Blog

Get CRA-Ready: One Platform to Simplify CRA Compliance

Get CRA-Ready: One Platform to Simplify CRA Compliance

The EU Cyber Resilience Act (CRA) has set cybersecurity requirements focusing on Products with Digital Elements (PDE). This means that manufacturers within the supply chain must monitor and report vulnerabilities once discovered. Otherwise, a fine of a substantial financial penalty will be imposed. In this landscape, what manufacturers need is a solution that offers proactive Vulnerability and SBOM Management.

Replicating RAMN Using a Single STM32 Board: A Hands-On Exploration

Replicating RAMN Using a Single STM32 Board: A Hands-On Exploration

Replicating the core functions of a full-scale Resistant Automotive Miniature Network (RAMN) using just a single STM32 board is a practical, cost-effective way to dive into advanced in-vehicle networking. In this hands-on guide, we run through the step-by-step setup, enabling engineers and enthusiasts alike to prototype resilient automotive communication systems with minimal hardware.

LockBit Ransomware Group Data Leak: Implications for Automotive Cybersecurity

LockBit Ransomware Group Data Leak: Implications for Automotive Cybersecurity

A recent breach of the LockBit ransomware group exposed chat logs, offering a rare inside look at how victims were targeted and extorted. Automotive companies featured prominently among those attacked. We unpack the key findings and outline practical steps that automotive companies can take to block LockBit attacks or similar incidents.

Automotive Threat Intelligence: Is It Your Shield or Your Burden?

Automotive Threat Intelligence: Is It Your Shield or Your Burden?

As automotive cyberthreats grow more complex, automotive threat intelligence (TI) becomes more essential. But not all solutions reduce risk effectively. We explore why the right automotive TI approach can mean the difference between insight and information overload.

Why Dynamic TARA Matters: Gaining the Edge Before Attackers Do

Why Dynamic TARA Matters: Gaining the Edge Before Attackers Do

Today’s threats move so fast that static threat analysis and risk assessment (TARA) can no longer keep up. We discuss how dynamic TARA gives organizations the edge, with faster response, tighter collaboration, and continuous protection.

Invisible Commands, Real Consequences: AI Prompt Injection in Vehicle Systems

Invisible Commands, Real Consequences: AI Prompt Injection in Vehicle Systems

As AI assistants become standard features in vehicles, new risks like prompt injection are emerging, quietly manipulating systems through seemingly harmless inputs. We explore how attackers could exploit invisible commands in everyday interactions and why securing AI at the input level is critical to automotive safety.

Apple CarPlay’s ‘AirBorne’ Vulnerabilities and What They Mean for the Automotive Industry

Apple CarPlay’s ‘AirBorne’ Vulnerabilities and What They Mean for the Automotive Industry

High-impact vulnerabilities in Apple’s AirPlay protocol, collectively known as “AirBorne,” expose CarPlay-equipped vehicles to remote code execution, privacy breaches, and potential system compromise. We explore how the vulnerabilities work, real-world scenarios where exploits could occur, and what users and automotive stakeholders can do to stay protected.

Hitag2 Key Fob Vulnerability: How Attackers Can Clone Keys in Under a Minute

Hitag2 Key Fob Vulnerability: How Attackers Can Clone Keys in Under a Minute

Hitag2, a legacy key fob system, has long been known to carry security flaws. A recent demonstration showed that it could be cracked in under a minute. We break down how the attack works and why outdated encryption poses serious risks to modern vehicles.

Breaking Down the Pioneer IVI System 3-Bug Exploit Chain From Pwn2Own Automotive 2024

Breaking Down the Pioneer IVI System 3-Bug Exploit Chain From Pwn2Own Automotive 2024

We analyze the three-bug exploit chain demonstrated by security researchers against the Pioneer DMH-WT7600NEX IVI system at Pwn2Own Automotive 2024. We map it to the Automotive Threat Matrix and highlight industry best practices for mitigating similar exploits.

Previous
1 2 3 4 5 6 ... 14
Next