Couverture de Automotive Extortion Goes Upstream: Protecting the New Vehicle Perimeter

Automotive Extortion Goes Upstream: Protecting the New Vehicle Perimeter

Automotive Extortion Goes Upstream: Protecting the New Vehicle Perimeter

Écouter gratuitement

Voir les détails

À propos de ce contenu audio

In this new episode of Cybersecurity Under Pressure: Real Attacks, Real Lessons, hosts Sarah and Alex dissect the structural shift in automotive cyber threats. Moving past the outdated CAN bus hacking narrative, they explore how extortion crews are now targeting cloud services, APIs, and CI/CD pipelines to hold fleets hostage. Listen in for a rigorous breakdown of how to secure the update chain with HSM-backed keys, and how to leverage ISO/SAE 21434 and UNECE R155/156 to enforce safety-grade supply chain defense.

Aucun commentaire pour le moment