Automotive Cybersecurity

On this site, we learn more about the threats and impact of cyber attacks targeting connected vehicles on the road to use this newfound knowledge to protect them better.

These include the attack’s geo-location, impact, attack vector, company type, and required proximity of the attacker to its target and beyond.

Incidents studied and presented on this site were taken from various sources such as media, academic research, and the analytic’s journals, which include bug bounty programs, verified Twitter accounts of government law enforcement agencies worldwide, the Common Vulnerabilities & Exposures (CVE) database, and other publicly-available online sources.

In addition to the publicly reported cyber incidents, we show the deep and dark web to know black-hat actors that operate behind the scenes of automotive-focused cyber attacks. Because this helps OEMs, Tier-1 and Tier-2 companies, insurance, and other automotive-related companies take preventive steps to protect their products, data, information, and internal assets. These incidents are discussed in a separate designated section of this site titled “Deep and Dark Web.”

As is known, the automotive industry must have a continuously updated database of security incidents at the ready.