Platforms
Platform
VDR
Vehicle Detection and Response
Learn more >
Use Cases
Vehicle Cyber Protection
Keyless Theft Prevention
Products
VPCC
Vehicle Protection Cloud Core
IDXR
Intrusion Detection Reporter
IDXM
Intrusion Detection Management
IDPX
Intrusion Detection and Prevention Sensor
TDPX
Theft Detection and Preventing Sensor
vCore
Vehicle Cyber Protection System
vDome
Keyless Theft Prevention System
Compliance & Testing
Services
Security Penetration Testing
Automotive TARA
ISO21434 CSMS Compliance
2 Wheelers Compliance
CI/CD Sec Engines
Security AutoTester
SW Supply Chain Security
Security AutoDesigner
Resources
Blog
Company
Company
About
Careers
Newsroom
Events
Partners
Contact Us
English
ζ₯ζ¬θͺ
(
Japanese
)
Contact Us
Home
Blog
Blog
All articles
Cyber Research
Quantum Computing
Vehicle Vulnerabilities
How Quantum Computing Could Affect the Automotive Landscape
ECU
SBOM
Vehicle Vulnerability Management
PlaxidityX VVM Now Offers AUTOSAR Automatic SBOM Extraction Capabilities
Cyber Trends
Tomorrowβs Connected Car Technologies: Risk or Reward?
Cyber Research
Discovering Tunneling Service Security Flaws in AnyDesk Remote Application
Vehicle Vulnerability Management
Vehicle Manufacturers Need to Know What’s Inside Their Supplier’s Code
Cyber Research
Vehicle Vulnerabilities
Log4ShellβVehicle Fleets Can be Impacted
Cyber Trends
Penetration Testing
PlaxidityX Wins Automotive Cyber Security Innovation of the Year Award for its Outstanding, Industry-First Penetration Testing Technology
Security Development Tools
Automate k8s Secrets Creation Using Terraform and ExternalSecrets
Cyber Research
Embedded Systems
Using bitfield patterns to identify functions in binaries
Compliance
UNECE WP29
UNR 155: 3 Essentials for Automotive Cybersecurity Compliance
Vehicle Vulnerability Management
Attention Vehicle Manufacturers: The Vulnerability Management Countdown Has Begun
Cyber Trends
Security Development Tools
Cracking Anomaly Detection on System Logs
Penetration Testing
How Fuzzing Complements Penetration Testing for Optimal Vehicle Cybersecurity
Vehicle Vulnerabilities
Addressing API Vulnerabilities in Connected Car Services and Fleets
Penetration Testing
6 Must-Doβs of Vehicle Penetration Testing
Cyber Research
Vehicle Vulnerabilities
High Profile Linux Vulnerability May Make Vehicles Susceptible to Cyber Attack
Security Lifecycle Management
IPA Approaches for Vehicle Information Security
Compliance
Vehicle Networking
ISO 14229-1:2013 Road Vehicles – Unified Diagnostic Services (UDS) – Part 1: Specification and Requirements
Modal mailing list
×
Join our newsletter
Sign up to receive updates delivered to your inbox