Épisodes

  • Auto Tech at a Crossroads: Navigating the U.S. Ban on Foreign Vehicle Systems – PlaxidityX Ep 24
    Jul 3 2025

    As today’s vehicles evolve into software-defined data hubs, concerns over national security have extended deep into automotive supply chains. In this episode of Cars, Hackers, and Cyber Security, we unpack the U.S. government’s sweeping new ban on connected vehicle systems originating from China and Russia-and what it means for automakers, suppliers, and consumers worldwide.

    Drawing from The Auto Tech War: U.S. Ban on China and Russia Leaves Industry Scrambling by Durga Adusumilli, we explore the motivations behind the policy, the massive compliance challenges it imposes, and how the global auto industry is reacting. From surveillance risks and remote vehicle hijacking to complex software supply chains and legal ambiguity, we break down the intersection of geopolitics, cybersecurity, and automotive innovation.

    Discover what makes firmware and open-source software exempt, why declarations of conformity are becoming mandatory, and how companies like PlaxidityX are stepping up with cutting-edge solutions to navigate the complexity.


    Chapters:
    00:00 Welcome & Episode Overview
    01:15 Why the U.S. Government Is Cracking Down
    03:40 The Scope of the Ban: VCS & ADS Systems
    06:05 Supply Chain Challenges & Compliance Chaos
    09:30 Exceptions, Loopholes & Ownership Dilemmas
    13:00 Due Diligence, SBOMs & IP Protection
    17:45 Timeline Pressures & Industry Reactions
    20:00 How Technology Is Enabling Compliance
    23:05 Implications Beyond the Automotive Sector
    26:30 Final Takeaways & Call to Action

    Contact us:
    https://www.linkedin.com/company/plaxidityx/

    https://www.youtube.com/@PlaxidityX

    https://plaxidityx.com/company/contact/

    Voir plus Voir moins
    15 min
  • Navigating Automotive Software Security and Regulation- PlaxidityX Ep 23
    Jun 19 2025

    As automotive software grows increasingly complex, navigating security and regulatory requirements has become an essential challenge for manufacturers. Today's vehicles, driven by software-defined systems and connected services, must comply with stringent standards while defending against evolving cyber threats.

    In this episode, we delve deeply into the critical intersection of automotive software security and industry regulations. We explore how automakers and Tier 1 suppliers can manage complex regulatory landscapes like UN Regulation 155 (R155) and ISO 21434, which mandate cybersecurity throughout the vehicle lifecycle-from design through production and post-production. The integration of numerous software stacks within a single vehicle opens avenues for vulnerabilities that attackers can exploit, highlighting the need for rigorous compliance and robust cybersecurity practices.

    Join us to discover essential insights into adopting secure software development frameworks, implementing rigorous Threat Analysis and Risk Assessment (TARA) processes, and maintaining compliance in a rapidly shifting regulatory environment. Learn how cutting-edge practices such as continuous vulnerability monitoring and Vehicle Security Operations Centers (VSOCs) are becoming standard to protect vehicles against emerging threats.

    Chapters:
    00:00 Introduction to Automotive Software Security
    00:18 The Evolving Automotive Software Landscape
    01:12 Key Regulatory Standards: UN R155 and ISO 21434
    03:45 Challenges in Automotive Software Compliance
    06:23 Vulnerabilities in Modern Vehicle Software Systems
    09:05 Practical Strategies for Compliance and Security
    16:40 Implementing Continuous Monitoring and VSOCs
    20:15 Future Directions in Automotive Regulation and Security
    21:30 Conclusion and Key Takeaways

    Contact us:
    https://www.linkedin.com/company/plaxidityx/

    https://www.youtube.com/@PlaxidityX

    https://plaxidityx.com/company/contact/

    Voir plus Voir moins
    19 min
  • Automotive HPC Security Challenges and Solutions - Ep 22
    May 27 2025

    With next-generation vehicles rapidly transforming into software-defined platforms powered by High-Performance Computers (HPCs), the approach to automotive security is fundamentally changing. These powerful central processors are critical for everything from infotainment to autonomous driving, but their consolidation also creates a significant single point of failure and a vastly expanded attack surface.

    In this briefing, we unpack the unique cybersecurity challenges presented by automotive HPCs. We'll explore how these systems manage mixed-criticality functions, the inherent risks of integrating diverse software on a single SoC, and the evolving threat landscape that includes everything from connectivity exploits to supply chain vulnerabilities. Imagine an attacker escalating privileges from a non-critical app to seize control of safety systems – the stakes couldn't be higher.

    Join us to understand the essential defense-in-depth strategies for securing these complex automotive brains, from implementing Hardware Security Modules (HSMs) and Trusted Execution Environments (TEEs) to adopting rigorous Threat Analysis and Risk Assessment (TARA) methodologies and real-time VSOC monitoring. As regulations like UN R155 and standards such as ISO 21434 mandate robust cybersecurity, it’s no longer optional to embed security from the design phase onwards.


    Chapters:
    00:00 Introduction to Automotive Cybersecurity
    00:15 Evolution of Car Electronics
    00:33 The Shift to Centralized High-Performance Computers (HPCs)
    01:31 Challenges of Centralized Computing in Cars
    03:26 Understanding Automotive HPCs
    05:12 Security Risks in Modern Vehicles
    09:57 Strategies for Securing Automotive HPCs
    20:19 Future Trends in Automotive Cybersecurity
    21:18 Conclusion and Further Resources


    Contact us:
    https://www.linkedin.com/company/plaxidityx/
    https://www.youtube.com/@PlaxidityX
    contact@plaxidityx.com

    Voir plus Voir moins
    22 min
  • Inside the Truck Cyber Threat – PlaxidityX Ep 21
    Apr 21 2025

    With cyber attacks on trucks becoming more common and costly, fleet operators and OEMs must rethink how they protect their vehicle security and data privacy. Trucks are no longer isolated units, they're part of a larger, interconnected automotive ecosystem vulnerable to disruption.

    In this episode, we unpack the threats, explore real-world hacking scenarios, and dive into actionable cybersecurity strategies for truck manufacturers. The financial and operational stakes are sky-high, especially when trucks are transporting valuable or perishable cargo. We break down the dangers of a hacked ELD, the threats to critical systems like braking, and the growing risks of data theft.

    Join us to discover how truck manufacturers can implement a security-by-design approach, from early TARA assessments to real-time VSOC monitoring. It's time to stop treating automotive cybersecurity as an afterthought in the transportation industry.

    Chapters:
    (00:00) - Intro: Welcome to Cars, Hackers & Cybersecurity
    (00:13) - Truck Cybersecurity: Combating Threats on the Open Road
    (01:23) - Cyber attacks on trucks carry a hefty price tag
    (02:40) - Broader attack surface than connected cars
    (03:27) - The Dangers of a Truck Hack
    (04:53) - Hacking a Truck’s Electronic Logging Device (ELD)
    (05:30) - Cybersecurity Steps Commercial Truck Manufacturers Should Consider
    (06:21) - Implement security by design
    (07:02) - Embed in-vehicle IDPS protection
    (07:44) - Perform penetration tests to find and address weaknesses
    (08:15) - Scan for vulnerabilities
    (08:50) - Set up a VSOC to monitor and protect the entire fleet
    (09:25) - Outro: See You Next Time on Cars, Hackers & Cybersecurity

    Contact us:
    https://www.linkedin.com/company/plaxidityx/
    https://www.youtube.com/@PlaxidityX
    contact@plaxidityx.com

    Voir plus Voir moins
    10 min
  • Digital Car Theft: How Hackers Steal in Seconds – PlaxidityX Ep 20
    Apr 8 2025

    In this episode, we explore the shift from traditional theft to a new era of digital car theft. Instead of smashing windows, today’s criminals launch automotive cyber-attacks that bypass immobilizers, unlock doors, and hijack control systems, all without leaving a trace.

    From CAN bus vulnerabilities to cloned key fobs, cybercriminals are finding new attack vectors faster than manufacturers can plug the gaps. As a result, theft rates are soaring and entire automotive cyber security ecosystems—from fleets to insurers—are feeling the financial and operational pain.

    We’ll discuss what’s being done to fight back, including the critical role of aftermarket AI-powered protection. Learn why OEMs are struggling, why the insurance market is shifting, and why AI-powered anti-theft protection solutions like vDome by PlaxidityX essential for any modern vehicle on the road today. This isn’t just car cyber-attack prevention—it’s a whole new era of proactive vehicle protection.

    Chapters
    (00:00) - Intro: Welcome to Cars, Hackers & Cybersecurity
    (00:12) - Real-World Example: Your Car is Gone
    (01:00) - Car Theft Overview: From Hotwiring to Hacking
    (01:55) - Car Theft Has Reached Epidemic Levels
    (02:25) - Wreaking Havoc with the Entire Automotive Ecosystem
    (03:52) - Cyber-Enabled Car Theft Techniques
    (05:45) - How to Address the Car Theft Problem
    (07:21) - How To Protect Vehicles Already on the Road: The Need for Aftermarket Protection
    (08:55) - How Plaxidity X (formally Argus) Can Help
    (09:37) - Outro: Stay Safe on the Road and in the Cloud

    Contact us:
    https://www.linkedin.com/company/plaxidityx/
    https://www.youtube.com/@PlaxidityX
    contact@plaxidityx.com

    Voir plus Voir moins
    10 min
  • Dynamic SBOM for Smarter Vehicle Security – PlaxidityX Ep 19
    Mar 9 2025

    In this episode, we discuss the groundbreaking concept of Dynamic SBOM and its role in modern automotive software security. Hear how real-time monitoring of third-party library usage can lead to more precise vulnerability management. We explain the process behind intercepting dynamic calls and replacing them with breakpoints for live analysis.

    Discover how the technology replaces traditional code analysis methods to offer a live, actionable vehicle security view. We break down the technical aspects of Dynamic SBOM, discussing how it works by intercepting dynamic library calls using breakpoints. Understand the difference between repetitive call logging in ltrace and the efficient, one-time capture in Dynamic SBOM. This precision leads to more effective vulnerability prioritization.

    Our discussion also covers the integration of Dynamic SBOM with static analysis techniques, enhancing overall security. We highlight key considerations and best practices for maximizing monitoring coverage. Listen now to learn how to revolutionize your software security with these innovative insights.

    Chapters:
    (00:00) Welcome to Cars, Hackers and Cybersecurity
    (00:00:12) Dynamic SBOM Overview
    (00:00:21) What Is SBOM & Its Importance
    (00:00:48) Static vs. Dynamic SBOM Comparison
    (00:01:13) Benefits of Real-Time Monitoring
    (00:02:24) How Dynamic SBOM Works
    (00:02:46) Key Considerations & Dynamic SBOM vs. ltrace
    (00:03:33) DSBOM Complementing Static Analysis
    (00:04:24) Coverage, Testing & Effectiveness
    (00:05:16) Interpreting Library Usage & Vulnerability Mitigation
    (00:06:09) Conclusion: Dynamic SBOM in Action
    (00:07:16) Episode Wrap-Up & Sign Off

    Contact us:
    https://www.linkedin.com/company/plaxidityx/
    https://www.youtube.com/@PlaxidityX
    contact@plaxidityx.com

    Voir plus Voir moins
    8 min
  • Platform-Based Automotive Cybersecurity – PlaxidityX Ep 18
    Feb 23 2025

    In the age of connected cars, software-driven systems, and global supply chains, cyber security challenges have become increasingly complex. This episode delves into the pitfalls of relying on disconnected solutions to guard modern vehicles.

    We’ll show how a platform-centric automotive security approach consolidates everything—from vulnerability scanning to compliance checks—under one roof. We highlight real-world examples showing how holistic visibility and platform integration streamline security processes, help prioritize threats, and keep compliance on track. Discover how best-of-breed tools, when stitched together, can end up costing more time and resources than anticipated.

    Hear expert perspectives on addressing regulatory requirements, aligning security with business goals, and safeguarding customer trust. As the automotive industry races forward with electric and autonomous vehicles, staying ahead of potential vulnerabilities is crucial. Join us to discover how to protect both your innovation pipeline and the safety of your customers in today’s rapidly evolving automotive security landscape.

    Chapters:

    (00:00) Welcome to Cars, Hackers and Cybersecurity

    (00:12) Intro to Platform-Centric Automotive Cybersecurity

    (00:21) The Evolving Automotive Industry

    (00:48) Limitations of Automotive Best-of-Breed Tools

    (01:11) Holistic Visibility for Security Management

    (02:33) Context-Enriched Insights & Data Correlation

    (03:31) Risk Assessment & Vulnerability Prioritization

    (04:09) Seamless Integration & Scalability

    (05:31) Accelerated Time to Market & Security Alignment

    (07:56) Optimizing Operations &

    (08:39) The Future of Automotive Cyber Security Conclusion

    Contact us:
    https://www.linkedin.com/company/plaxidityx/
    https://www.youtube.com/@PlaxidityX
    contact@plaxidityx.com

    Voir plus Voir moins
    10 min
  • ISO 21434 Compliance in Automotive Cybersecurity – PlaxidityX Ep 17
    Feb 9 2025

    As OEMs race to innovate with autonomous driving, V2X communication, and other cutting-edge tech, compliance with UNR 155 and ISO/SAE 21434 has never been more important. But what do these regulations really mean for your day-to-day operations? In this episode, we demystify the role of CSMS and how it supports continuous security through design, development, production, and beyond.

    We also discuss the critical differences between mandatory guidelines like UNR 155 and global standards like ISO 21434. And examine the broader landscape of standards like China’s GB/T and Europe’s ENISA guidelines. Learn how to ensure compliance while still innovating at a rapid pace.

    Find out how partnering with the right experts, tools, and frameworks can help you navigate everything from TARA to incident response planning. Listen in for practical tips on overcoming hurdles like documentation complexity, supply chain integration, and resource constraints. You’ll walk away with strategies to maintain compliance, reduce risk, and future-proof your automotive cyber defense.

    Chapters:
    (00:00) Welcome to Cars, Hackers and Cybersecurity
    (00:13) Intro to Connected Car Compliance
    (00:23) Digital Transformation and Cyber Risks
    (00:48) Overview of UNR 155 & ISO 21434 Regulations
    (01:32) Software Vulnerabilities and Emerging Threats
    (02:43) Global Cybersecurity Standards and Directives
    (09:34) What is a Cybersecurity Management System (CSM)?
    (12:53) Challenges in Implementing a CSM
    (16:05) PlaxidityX’s Solutions for Automotive Cybersecurity
    (17:04) Connected Car Compliance Outro

    Contact us:
    https://www.linkedin.com/company/plaxidityx/
    https://www.youtube.com/@PlaxidityX
    contact@plaxidityx.com

    Voir plus Voir moins
    17 min