As artificial intelligence becomes an integral part of the automotive ecosystem, its dual nature-both as a powerful security tool and a potential attack vector-demands urgent attention. In this episode of Cars, Hackers, and Cyber Security, we explore how AI is reshaping the threat landscape for connected and autonomous vehicles.
Drawing from insights from our blog How AI Is Reshaping Automotive Cybersecurity, we examine real-world use cases where AI strengthens detection, response, and compliance-and where it introduces new vulnerabilities. From automated threat modeling and deepfake firmware attacks to ethical dilemmas and evolving regulations, we unpack the complexities facing automakers and suppliers worldwide.
Discover how PlaxidityX is enabling manufacturers to leverage AI responsibly, aligning advanced analytics with UN R155 compliance, and reducing risk in increasingly complex supply chains.
Chapters:
00:00 Welcome & Episode Overview
01:10 How AI Is Transforming Cybersecurity in Automotive
04:00 AI as a Security Enabler: Detection, Prediction & Automation
07:15 AI as a Risk: Adversarial Attacks, Data Poisoning & Manipulation
10:00 Regulatory and Compliance Implications (UN R155, ISO 21434)
12:30 PlaxidityX Solutions: Responsible AI for Secure Development
14:30 Final Takeaways & Call to Action
As cybersecurity regulations tighten across the automotive industry, OEMs and suppliers are under growing pressure to not only build secure vehicles but also prove compliance across their entire software and hardware stack.
In this episode of Cars, Hackers, and Cyber Security, we explore the key strategies for mastering compliance with global automotive cybersecurity standards such as UN R155 and ISO/SAE 21434. We explore the tools, processes, and organizational shifts needed to manage complex supplier ecosystems, validate software origins, and mitigate risks before they become liabilities.
Learn how automakers are integrating threat analysis, software bill of materials (SBOM) scanning, and third-party audits into their development lifecycles. Hear how compliance is evolving from a checkbox to a continuous, proactive discipline-and why this shift is critical for future-proofing both innovation and regulation.
Chapters:
00:00 Introduction
02:30 The Role of Global Standards (UN R155, ISO/SAE 21434)
06:15 Building a Risk-Aware Development Process
10:40 What SBOMs Really Mean for OEMs
14:20 Managing Third-Party Software and Supply Chain Visibility
18:00 Leveraging Automation and AI in Compliance
22:10 From Reactive to Proactive: Building Compliance Culture
26:00 Final Takeaways
🔗 Links & Resources:
PlaxidityX on LinkedIn
Subscribe on YouTube
Contact Us
As today’s vehicles evolve into software-defined data hubs, concerns over national security have extended deep into automotive supply chains. In this episode of Cars, Hackers, and Cyber Security, we unpack the U.S. government’s sweeping new ban on connected vehicle systems originating from China and Russia-and what it means for automakers, suppliers, and consumers worldwide.
Drawing from The Auto Tech War: U.S. Ban on China and Russia Leaves Industry Scrambling by Durga Adusumilli, we explore the motivations behind the policy, the massive compliance challenges it imposes, and how the global auto industry is reacting. From surveillance risks and remote vehicle hijacking to complex software supply chains and legal ambiguity, we break down the intersection of geopolitics, cybersecurity, and automotive innovation.
Discover what makes firmware and open-source software exempt, why declarations of conformity are becoming mandatory, and how companies like PlaxidityX are stepping up with cutting-edge solutions to navigate the complexity.
Chapters:
00:00 Welcome & Episode Overview
01:15 Why the U.S. Government Is Cracking Down
03:40 The Scope of the Ban: VCS & ADS Systems
06:05 Supply Chain Challenges & Compliance Chaos
09:30 Exceptions, Loopholes & Ownership Dilemmas
13:00 Due Diligence, SBOMs & IP Protection
17:45 Timeline Pressures & Industry Reactions
20:00 How Technology Is Enabling Compliance
23:05 Implications Beyond the Automotive Sector
26:30 Final Takeaways & Call to Action
Contact us:
https://www.linkedin.com/company/plaxidityx/
As automotive software grows increasingly complex, navigating security and regulatory requirements has become an essential challenge for manufacturers. Today's vehicles, driven by software-defined systems and connected services, must comply with stringent standards while defending against evolving cyber threats.
In this episode, we delve deeply into the critical intersection of automotive software security and industry regulations. We explore how automakers and Tier 1 suppliers can manage complex regulatory landscapes like UN Regulation 155 (R155) and ISO 21434, which mandate cybersecurity throughout the vehicle lifecycle-from design through production and post-production. The integration of numerous software stacks within a single vehicle opens avenues for vulnerabilities that attackers can exploit, highlighting the need for rigorous compliance and robust cybersecurity practices.
Join us to discover essential insights into adopting secure software development frameworks, implementing rigorous Threat Analysis and Risk Assessment (TARA) processes, and maintaining compliance in a rapidly shifting regulatory environment. Learn how cutting-edge practices such as continuous vulnerability monitoring and Vehicle Security Operations Centers (VSOCs) are becoming standard to protect vehicles against emerging threats.
Chapters:
00:00 Introduction to Automotive Software Security
00:18 The Evolving Automotive Software Landscape
01:12 Key Regulatory Standards: UN R155 and ISO 21434
03:45 Challenges in Automotive Software Compliance
06:23 Vulnerabilities in Modern Vehicle Software Systems
09:05 Practical Strategies for Compliance and Security
16:40 Implementing Continuous Monitoring and VSOCs
20:15 Future Directions in Automotive Regulation and Security
21:30 Conclusion and Key Takeaways
Contact us:
https://www.linkedin.com/company/plaxidityx/
https://www.youtube.com/@PlaxidityX
https://plaxidityx.com/company/contact/
With next-generation vehicles rapidly transforming into software-defined platforms powered by High-Performance Computers (HPCs), the approach to automotive security is fundamentally changing. These powerful central processors are critical for everything from infotainment to autonomous driving, but their consolidation also creates a significant single point of failure and a vastly expanded attack surface.
In this briefing, we unpack the unique cybersecurity challenges presented by automotive HPCs. We'll explore how these systems manage mixed-criticality functions, the inherent risks of integrating diverse software on a single SoC, and the evolving threat landscape that includes everything from connectivity exploits to supply chain vulnerabilities. Imagine an attacker escalating privileges from a non-critical app to seize control of safety systems – the stakes couldn't be higher.
Join us to understand the essential defense-in-depth strategies for securing these complex automotive brains, from implementing Hardware Security Modules (HSMs) and Trusted Execution Environments (TEEs) to adopting rigorous Threat Analysis and Risk Assessment (TARA) methodologies and real-time VSOC monitoring. As regulations like UN R155 and standards such as ISO 21434 mandate robust cybersecurity, it’s no longer optional to embed security from the design phase onwards.
Chapters:
00:00 Introduction to Automotive Cybersecurity
00:15 Evolution of Car Electronics
00:33 The Shift to Centralized High-Performance Computers (HPCs)
01:31 Challenges of Centralized Computing in Cars
03:26 Understanding Automotive HPCs
05:12 Security Risks in Modern Vehicles
09:57 Strategies for Securing Automotive HPCs
20:19 Future Trends in Automotive Cybersecurity
21:18 Conclusion and Further Resources
Contact us:
https://www.linkedin.com/company/plaxidityx/
https://www.youtube.com/@PlaxidityX
contact@plaxidityx.com
With cyber attacks on trucks becoming more common and costly, fleet operators and OEMs must rethink how they protect their vehicle security and data privacy. Trucks are no longer isolated units, they're part of a larger, interconnected automotive ecosystem vulnerable to disruption.
In this episode, we unpack the threats, explore real-world hacking scenarios, and dive into actionable cybersecurity strategies for truck manufacturers. The financial and operational stakes are sky-high, especially when trucks are transporting valuable or perishable cargo. We break down the dangers of a hacked ELD, the threats to critical systems like braking, and the growing risks of data theft.
Join us to discover how truck manufacturers can implement a security-by-design approach, from early TARA assessments to real-time VSOC monitoring. It's time to stop treating automotive cybersecurity as an afterthought in the transportation industry.
Chapters:
(00:00) - Intro: Welcome to Cars, Hackers & Cybersecurity
(00:13) - Truck Cybersecurity: Combating Threats on the Open Road
(01:23) - Cyber attacks on trucks carry a hefty price tag
(02:40) - Broader attack surface than connected cars
(03:27) - The Dangers of a Truck Hack
(04:53) - Hacking a Truck’s Electronic Logging Device (ELD)
(05:30) - Cybersecurity Steps Commercial Truck Manufacturers Should Consider
(06:21) - Implement security by design
(07:02) - Embed in-vehicle IDPS protection
(07:44) - Perform penetration tests to find and address weaknesses
(08:15) - Scan for vulnerabilities
(08:50) - Set up a VSOC to monitor and protect the entire fleet
(09:25) - Outro: See You Next Time on Cars, Hackers & Cybersecurity
Contact us:
https://www.linkedin.com/company/plaxidityx/
https://www.youtube.com/@PlaxidityX
contact@plaxidityx.com
In this episode, we explore the shift from traditional theft to a new era of digital car theft. Instead of smashing windows, today’s criminals launch automotive cyber-attacks that bypass immobilizers, unlock doors, and hijack control systems, all without leaving a trace.
From CAN bus vulnerabilities to cloned key fobs, cybercriminals are finding new attack vectors faster than manufacturers can plug the gaps. As a result, theft rates are soaring and entire automotive cyber security ecosystems—from fleets to insurers—are feeling the financial and operational pain.
We’ll discuss what’s being done to fight back, including the critical role of aftermarket AI-powered protection. Learn why OEMs are struggling, why the insurance market is shifting, and why AI-powered anti-theft protection solutions like vDome by PlaxidityX essential for any modern vehicle on the road today. This isn’t just car cyber-attack prevention—it’s a whole new era of proactive vehicle protection.
Chapters
(00:00) - Intro: Welcome to Cars, Hackers & Cybersecurity
(00:12) - Real-World Example: Your Car is Gone
(01:00) - Car Theft Overview: From Hotwiring to Hacking
(01:55) - Car Theft Has Reached Epidemic Levels
(02:25) - Wreaking Havoc with the Entire Automotive Ecosystem
(03:52) - Cyber-Enabled Car Theft Techniques
(05:45) - How to Address the Car Theft Problem
(07:21) - How To Protect Vehicles Already on the Road: The Need for Aftermarket Protection
(08:55) - How Plaxidity X (formally Argus) Can Help
(09:37) - Outro: Stay Safe on the Road and in the Cloud
Contact us:
https://www.linkedin.com/company/plaxidityx/
https://www.youtube.com/@PlaxidityX
contact@plaxidityx.com
In this episode, we discuss the groundbreaking concept of Dynamic SBOM and its role in modern automotive software security. Hear how real-time monitoring of third-party library usage can lead to more precise vulnerability management. We explain the process behind intercepting dynamic calls and replacing them with breakpoints for live analysis.
Discover how the technology replaces traditional code analysis methods to offer a live, actionable vehicle security view. We break down the technical aspects of Dynamic SBOM, discussing how it works by intercepting dynamic library calls using breakpoints. Understand the difference between repetitive call logging in ltrace and the efficient, one-time capture in Dynamic SBOM. This precision leads to more effective vulnerability prioritization.
Our discussion also covers the integration of Dynamic SBOM with static analysis techniques, enhancing overall security. We highlight key considerations and best practices for maximizing monitoring coverage. Listen now to learn how to revolutionize your software security with these innovative insights.
Chapters:
(00:00) Welcome to Cars, Hackers and Cybersecurity
(00:00:12) Dynamic SBOM Overview
(00:00:21) What Is SBOM & Its Importance
(00:00:48) Static vs. Dynamic SBOM Comparison
(00:01:13) Benefits of Real-Time Monitoring
(00:02:24) How Dynamic SBOM Works
(00:02:46) Key Considerations & Dynamic SBOM vs. ltrace
(00:03:33) DSBOM Complementing Static Analysis
(00:04:24) Coverage, Testing & Effectiveness
(00:05:16) Interpreting Library Usage & Vulnerability Mitigation
(00:06:09) Conclusion: Dynamic SBOM in Action
(00:07:16) Episode Wrap-Up & Sign Off
Contact us:
https://www.linkedin.com/company/plaxidityx/
https://www.youtube.com/@PlaxidityX
contact@plaxidityx.com
In the age of connected cars, software-driven systems, and global supply chains, cyber security challenges have become increasingly complex. This episode delves into the pitfalls of relying on disconnected solutions to guard modern vehicles.
We’ll show how a platform-centric automotive security approach consolidates everything—from vulnerability scanning to compliance checks—under one roof. We highlight real-world examples showing how holistic visibility and platform integration streamline security processes, help prioritize threats, and keep compliance on track. Discover how best-of-breed tools, when stitched together, can end up costing more time and resources than anticipated.
Hear expert perspectives on addressing regulatory requirements, aligning security with business goals, and safeguarding customer trust. As the automotive industry races forward with electric and autonomous vehicles, staying ahead of potential vulnerabilities is crucial. Join us to discover how to protect both your innovation pipeline and the safety of your customers in today’s rapidly evolving automotive security landscape.
Chapters:
(00:00) Welcome to Cars, Hackers and Cybersecurity
(00:12) Intro to Platform-Centric Automotive Cybersecurity
(00:21) The Evolving Automotive Industry
(00:48) Limitations of Automotive Best-of-Breed Tools
(01:11) Holistic Visibility for Security Management
(02:33) Context-Enriched Insights & Data Correlation
(03:31) Risk Assessment & Vulnerability Prioritization
(04:09) Seamless Integration & Scalability
(05:31) Accelerated Time to Market & Security Alignment
(07:56) Optimizing Operations &
(08:39) The Future of Automotive Cyber Security Conclusion
Contact us:
https://www.linkedin.com/company/plaxidityx/
https://www.youtube.com/@PlaxidityX
contact@plaxidityx.com
As OEMs race to innovate with autonomous driving, V2X communication, and other cutting-edge tech, compliance with UNR 155 and ISO/SAE 21434 has never been more important. But what do these regulations really mean for your day-to-day operations? In this episode, we demystify the role of CSMS and how it supports continuous security through design, development, production, and beyond.
We also discuss the critical differences between mandatory guidelines like UNR 155 and global standards like ISO 21434. And examine the broader landscape of standards like China’s GB/T and Europe’s ENISA guidelines. Learn how to ensure compliance while still innovating at a rapid pace.
Find out how partnering with the right experts, tools, and frameworks can help you navigate everything from TARA to incident response planning. Listen in for practical tips on overcoming hurdles like documentation complexity, supply chain integration, and resource constraints. You’ll walk away with strategies to maintain compliance, reduce risk, and future-proof your automotive cyber defense.
Chapters:
(00:00) Welcome to Cars, Hackers and Cybersecurity
(00:13) Intro to Connected Car Compliance
(00:23) Digital Transformation and Cyber Risks
(00:48) Overview of UNR 155 & ISO 21434 Regulations
(01:32) Software Vulnerabilities and Emerging Threats
(02:43) Global Cybersecurity Standards and Directives
(09:34) What is a Cybersecurity Management System (CSM)?
(12:53) Challenges in Implementing a CSM
(16:05) PlaxidityX’s Solutions for Automotive Cybersecurity
(17:04) Connected Car Compliance Outro
Contact us:
https://www.linkedin.com/company/plaxidityx/
https://www.youtube.com/@PlaxidityX
contact@plaxidityx.com
Touted as an off-the-shelf solution for key fob programming, a mysterious PSP-like Car Key Registration Device promises to sidestep traditional authorization channels. In this episode, we share how the PlaxidityX team simulated various car responses to test whether the device truly mirrored official protocols. They recount the odd mix of user-friendly design and features like “turn ignition on,” which raise eyebrows for anyone concerned about vehicle theft.
Surprisingly, the device carried a comprehensive database of manufacturer codes, potentially reverse-engineered from legitimate testers. Even more startling was the ease of resetting the gadget once it locked itself, underscoring the supportive network fueling its use in unauthorized contexts. Alongside these alarming observations, the episode highlights that the device’s disclaimers appear designed to deflect responsibility from its creators.
Despite the unsettling findings, there are proven strategies to neutralize the threat. Strengthening firmware, enforcing server-based authentication, and employing more complex vehicle security checks can all limit the device’s impact. The lesson rings clear: even consumer-facing auto repair tools must be scrutinized to protect cars from malicious misuse. In essence, the conversation underscores that automotive cybersecurity demands both technological vigilance and a readiness to adapt.
Chapters:
(00:00) Unpacking an Off-the-Shelf Car Hacking Kit
(02:41) Experimenting with the Off-the-Shelf Car Hacking Kit
(04:40) Challenges and Discoveries
(06:00) Key Registration Process Had Two Stages
(08:38) Conclusions and Safeguards
(09:24) OEMs Can Use To Render This Device Ineffective
(11:07) Outro on PlaxidityX's Research into an Off-the-Shelf Car Hacking Device
Contact us:
https://www.linkedin.com/company/plaxidityx/
https://www.youtube.com/@PlaxidityX
contact@plaxidityx.com
Have you ever wondered how microcontrollers in vehicles manage memory access behind the scenes? This episode sheds light on the Memory Protection Unit, an essential yet sometimes overlooked hardware layer designed to stop unauthorized reads, writes, and execution. We revisit fundamental principles—like differentiating between the Core MPU (CMPU) and the System MPU (SMPU)—and explain how each can become a target for cyber attackers.
Through detailed automotive cyber security case studies involving two newly discovered vulnerabilities, we reveal how a privileged attacker might disable the SMPU entirely. When that happens, carefully drawn security boundaries collapse, exposing critical sections of code and data. The conversation further explores how incomplete hardware locking mechanisms can nullify protective features, leaving devices open to unexpected exploits.
Despite these alarming scenarios, there are proven strategies for mitigating threats. We discuss testing every crucial claim in the datasheet, adopting multiple layers of security, and monitoring vendor errata to stay informed about updated countermeasures. This episode will challenge listeners to question assumptions and take a closer look at an automotive security architecture often assumed to be rock-solid.
Chapters:
(00:00) Introduction to Automotive Memory Protection Units
(01:43) From MMUs to MPUs
(03:08) The MPU: A Modern Day Cyber Sentinel
(05:18) Protection Units in the Automotive Domain
(08:09) Types of MPUs
(08:21) Core MPU (CMPU)
(09:01) System MPU (SMPU)
(09:54) Peripheral Protection Unit (PPU)
(11:54) Some background: The PowerPC architecture
(13:23) The MPU Vulnerabilities
(14:48) The Core MPU and its Limitations
(17:06) The System MPU (SMPU)
(19:38) Configuring the SMPU
(21:50) The SMPU Vulnerability
(23:10) Disclosure to STMicroelectronics
(25:55) Disclosure to NXP
(28:05) MPU Mitigations
(28:55) Concluding remarks
(29:48) Outro on the MPU PlaxidityX Case Study
Contact us:
https://www.linkedin.com/company/plaxidityx/
https://www.youtube.com/@PlaxidityX
contact@plaxidityx.com
This episode explores AI’s transformative role in automotive cyber security. As vehicles become increasingly connected and autonomous, cyber threats have evolved, but AI provides the precision and speed needed to counter these challenges.
Join us as we unpack the critical role of AI in protecting modern vehicles, from anomaly detection to sophisticated threat investigation using generative AI and large language models. Additionally, we discuss the dark side of AI, where attackers use it to create adaptive malware and targeted phishing, raising the stakes for cyber security in the automotive industry. Listeners will discover the power of generative AI (GenAI) and large language models (LLMs) in revolutionizing threat investigations, enabling quick identification of vulnerabilities and predictive analyses of possible attack scenarios. We also cover the benefits of XDR platforms, which integrate AI to offer holistic security for connected vehicle fleets.
Whether you’re in cyber security or the automotive industry, this episode reveals how AI innovations are paving the way for more secure and resilient vehicles. Tune in to discover the latest advancements in AI-driven automotive security and the proactive measures required to stay ahead of evolving cyber threats.
Chapters:
Contact us:
https://www.linkedin.com/company/plaxidityx/
https://www.youtube.com/@PlaxidityX
contact@plaxidityx.com
Intrusion Detection System Managers (IdsM) play a vital role in modern automotive cybersecurity, addressing the challenges posed by complex security events and regulatory requirements. IdsM solutions filter and standardize event data from AUTOSAR and Linux ECUs, reducing inefficiencies in monitoring and analysis.
In this episode, we will explore how challenges related to fragmented formats, limited ECU storage, and escalating data volumes are addressed by IdsM. By filtering irrelevant events locally, these solutions enhance fleet automotive security monitoring while reducing costs.
Join us to discover how PlaxidityX’s IdsM for Linux provides OEMs and Tier 1 suppliers with faster time-to-market, reduced development costs, and an enhanced approach to securing connected vehicles.
Chapters:
(00:00) Introduction to Intrusion Detection in Connected Vehicles
(00:43) Regulatory Challenges & The Need for Security Event Monitoring
(03:36) Introduction to Intrusion Detection System Managers (ITSM)
(05:12) AutoSAR vs. Linux: The Standardization Gap
(06:13) Cross-Platform ITSM Solutions
(07:07) Key Benefits for OEMs & Tier One Suppliers
(08:13) Wrap-Up & Closing Remarks
Contact us:
https://www.linkedin.com/company/plaxidityx/
https://www.youtube.com/@PlaxidityX
contact@plaxidityx.com
The rise of CAN injection car theft has introduced a new level of sophistication to vehicle hacking, allowing thieves to access the CAN bus. In this episode, we discuss how this technique allows hackers to tap into the CAN bus through exposed wiring, sending fake messages that bypass security measures and immobilizers.
The impact of these attacks extends beyond individual car owners, posing significant challenges for automakers in terms of reputational risks and costly recalls. Insurers are also affected, facing increased claims and raising premiums in response.
Stay tuned as we uncover how automakers are fighting back with solutions like Intrusion Detection Systems, enhanced encryption, and real-time fleet monitoring through Vehicle Security Operations Centers. Learn what’s being done to secure vehicles against this new wave of cyber threats and what the future holds for vehicle cyber security.
Chapters:
(00:00) Introduction to CAN Injection Attacks
(00:53) Auto theft has been around as long as automobiles themselves
(01:47) The latest twist is impressive
(02:33) What is a CAN and how is it compromised?
(03:48) “CAN injection” impersonates the smart key
(04:26) CAN injection is a huge problem
(05:10) So how can OEMs fight back?
(07:28) Additional layers of defense to consider
(08:38) Outro on CAN injection theft solutions
Contact us:
https://www.linkedin.com/company/plaxidityx/
https://www.youtube.com/@PlaxidityX
contact@plaxidityx.com
Keyless entry systems, once considered the pinnacle of vehicle convenience, are now a major target for hackers and car thieves. In today’s episode, we’ll explore the vulnerabilities in Remote and Passive Keyless Entry (RKE/PKE) systems, focusing on how replay, relay, and roll jam attacks exploit their weaknesses.
We break down these attack methods, illustrating how hackers bypass rolling codes, exploit weak cryptographic implementations, and outsmart proximity-based systems. We’ll also discuss practical solutions, such as implementing high-entropy cryptographic functions, RSSI localization, motion sensors, and ensuring automotive security compliance.
If you’re curious about OEMs' cyber security advancements and how technology like OTA updates can mitigate vulnerabilities, this episode is a must-listen for understanding the future of car cybersecurity.
Chapters:
(00:00) Introduction to Keyless Entry Systems Security
(01:29) Remote Keyless Entry (RKE) Systems
(01:52) The Replay Attack on the Key Fob
(03:00) The Next Wave of RKE Attacks: The Roll Jam Attack
(04:58) Passive Keyless Entry (PKE) Systems
(05:42) The Relay Attack on the Key Fob
(06:32) Best practices for mitigating relay attacks
(06:36) Mitigation #1: Set upper bound on response time
(07:02) Mitigation #2: Use RSSI to estimate key fob location
(08:12) Mitigation #3: Integrating motion sensor
(08:38) Known Challenge Relay Attack on the Key Fob
(10:18) Secure implementation is the name of the game
(11:52) Outro on Remote/Passive Keyless Entry Systems
Contact us:
https://www.linkedin.com/company/plaxidityx/
https://www.youtube.com/@PlaxidityX
contact@plaxidityx.com
Automotive cybersecurity is becoming increasingly important as electric vehicles face new vulnerabilities. In this episode, we explore a major flaw discovered in the EVerest open-source charging firmware, which could allow attackers to take control of charging stations and potentially compromise vehicles themselves. This vulnerability serves as a stark reminder of the importance of securing EV charging systems as part of the broader electric vehicle infrastructure.
As electric vehicles become more integrated with smart grids and other technologies, their cybersecurity risks grow. Vulnerabilities like this one could have serious implications not only for individual vehicles but also for entire charging networks and infrastructure. We discuss the technical details of the vulnerability, how it could be exploited, and what steps need to be taken to secure these systems.
This episode offers essential information for anyone in the EV manufacturing space, as well as those interested in the cutting-edge developments of automotive cyber defense. Don’t miss this important conversation on protecting electric vehicles and the charging systems that power them from the next generation of cyber threats.
Chapters:
(00:00) Introduction to Critical Vulnerability in EVerest Open-Source EV Charging
(02:03) EV Charging Vulnerability Description
(03:35) What makes this vulnerability unique?
(04:15) Sample public charging station attack scenarios
(05:05) Why EVs May Also Be at Risk from This Vulnerability
(06:20) Important Takeaway for EV Manufacturers
(07:25) Proactive Steps for EV Security
(08:02) Outro for the PlaxidityX Automotive Cybersecurity Podcast
Contact us:
https://www.linkedin.com/company/plaxidityx/
https://www.youtube.com/@PlaxidityX
contact@plaxidityx.com
Automotive networks face an alarming threat: Man-in-the-Middle (MITM) attacks exploiting the SOME/IP protocol. This episode explores how attackers intercept and manipulate communications between ECUs using in-vehicle Ethernet networks, enabling them to falsify data, disrupt services, and compromise safety.
We outline the attack setup, flow, and the devastating impacts on vehicle behavior, from denial of service to user information disclosure. Using real-world examples, we show how attackers exploit vulnerabilities in SOME/IP Service Discovery mechanisms to gain control.
Tune in to learn how proactive automotive cybersecurity measures are shaping the future of connected vehicles and protecting against the growing threat of SOME/IP protocol hijacks.
Chapters:
(00:00) Introduction to MitM Attacks on SOME/IP Protocol
(01:44) Background to SOME/IP and Service Discovery
(02:51) Reference Attack Setup
(03:24) MitM Attack Flow
(05:30) Attack Mitigation
(06:44) The Role of the SOME\IP in the E/E Architecture
(08:08) Outro of MitM Attacks on SOME/IP Protocol Episode
Contact us:
https://www.linkedin.com/company/plaxidityx/
https://www.youtube.com/@PlaxidityX
contact@plaxidityx.com
In this episode, we explore how industry leaders PlaxidityX, CyberArk, Device Authority, and Microsoft have joined forces to pioneer the next generation of automotive and mobility security solutions. With new regulatory mandates like UNECE WP.29 and ISO 21434 on the horizon, the automotive industry requires a holistic approach to securing vehicles across their lifecycle.
This collaboration integrates technologies like GitHub Copilot and Azure OpenAI Security Copilot to provide end-to-end security. From comprehensive threat detection to lifecycle posture management, the solution addresses every aspect of automotive cybersecurity.
Tune in to discover how this partnership is driving innovation, ensuring compliance, and safeguarding data across connected cars, cloud environments, and beyond.
Chapters:
(00:00) Industry Leaders Unite to Pioneer Next-Generation Automotive and Mobility Security Solution
(01:55) Key Areas of Automotive Collaboration and Innovation
(03:41) Key Components of the Mobility Security Solution
(07:52) What’s Next in The Complexities of the Automotive Industry
(08:21) Outro on Innovative Vehicle Collaboration
Contact us:
https://www.linkedin.com/company/plaxidityx/
https://www.youtube.com/@PlaxidityX
contact@plaxidityx.com
The motorcycle industry is facing a new challenge: automotive cybersecurity. This episode explores how UNR 155, initially designed for passenger vehicles, now includes motorcycles, scooters, and high-speed e-bikes. We’ll discuss what this regulation means, why it’s happening, and how it could reshape the two-wheeler market as manufacturers scramble to comply with new cybersecurity standards.
Cybersecurity for two-wheelers involves establishing a Cyber Security Management System (CSMS) and passing a type approval audit, similar to processes seen in four-wheeler OEMs. These requirements are meant to secure safety-critical systems and protect personal data, preventing the potentially life-threatening consequences of cyber-attacks on connected vehicles.
Tune in to understand how these regulations affect two-wheeler manufacturers and learn about the necessary steps for compliance. From new manufacturing processes to retrofitting older models, this episode gives insight into the future of secure motorcycling.
Chapters:
(00:00) Intro to Cyber Security Regulation is Coming to Two-Wheelers
(01:24) Why Do Vehicles Need Cyber Security?
(03:07) Understanding the Regulatory Landscape
(06:01) Implications of Regulatory Compliance for Motorcycle OEMs
(07:09) Bottom Line on UNR 155 to Motorcycles
(07:50) Outro on Cyber-security for Two-wheelers
Contact us:
https://www.linkedin.com/company/plaxidityx/
https://www.youtube.com/@PlaxidityX
contact@plaxidityx.com