Pioneering the Future of Automotive Cybersecurity With Unparalleled Automotive Threat Intelligence
June 11, 2024VicOne has partnered with the Automotive Security Research Group (ASRG) to launch AutoVulnDB, an innovative database focused on automotive vulnerabilities. This initiative provides exceptional coverage of automotive threat intelligence, establishing VicOne as the industry leader in comprehensive vulnerability management.
VicOneFrom Key Fob to UWB: How Hackers Hijack Vehicle Entry Systems
June 7, 2024In this first installment, we examine the history of automotive entry technology and explore notable types of security breaches such as replay attacks, rolling attacks, and relay attacks.
CyberThreat Research LabHow Malicious Apps in Connected Vehicles Could Lead to Heightened Risks
May 28, 2024Apps play a significant role in enhancing the functionality and driving the evolution of software-defined vehicles (SDVs). However, their integration also introduces new risks, as we explore in this blog entry.
CyberThreat Research LabWhy the Rust Programming Language Is Not a Silver Bullet for Automotive Security
May 17, 2024Rust, a memory-safe programming language, is gaining traction as it is designed to address memory-related vulnerabilities. We discuss its potential impact on automotive cybersecurity.
CyberThreat Research LabHarnessing Python and ChatGPT for Automotive Security Research
May 6, 2024A VicOne researcher demonstrates how automotive security researchers can take advantage of Python and ChatGPT, especially in scripting proofs of concept of known attacks and exploring novel vulnerabilities in automotive systems.
CyberThreat Research LabQuantum Computing: Forging New Frontiers for Autonomous Vehicles
April 15, 2024In celebration of World Quantum Day on April 14, we discuss how quantum computing can further improve advanced driver assistance systems (ADASs) and the risks associated with this disruptive technology.
Ziv ChangOpen RAN: A Gateway to Improved V2X Communications and to New Security Risks
April 12, 2024Open RAN is said to usher advances in V2X communications for connected vehicles. Researchers have taken a closer look at this technology to see where vulnerabilities might slip through amid its anticipated advantages.
CyberThreat Research LabUnderstanding the Impact of NIST IR 8473 on EV Charging Infrastructure Security
April 8, 2024The NIST IR 8473 cybersecurity framework profile marks a shift in scope from individual chargers to the entire charging infrastructure. This expanded scope suggests that electric vehicle supply equipment manufacturers and charge point operators need to consider cybersecurity from an industry-level risk-based approach rather than focusing solely on individual IoT devices.
VicOneUnlocking the Power of Edge Intelligence to Rev Up Automotive Defense
April 3, 2024By utilizing the BlackBerry IVY connected vehicle data platform, VicOne enables AI-empowered threat detections at the edge, cloud-controlled access to vehicle data, and response to potential cyberattacks on software-defined vehicles (SDVs).
VicOneGenerative AI for Good: Utilizing AI and LLMs to Accelerate Dynamic Cybersecurity Risk Assessment in SDVs
April 1, 2024By harnessing the power of AI and large language models (LLMs), VicOne effectively addresses common challenges encountered during cybersecurity risk assessment in the automotive industry — ensuring proactive and adaptive measures are in place to safeguard software-defined vehicles (SDVs) and critical systems against evolving threats.
VicOneAdvancing Automotive Cybersecurity Through Zero Trust Architecture
March 15, 2024Adopting zero trust principles in the automotive industry not only fortifies connected vehicles against evolving cyberthreats but also enhances the resilience and security of the entire automotive supply chain.
VicOneHow a Credential Phishing Attack Could Lead to Tesla Car Theft and How to Mitigate It
March 13, 2024The automotive industry has entered an era when cyberattacks and social engineering tactics can have direct consequences on connected vehicles. Researchers have demonstrated another such scenario, involving a man-in-the-middle (MITM) credential phishing attack on a Tesla car. We share our security insights and solution recommendations.
VicOne