Is ISO 15118 Enough to Secure EV Charging?
October 8, 2025While ISO 15118 promises smarter, more secure electric vehicle (EV) charging, it also introduces new risks. Discover what it takes to secure EV charging in our latest research.
VicOneWhen a Cyber Incident Halts an Automaker: A Wake-Up Call for Supply Chain Security
September 26, 2025We examine the Jaguar Land Rover cyber incident, emphasizing how the automotive industry can defend against similar supply chain attacks.
Ziv ChangRedefining Risk: Why Cybersecurity is Critical in Auto Insurance
September 19, 2025This blog offers key insights from our latest research paper, “Insuring the Future of Mobility”, highlighting why cybersecurity is the essential yet often overlooked element in the evolving automotive insurance industry.
VicOneFrom Fob to Phone: How CCC Digital Key 4.0 Shapes Automotive Cybersecurity
September 12, 2025The recently announced CCC Digital Key 4.0 marks a pivotal step in balancing innovation and security for connected vehicles. We explore its new features, broader trends, and its impacts on automotive cybersecurity.
CyberThreat Research LabInside the 2025 Global Vehicle CyberChallenge: Training the Next Generation of Defenders
September 10, 2025From August 22 to September 1, VicOne and Block Harbor co-hosted the 2025 Global Vehicle Cybersecurity Competition (VCC), bringing together nearly 500 individuals of all skill levels, pursuing careers in automotive cybersecurity from around the world.
VicOneSecuring Smart Transit: Lessons from a DEF CON Bus Hacking Demo
September 5, 2025A bus hacking demo revealed how attackers could use a bus’s guest Wi-Fi to access and compromise critical systems, underscoring the need for stronger automotive cybersecurity in smart transit systems.
CyberThreat Research LabAgentic AI Is Coming to Your Car. Is Your Edge Ready to Defend It?
September 3, 2025In our previous analysis, we argued that GenAI isn’t just a tool, it’s a living risk embedded in your automotive supply chain. We highlighted how AI models introduce unseen, evolving security risks at every stage of the AI lifecycle. But as the industry shifts toward GenAI-enabled, software-defined vehicles (SDVs), another powerful technology is rising fast—Agentic AI.
VicOneMapping the Connected Car’s Attack Surface: An OSINT Framework for Automotive Threat Intelligence
August 28, 2025In this blog, we present a systematic OSINT-driven methodology, one that aligns with the Auto-ISAC Automotive Threat Matrix (ATM) and is tailored for automotive threat intelligence. This approach enables security researchers and car manufacturers to map the continually expanding attack surface of connected vehicles.
CyberThreat Research LabElectric Vehicle Charger Security Risks: How Vulnerabilities Could Lead to Fire Hazards
August 26, 2025At Black Hat USA 2025, security researchers revealed how vulnerabilities in EV chargers could cause charging cables to overheat and burst into flames. Their findings underscore the urgent need for stronger safeguards and hardware protection to ensure the safety of these devices.
CyberThreat Research LabThe Living Risk Hiding in Automotive Supply Chain: GenAI Model Security Risks
August 13, 2025As GenAI becomes deeply embedded in automotive systems, it introduces not just new functionality but a new category of living, evolving supply chain risk.
VicOneFrom Pwn2Own Automotive 2025: Unpacking the Tesla Wall Connector Exploit Chain and Its Broader Cybersecurity Implication
August 5, 2025We analyze the exploit chain used against the Tesla Wall Connector EV charger at Pwn2Own Automotive 2025, mapping it to the Automotive Threat Matrix and exploring its broader implications for automotive cybersecurity.
CyberThreat Research LabPhishing Beyond Emails: How Compromised Installers Threaten Automotive Software Supply Chains
July 23, 2025We examine how a signed Windows installer was used to deploy Redline Stealer malware, successfully bypassing traditional defenses. The incident reveals critical blind spots in automotive cybersecurity and highlights the need for zero-trust principles across the entire software supply chain.
CyberThreat Research Lab