Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Automotive

Russian Threat Actor FIN7 Targeting the Automotive Industry with Spear Phishing Attacks

The cybercriminal threat actor FIN7 is launching spear phishing attacks against the automotive industry in the United States, according to researchers at BlackBerry. The threat actor identifies IT employees at automotive companies and attempts to trick them into downloading a Trojanized version of a free IP scanning tool. FIN7 is a Russia-based financially motivated threat actor that carries out a variety of cybercrime activities, including ransomware attacks.

How Secure is Automotive Digital Identity?

In the automotive industry’s fast lane, the fusion of digital innovation with vehicular engineering has revolutionized how we manufacture, drive and protect our vehicles. It also helps to ensure our cars are safeguarded against cyber risks. And it’s at this juncture that identity security emerges as a critical priority – serving as both a shield and a guide, leading the industry through the complexities of cybersecurity in automotive challenges with unmatched precision.

EP 48 - What's Driving the Future of Automotive Security

In this episode of the Trust Issues podcast, Kaivan Karimi, Global Partner Strategy and OT Cybersecurity Lead – Automotive Mobility and Transportation at Microsoft, discusses with host David Puner the complexities of the automotive cybersecurity ecosystem, and they explore the challenges and considerations facing the industry.

Cybersecurity in automotive - why automotive companies should consider a DevOps backup for Jira, GitLab, GitHub, and Bitbucket

Remember when you were a child and drew a car with wheels and a body? At most, you added headlights? Imagine today’s drawing. Cars are not run by engines and gears anymore. What lets them onto the road are complex electronics and IT systems. Just to mention live tracking, remote start and stop, remote access, infotainment, temperature control, maintenance scheduling, and autonomous driving capabilities. Cars are now computers on wheels.

The Rise of Automotive Hacking

The automotive industry stands at the crossroads of innovation and vulnerability. As cars become increasingly connected, with advanced systems and features that rely on intricate software, the rise of automotive hacking has become a pressing concern. The convergence of traditional mechanical engineering and cutting-edge software has given rise to a new breed of threats that extend beyond physical security, delving into the digital realm of vehicle control systems.

How Self-Learning AI Has Helped CARIAD Build An Automotive Software Powerhouse

CARIAD has been building one unified software platform for all Volkswagen brands to provide them with reliable software and digital best practices. In recent years, CARIAD and the rest of the automotive software sector faced extensive industry regulation and an array of dangerous and costly vulnerabilities. By introducing feedback-based fuzzing, an advanced white-box testing method that uses self-learning AI to uncover deeply hidden bugs and security vulnerabilities, CARIAD was able to find and fix potentially dangerous issues early in the development process.

Automotive Industry stalling ahead of 2024's new vehicle safety regulations

With the United Nations Economic Commission for Europe World Forum for Harmonisation of Vehicle Regulations (UNECE WP.29) framework coming into effect in July 2024, leaders across the Automotive sector are apparently ‘swamped’ by the volume of compliance and security risks that need to be addressed to protect drivers in all types of connected or autonomous vehicles.

Connected Cars, Exposed Systems: The Cybersecurity Challenges of IVI Platforms

As our company Komodo Consulting is researching this exciting field of interest, we have prepared a short analysis of some of the exploitable attack vectors. In the era of smart vehicles, In-Vehicle Infotainment (IVI) systems have become central to enhancing the driving experience. However, with increased connectivity comes heightened cybersecurity risks.