Folgen

  • AI A Double-Edged Sword for Automotive Cybersecurity - PlaxidityX Ep 26
    Jul 28 2025

    As artificial intelligence becomes an integral part of the automotive ecosystem, its dual nature-both as a powerful security tool and a potential attack vector-demands urgent attention. In this episode of Cars, Hackers, and Cyber Security, we explore how AI is reshaping the threat landscape for connected and autonomous vehicles.

    Drawing from insights from our blog How AI Is Reshaping Automotive Cybersecurity, we examine real-world use cases where AI strengthens detection, response, and compliance-and where it introduces new vulnerabilities. From automated threat modeling and deepfake firmware attacks to ethical dilemmas and evolving regulations, we unpack the complexities facing automakers and suppliers worldwide.

    Discover how PlaxidityX is enabling manufacturers to leverage AI responsibly, aligning advanced analytics with UN R155 compliance, and reducing risk in increasingly complex supply chains.

    Chapters:
    00:00 Welcome & Episode Overview
    01:10 How AI Is Transforming Cybersecurity in Automotive
    04:00 AI as a Security Enabler: Detection, Prediction & Automation
    07:15 AI as a Risk: Adversarial Attacks, Data Poisoning & Manipulation
    10:00 Regulatory and Compliance Implications (UN R155, ISO 21434)
    12:30 PlaxidityX Solutions: Responsible AI for Secure Development
    14:30 Final Takeaways & Call to Action

    Mehr anzeigen Weniger anzeigen
    16 Min.
  • Mastering Automotive Cybersecurity Compliance: Integrated Strategies - PlaxidityX Ep 25
    Jul 15 2025

    As cybersecurity regulations tighten across the automotive industry, OEMs and suppliers are under growing pressure to not only build secure vehicles but also prove compliance across their entire software and hardware stack.

    In this episode of Cars, Hackers, and Cyber Security, we explore the key strategies for mastering compliance with global automotive cybersecurity standards such as UN R155 and ISO/SAE 21434. We explore the tools, processes, and organizational shifts needed to manage complex supplier ecosystems, validate software origins, and mitigate risks before they become liabilities.

    Learn how automakers are integrating threat analysis, software bill of materials (SBOM) scanning, and third-party audits into their development lifecycles. Hear how compliance is evolving from a checkbox to a continuous, proactive discipline-and why this shift is critical for future-proofing both innovation and regulation.

    Chapters:
    00:00 Introduction
    02:30 The Role of Global Standards (UN R155, ISO/SAE 21434)
    06:15 Building a Risk-Aware Development Process
    10:40 What SBOMs Really Mean for OEMs
    14:20 Managing Third-Party Software and Supply Chain Visibility
    18:00 Leveraging Automation and AI in Compliance
    22:10 From Reactive to Proactive: Building Compliance Culture
    26:00 Final Takeaways

    🔗 Links & Resources:
    PlaxidityX on LinkedIn
    Subscribe on YouTube
    Contact Us

    Mehr anzeigen Weniger anzeigen
    28 Min.
  • Auto Tech at a Crossroads: Navigating the U.S. Ban on Foreign Vehicle Systems – PlaxidityX Ep 24
    Jul 3 2025

    As today’s vehicles evolve into software-defined data hubs, concerns over national security have extended deep into automotive supply chains. In this episode of Cars, Hackers, and Cyber Security, we unpack the U.S. government’s sweeping new ban on connected vehicle systems originating from China and Russia-and what it means for automakers, suppliers, and consumers worldwide.

    Drawing from The Auto Tech War: U.S. Ban on China and Russia Leaves Industry Scrambling by Durga Adusumilli, we explore the motivations behind the policy, the massive compliance challenges it imposes, and how the global auto industry is reacting. From surveillance risks and remote vehicle hijacking to complex software supply chains and legal ambiguity, we break down the intersection of geopolitics, cybersecurity, and automotive innovation.

    Discover what makes firmware and open-source software exempt, why declarations of conformity are becoming mandatory, and how companies like PlaxidityX are stepping up with cutting-edge solutions to navigate the complexity.


    Chapters:
    00:00 Welcome & Episode Overview
    01:15 Why the U.S. Government Is Cracking Down
    03:40 The Scope of the Ban: VCS & ADS Systems
    06:05 Supply Chain Challenges & Compliance Chaos
    09:30 Exceptions, Loopholes & Ownership Dilemmas
    13:00 Due Diligence, SBOMs & IP Protection
    17:45 Timeline Pressures & Industry Reactions
    20:00 How Technology Is Enabling Compliance
    23:05 Implications Beyond the Automotive Sector
    26:30 Final Takeaways & Call to Action

    Contact us:
    https://www.linkedin.com/company/plaxidityx/

    https://www.youtube.com/@PlaxidityX

    https://plaxidityx.com/company/contact/

    Mehr anzeigen Weniger anzeigen
    15 Min.
  • Navigating Automotive Software Security and Regulation- PlaxidityX Ep 23
    Jun 19 2025

    As automotive software grows increasingly complex, navigating security and regulatory requirements has become an essential challenge for manufacturers. Today's vehicles, driven by software-defined systems and connected services, must comply with stringent standards while defending against evolving cyber threats.

    In this episode, we delve deeply into the critical intersection of automotive software security and industry regulations. We explore how automakers and Tier 1 suppliers can manage complex regulatory landscapes like UN Regulation 155 (R155) and ISO 21434, which mandate cybersecurity throughout the vehicle lifecycle-from design through production and post-production. The integration of numerous software stacks within a single vehicle opens avenues for vulnerabilities that attackers can exploit, highlighting the need for rigorous compliance and robust cybersecurity practices.

    Join us to discover essential insights into adopting secure software development frameworks, implementing rigorous Threat Analysis and Risk Assessment (TARA) processes, and maintaining compliance in a rapidly shifting regulatory environment. Learn how cutting-edge practices such as continuous vulnerability monitoring and Vehicle Security Operations Centers (VSOCs) are becoming standard to protect vehicles against emerging threats.

    Chapters:
    00:00 Introduction to Automotive Software Security
    00:18 The Evolving Automotive Software Landscape
    01:12 Key Regulatory Standards: UN R155 and ISO 21434
    03:45 Challenges in Automotive Software Compliance
    06:23 Vulnerabilities in Modern Vehicle Software Systems
    09:05 Practical Strategies for Compliance and Security
    16:40 Implementing Continuous Monitoring and VSOCs
    20:15 Future Directions in Automotive Regulation and Security
    21:30 Conclusion and Key Takeaways

    Contact us:
    https://www.linkedin.com/company/plaxidityx/

    https://www.youtube.com/@PlaxidityX

    https://plaxidityx.com/company/contact/

    Mehr anzeigen Weniger anzeigen
    19 Min.
  • Automotive HPC Security Challenges and Solutions - Ep 22
    May 27 2025

    With next-generation vehicles rapidly transforming into software-defined platforms powered by High-Performance Computers (HPCs), the approach to automotive security is fundamentally changing. These powerful central processors are critical for everything from infotainment to autonomous driving, but their consolidation also creates a significant single point of failure and a vastly expanded attack surface.

    In this briefing, we unpack the unique cybersecurity challenges presented by automotive HPCs. We'll explore how these systems manage mixed-criticality functions, the inherent risks of integrating diverse software on a single SoC, and the evolving threat landscape that includes everything from connectivity exploits to supply chain vulnerabilities. Imagine an attacker escalating privileges from a non-critical app to seize control of safety systems – the stakes couldn't be higher.

    Join us to understand the essential defense-in-depth strategies for securing these complex automotive brains, from implementing Hardware Security Modules (HSMs) and Trusted Execution Environments (TEEs) to adopting rigorous Threat Analysis and Risk Assessment (TARA) methodologies and real-time VSOC monitoring. As regulations like UN R155 and standards such as ISO 21434 mandate robust cybersecurity, it’s no longer optional to embed security from the design phase onwards.


    Chapters:
    00:00 Introduction to Automotive Cybersecurity
    00:15 Evolution of Car Electronics
    00:33 The Shift to Centralized High-Performance Computers (HPCs)
    01:31 Challenges of Centralized Computing in Cars
    03:26 Understanding Automotive HPCs
    05:12 Security Risks in Modern Vehicles
    09:57 Strategies for Securing Automotive HPCs
    20:19 Future Trends in Automotive Cybersecurity
    21:18 Conclusion and Further Resources


    Contact us:
    https://www.linkedin.com/company/plaxidityx/
    https://www.youtube.com/@PlaxidityX
    contact@plaxidityx.com

    Mehr anzeigen Weniger anzeigen
    22 Min.
  • Inside the Truck Cyber Threat – PlaxidityX Ep 21
    Apr 21 2025

    With cyber attacks on trucks becoming more common and costly, fleet operators and OEMs must rethink how they protect their vehicle security and data privacy. Trucks are no longer isolated units, they're part of a larger, interconnected automotive ecosystem vulnerable to disruption.

    In this episode, we unpack the threats, explore real-world hacking scenarios, and dive into actionable cybersecurity strategies for truck manufacturers. The financial and operational stakes are sky-high, especially when trucks are transporting valuable or perishable cargo. We break down the dangers of a hacked ELD, the threats to critical systems like braking, and the growing risks of data theft.

    Join us to discover how truck manufacturers can implement a security-by-design approach, from early TARA assessments to real-time VSOC monitoring. It's time to stop treating automotive cybersecurity as an afterthought in the transportation industry.

    Chapters:
    (00:00) - Intro: Welcome to Cars, Hackers & Cybersecurity
    (00:13) - Truck Cybersecurity: Combating Threats on the Open Road
    (01:23) - Cyber attacks on trucks carry a hefty price tag
    (02:40) - Broader attack surface than connected cars
    (03:27) - The Dangers of a Truck Hack
    (04:53) - Hacking a Truck’s Electronic Logging Device (ELD)
    (05:30) - Cybersecurity Steps Commercial Truck Manufacturers Should Consider
    (06:21) - Implement security by design
    (07:02) - Embed in-vehicle IDPS protection
    (07:44) - Perform penetration tests to find and address weaknesses
    (08:15) - Scan for vulnerabilities
    (08:50) - Set up a VSOC to monitor and protect the entire fleet
    (09:25) - Outro: See You Next Time on Cars, Hackers & Cybersecurity

    Contact us:
    https://www.linkedin.com/company/plaxidityx/
    https://www.youtube.com/@PlaxidityX
    contact@plaxidityx.com

    Mehr anzeigen Weniger anzeigen
    10 Min.
  • Digital Car Theft: How Hackers Steal in Seconds – PlaxidityX Ep 20
    Apr 8 2025

    In this episode, we explore the shift from traditional theft to a new era of digital car theft. Instead of smashing windows, today’s criminals launch automotive cyber-attacks that bypass immobilizers, unlock doors, and hijack control systems, all without leaving a trace.

    From CAN bus vulnerabilities to cloned key fobs, cybercriminals are finding new attack vectors faster than manufacturers can plug the gaps. As a result, theft rates are soaring and entire automotive cyber security ecosystems—from fleets to insurers—are feeling the financial and operational pain.

    We’ll discuss what’s being done to fight back, including the critical role of aftermarket AI-powered protection. Learn why OEMs are struggling, why the insurance market is shifting, and why AI-powered anti-theft protection solutions like vDome by PlaxidityX essential for any modern vehicle on the road today. This isn’t just car cyber-attack prevention—it’s a whole new era of proactive vehicle protection.

    Chapters
    (00:00) - Intro: Welcome to Cars, Hackers & Cybersecurity
    (00:12) - Real-World Example: Your Car is Gone
    (01:00) - Car Theft Overview: From Hotwiring to Hacking
    (01:55) - Car Theft Has Reached Epidemic Levels
    (02:25) - Wreaking Havoc with the Entire Automotive Ecosystem
    (03:52) - Cyber-Enabled Car Theft Techniques
    (05:45) - How to Address the Car Theft Problem
    (07:21) - How To Protect Vehicles Already on the Road: The Need for Aftermarket Protection
    (08:55) - How Plaxidity X (formally Argus) Can Help
    (09:37) - Outro: Stay Safe on the Road and in the Cloud

    Contact us:
    https://www.linkedin.com/company/plaxidityx/
    https://www.youtube.com/@PlaxidityX
    contact@plaxidityx.com

    Mehr anzeigen Weniger anzeigen
    10 Min.
  • Dynamic SBOM for Smarter Vehicle Security – PlaxidityX Ep 19
    Mar 9 2025

    In this episode, we discuss the groundbreaking concept of Dynamic SBOM and its role in modern automotive software security. Hear how real-time monitoring of third-party library usage can lead to more precise vulnerability management. We explain the process behind intercepting dynamic calls and replacing them with breakpoints for live analysis.

    Discover how the technology replaces traditional code analysis methods to offer a live, actionable vehicle security view. We break down the technical aspects of Dynamic SBOM, discussing how it works by intercepting dynamic library calls using breakpoints. Understand the difference between repetitive call logging in ltrace and the efficient, one-time capture in Dynamic SBOM. This precision leads to more effective vulnerability prioritization.

    Our discussion also covers the integration of Dynamic SBOM with static analysis techniques, enhancing overall security. We highlight key considerations and best practices for maximizing monitoring coverage. Listen now to learn how to revolutionize your software security with these innovative insights.

    Chapters:
    (00:00) Welcome to Cars, Hackers and Cybersecurity
    (00:00:12) Dynamic SBOM Overview
    (00:00:21) What Is SBOM & Its Importance
    (00:00:48) Static vs. Dynamic SBOM Comparison
    (00:01:13) Benefits of Real-Time Monitoring
    (00:02:24) How Dynamic SBOM Works
    (00:02:46) Key Considerations & Dynamic SBOM vs. ltrace
    (00:03:33) DSBOM Complementing Static Analysis
    (00:04:24) Coverage, Testing & Effectiveness
    (00:05:16) Interpreting Library Usage & Vulnerability Mitigation
    (00:06:09) Conclusion: Dynamic SBOM in Action
    (00:07:16) Episode Wrap-Up & Sign Off

    Contact us:
    https://www.linkedin.com/company/plaxidityx/
    https://www.youtube.com/@PlaxidityX
    contact@plaxidityx.com

    Mehr anzeigen Weniger anzeigen
    8 Min.