currently under development across Europe, Axiom Space and Resonac have agreed to collaborate on the research, development and manufacturing of high performance semiconductor materials in the environment of space. The companies say that this collaboration paves the way towards leveraging microgravity to advance next generation chip technologies and accelerate the in space manufacturing market. Under this new mou, Resonac also plans to extend its current work with Axiom Space, where Resonac is developing molding components that can reduce soft errors when semiconductor devices are exposed to space radiation. And the European Space Agency has signed its own Memorandum of Understanding with the Korea Aerospace Administration, better known as casa. The agencies plan to work together on peaceful uses of space, starting with space weather monitoring and sharing space communications facilities. The agencies may now use each other's ground stations for telemetry, tracking and command functions. This agreement complements a similar arrangement in place since 2011 with the Korea Aerospace Research Institute, which is an affiliated research institute of casa. Now, UKSA also reaffirmed their own partnership with esa. They signed the European Space Agency's Integrated Team Arrangement, which they say marks a significant step in strengthening UK European collaboration in space exploration. And that wraps up today's top five stories. But really, we have just barely scratched the surface with all of the activities going on in the space industry today. N2K senior producer Alice Gruth joins us now to share some of the other stories that are making today's headlines. What are you looking at today, Alice?
D
There's a lot of rumors about layoffs hitting federal agencies during the shutdown, Maria, but nothing confirmed as yet. The FAA, however, has announced that 11,000 of their employees, that's about a quarter of their workforce, will be furloughed. Ispace has signed a payload service agreement with uel T Mobile has rolled out tsatellite services to more customers. Maxar Intelligence is rebranding to Vantnor Blue Origin has announced the crew for the NS36 mission. And Spacecoin has performed a demonstration designed to prove that data on a blockchain, that's the encrypted record behind cryptocurrencies and other digital services, could leave Earth, pass through a satellite in orbit and and return intact. Who knew that wasn't a thing, right?
A
Using space for secure data transfer, I guess not exactly new news. Still, remind us please, where we can learn about all of those stories.
D
Links to further reading on all the stories mentioned throughout our episode are included in the selected Reading section of our show Notes. Those links can also be found on our website space.n2k.com just click on the episode title.
A
Hi there listeners. We have regular segments that we air here on T Minus, where we have regular experts that join us monthly to talk in depth about their areas of expertise. And if you have burning questions, our guest experts may just have answers for you. Law, Intelligence, Policy and Innovation and Cybersecurity, which is our segment today, in fact. So, got any questions on any of those? Send us your questions to space2k.com and we will share them with our segment experts to answer on the show. Chances are whatever's on your mind is top of mind for a lot of other listeners too. Don't be shy and thank you.
B
AI adoption is exploding and security teams are under pressure to keep up. That's why the industry is coming together at the datasec AI Conference, the premier event for cybersecurity, data and AI leaders. Hosted by data security leader Ciera. Built for the industry, by the industry, this two day conference is where real world insights and bold solutions take center stage. Datasec AI25 is happening November 12th and 13th in Dallas. There's no cost to attend. Just bring your perspective and join the conversation. Register now@datasecai2025.com CyberWire.
A
I caught up with Brandon Karp for our monthly cyber and space segment.
C
I want to make a prediction today, and it's not the rosiest of predictions. In fact, it might be a little bit of, you know, fear, uncertainty and doubt.
A
Oh, we're doing the FUD. Okay.
C
A little bit. In the next 12 months, we are going to see clear evidence of preparation for another viasat level hack, an attack against satellite infrastructure.
A
I. Yep. Okay.
C
Now I'm not sure that the hack will actually go to the point of having effects like viasat hack did, but we will certainly see clear evidence that some foreign actor, probably Russia, is preparing for another of that scale within the.
A
Same domain as in. Within the Ukrainian war. Or are we thinking potentially outside of that?
C
I think outside of that. And I think it can be either satellite communications or Earth observation satellites.
A
Damn. Okay. Obviously not a thing any of us want to happen. I'm just putting that out there like nobody wants this, but one must prepare for potentials. So anything that you think is pointing in that direction and anything you want to share that makes you think this. I'm curious where you're going with that.
C
Yeah, so a couple of things are kind of leading to this prediction in my mind. First is the recent incursions into the airspace of Eastern European countries, members of NATO, you know, think Poland, Russia entering their airspace using attack drones and even, you know, missiles flying through their airspace and actually manned aircraft as well as. And so you see that increased aggressive posture from Russia. Now that's a physical incursion probably, as Russia has shown. They have the capability with the viasat attack. Right. They have the capability, the means and the coordination in their military operations to coordinate in cyberspace with physical space. So they've proven that they can do that. So chances are they're starting to think along those lines as well. At the same time, a decrease in the, or a degradation in the open dialogue between the U.S. european countries and Russia in terms of the Ukraine war and bringing that to resolution, then that necessarily doesn't say, okay, there's going to be a cyber attack against infrastructure. But what I do want to bring to the fore is a few statements made by European space leaders at the Space Defense and Security Summit in September of 2025.
A
Yep.
C
And the first was from the newly appointed leader of France's space forces. This is Major General Vincent. And I'm going to butcher this name. Chiseau, something like that.
A
Okay.
C
But these were literally his very first public statements to the world after being appointed. And he talked about the rapid increase in hostility in the space domain and space environment at the same time. At the same event, Canada's space leader, Brigadier General Christopher Horner, revealed that they are tracking at least potentially more than 200 anti satellite weapons currently in orbit, which is a scary number.
A
Yeah, I think if you had asked, not that I would know, if you had asked me how many ASAT weapons do I think are in orbit, I would not have come up with 200. Not even close. Right. All right, what do I do with that information?
C
Well, really it's what, what does the Community do with information? So what do we know? We know that Russia is starting to do physical incursions into Eastern Europe, testing the responses of the European Defense Community to those incursions. We know that talks have pretty much broken down on Ukraine. We know that Russia now publicly is saying that the US and the west are perpetrating a full war against Russia. So that that is escalating now. We know that the European space commanders are saying this is becoming a more and more hostile environment. We know that there are physical anti satellite weapons in space, a significant number of them, probably a lot of which are Russia's. And we know that Russia has been actively doing things like jamming GPS in Eastern Europe and affecting numerous countries just last two years. And so what do we do? We need to kind of go shields up and start thinking of we need to start looking for the next via SAT hack. Right. What are the vulnerable systems? How do we defend those systems? How do we approach this and what are we looking for? And I would like to point everyone and do a little kind of public service announcement. Cisco released a severe major exploit, kind of in a patch for an exploit against Cisco asa. Now Cisco ASA are edge devices. They're not necessarily related to satellite communications and satellite architectures. But what we know about these ASA devices is they tend to be edge devices, you know, kind of between your enterprise network and the global Internet. They are used for everything from firewalls and VPN aggregators, things like that. So they're edge devices and typically used by small and medium sized businesses. So the types of businesses that are in the defense and aerospace domain, especially industries and businesses with some tech debt, and they haven't updated their systems recently. And this is a critical vulnerability that the existing attacks are techniques that Russia has used in the past. And so there is a connection here, I think, between Russia starting to prepare the battle space and trying to find access points. And maybe they've already found them to have an effect, an offensive cyber effect against satellite communications and even potentially Earth observation technologies.
A
Yeah, it's interesting and I'm making sure to highlight that you've mentioned several times businesses, because I know when we're talking about a war potentially heating up, a lot of the instincts that many of us have is this is, this is a government and military thing. But via sat was obviously civilian communications. So this is really the businesses need to stand up and take notice. Although it is fascinating to think, if not in a good way, if Russia already potentially has a foothold somewhere, then you've got to try and figure out who's in your network right now. That is not an easy thing to do. Not impossible, but not easy. Quite a gauntlet being thrown potentially. But that is the challenge, isn't it?
C
Especially with an adversary, Russia, who's proved that they have the means, they have the capability, they have the intent. Now we haven't seen that being, I mean, we have seen an increase in incursions, you know, cyber intrusions in cyber incidents against space infrastructure just this year. Right. It's been like a 120% increase this year over the previous year.
A
And just the general aerospace demand as well as just like air space. Yes, correct. Yeah. Yep.
C
Now, not all of those are what would be considered necessarily preparation of the battle space. Preparation of the battle space looks a little different. It's much more akin to what Volt Typhoon and Salt Typhoon, the Chinese threat actors, have been doing against US Critical infrastructure, which is creating persistent access, starting to craft destructive malware against those systems, testing the limits of those controls within those networks. That's not necessarily what the increase in incidents have been, but the situation can tip very quickly from initial access into preparing the battle space. And really that's what this prediction is about, is the next 12 months we're going to rhythmically really see an increase, a ramp up in preparing the battle space. This is really a call to action, to the community, to get together now. It's also a business opportunity. Right. You know, I like covering all these, all these frames for the community, which is anyone who's working on things like digital twins, secure communications, zero trust architectures. Last month we talked about optical networks and you know, low latency communications and failover. That low latency communications through optical communications allows us to start building self healing satellite architectures and things like that. So, you know, starting to invest and think about how you can implement those technologies could improve your defensive posture.
A
And is there anything in this context that would be maybe a little different from the normal kind of thing that a defender might see that they should be keeping an eye out for, or is it just more of what they might often see incoming?
C
Yeah, that's a fantastic question. And at the end of the day, when you think about the intrusion kill chain and the cyber kill chain, the first part of that kill chain really does look the same. What are they doing? They are doing recon, investigating the network, looking at different points of intrusion, testing different intrusion capabilities and techniques, testing accounts to see if they can get access once they have access, establishing persistence. However, the end target can be different, right, for, for a effect, for a, an actual offensive effect. What the adversary is going to be looking for is not just persistence in memory, but access to parts of memory that are running critical code, operating systems, industrial controls, kind of the crown jewels of the network. Not just intelligence about the organization, financial documents, things like that, but actually looking for the critical parts of the network that keep the network up and running. And so once you see threat actors starting to look for those things in your telemetry, that's when you really have to get concerned. Also potentially even implanting malware. If an organization is implanting malware and not doing anything, that's a clear sign that they are preparing the battlespace to flip the switch at some point. And so that's the type of activity that I'm thinking we might start to see more of in this space, in this domain.
A
Hmm. I know there's a lot of coordination that goes on behind the scenes and in non public spaces about sharing this kind of intel. So I'm sure that's going on at pace and hopefully we'll see more of that and people will be keeping their eyes and ears peeled. So this is Brandon, not a happy topic, but an important one. You are allowed to give me non happy topics for the record. It's fine.
C
It's important, I think that just the next 12 to 18 months kind of worldwide in this domain is going to get a little testy. And so I think everyone in this community has to start thinking along these lines. How do we prepare ourselves? And then of course the new businesses coming online who can provide services that's valuable. Right. New technologies like we mentioned, the digital twin technologies very helpful for kind of self healing constellations and communication networks. We've maybe it's time to start to bring up quantum cryptography again and bring that back in a future segment.
A
You wove that in nicely. Yeah, we'll put a pin in that for next time. Yes, I like it. I like it. Yeah. All right. Well, Brandon, thank you and thanks for keeping everybody informed. It's a joy as always talking to you. So thanks for coming back on the show.
C
Thanks, Maria.
A
Our thanks to Brandon Karp for joining us for our monthly check in about space cybersecurity. And again, if you have a question you would like him to answer, send it on over to us. Space2K.com is our email and we will share your question or thought or idea with him. We'll be right back.
B
Think your certificate security is covered by March 2026 TLS certificate lifespans will be cut in half, meaning double today's renewals. And in 2029, certificates will expire every 47 days demanding between 8 and 12 times the renewal volume. That's exponential complexity, operational workload and risk unless you modernize your strategy. Cyberark proven in identity security is your partner in certificate security. Cyberark simplifies lifecycle management with visibility, automation and control at scale. Master the 47 day shift with CyberArk scan for vulnerabilities, streamline operations, scale Security. Visit cyberark.com 47day that's cyberark.com the numbers 47day.
A
Welcome back. Kazakhstan is best known in the space world as home to the Baikonur Cosmodrome, the historic launch site for Soviet and now Russian missions. Indeed, Baikonur was the launch site of Yuri Gagarin and and the gateway for decades of human spaceflight still is. In fact, just Last month the Progress 93 cargo resupply to the ISS launched from there. And not to rest on its international renowned laurels, Kazakhstan is making even more moves in space science advances. This week the nation launched Sana 1, which is its first long duration isolation experiment at the National Space center in Astana. Not unlike analog astronaut missions that take place around the world, this 10 day study places a four woman crew inside a spacecraft simulator to test medical, psychological and team dynamics under spaceflight like conditions. The SIM is led by Kazakhstan's Aerospace Committee with support from Eurasian Space Ventures and local universities and it is important to note here that this mission is a milestone For Kazakhstan as Sana 1 is the country's first integrated human spaceflight study. Alan Koskanoff, who is the Deputy Chief of the Aerospace Committee of the Ministry of AI and Digital Development of Kazakhstan, said this of the mission this experiment lays the foundation for building the country's national research infrastructure and training specialists for future space missions. Its goal is not only to advance the country's potential in space science, but also to promote greater engagement of women in space science. The female crew of SANA one symbolizes a new step towards gender equality and demonstrates Kazakhstan's commitment to form its own team of researchers for future space expeditions. All the best to Commander Yulia Bakhyrova and crew members Assem Kuyandike, Daria Komarova and Lenara Zadayrova on their endeavor. And while this one is on land, no doubt we'll hear of in space missions soon enough. Add Astra and that's T minus Brought to you by N2K CyberWire we would love to know what you think of this podcast. Your feedback ensures we deliver the insights that keep you a step ahead in the rapidly changing space industry. If you like this show, please please share a rating and review in your podcast app. Please also fill out the survey in the show notes or send an email to space2k.com we are proud that N2K Cyberwire is part of the daily routine of the most influential leaders and operators in the public and private sector. From the Fortune 500 to many of the world's preeminent intelligence and law enforcement agencies, N2K helps space and cybersecurity professionals grow, learn and stay informed as a nexus for discovery and connection. We bring you the people, the technology and the ideas shaping the future of secure innovation. Learn how@n2k.com N2K Senior Producer is Alice Carouse. Our producer is Liz Stokes. We are mixed by Elliot Peltzman and Trey Hester with original music by Elliot Peltzman. Our Executive producer is Jennifer Ibin. Peter Kilby is our publisher and I am your host, Maria Ramazas. Thank you for listening. We'll see you next time.
C
T minus.
B
And now a word from our sponsor Threat Locker, the powerful Zero Trust enterprise solution that stops ransomware in its tracks. Allowlisting is a deny by default software that makes application control simple and fast. Ring fencing is an application containment strategy, ensuring apps can only access the files, registry keys, network resources and other applications they truly need to function. Shut out cybercriminals with world class endpoint protection from threat locker.
Episode: How Many Anti-Satellite Weapons Are Currently in Orbit?
Date: October 2, 2025
Host: Maria Varmazas
Featured Guest: Brandon Karpf
This episode of T-Minus Space Daily tackles critical issues at the intersection of cybersecurity and space, focusing on the growing threat landscape in orbit, particularly concerning anti-satellite (ASAT) weapons and vulnerabilities in space infrastructure. The featured segment is a monthly "Cyber and Space" deep-dive with Brandon Karpf, covering recent geopolitical escalations, cyber risks to satellites, and urgent calls for industry vigilance.
Major partnerships & acquisitions:
Other headlines:
"Using space for secure data transfer, I guess not exactly new news."
— Maria Varmazas, [08:38]
"We are going to see clear evidence of preparation for another Viasat-level hack, an attack against satellite infrastructure."
— Brandon Karpf, [11:04]
Geopolitical Context:
Alarming Numbers: Anti-Satellite Weapons in Orbit
"Canada's space leader... revealed that they are tracking at least potentially more than 200 anti satellite weapons currently in orbit, which is a scary number."
— Brandon Karpf, [13:37]
"If you had asked me how many ASAT weapons do I think are in orbit, I would not have come up with 200. Not even close."
— Maria Varmazas, [14:12]
Key Threat Factors:
Call to Action:
Exploits and Vulnerabilities:
"This is really a call to action, to the community, to get together now. It's also a business opportunity."
— Brandon Karpf, [18:49]
"Businesses need to stand up and take notice. Although it is fascinating to think, if not in a good way, if Russia already potentially has a foothold somewhere, then you've got to try and figure out who's in your network right now. That is not an easy thing to do."
— Maria Varmazas, [16:52]
On the surge in ASATs:
"Canada's space leader... revealed that they are tracking at least potentially more than 200 anti satellite weapons currently in orbit, which is a scary number."
— Brandon Karpf, [13:37]
The new threat reality for businesses:
"Types of businesses that are in the defense and aerospace domain, especially industries and businesses with some tech debt... This is a critical vulnerability."
— Brandon Karpf, [15:51]
A clarion call across the community:
"This is really a call to action, to the community, to get together now... anyone who's working on things like digital twins, secure communications, zero trust architectures..."
— Brandon Karpf, [18:49]
On public-private vigilance:
"Not all of those [cyberattacks] are necessarily preparation of the battlespace... but the situation can tip very quickly from initial access into preparing the battlespace."
— Brandon Karpf, [18:03]
Listeners are encouraged to submit their cybersecurity and space questions to the show for future expert analysis.