Can Your Radio Take Control of Your Truck?


Cybersecurity risks facing the automotive industry are rapidly evolving beyond ransomware attacks on fleets. Hackers can weaponize connected vehicles through a wide array of connected components and applications, compromising sensitive data, operational availability, and even safety. Software-defined vehicles, unsecured APIs, and mobile applications introduce additional new attack vectors that malicious actors can exploit.

Haim Kantor, Upstream’s North American president, joined Hot Talks Trucking to share his insights. Kantor examines the evolving cyber threats and strategies to fortify defenses effectively.

In this episode of HDT Talks Trucking:

  • How hackers find ways to bypass vehicle security features
  • APIs and mobile apps create new entry points for attacks
  • EVs face emerging cyber risks across the entire ecosystem


Newsletter Icon

to our newsletter

Stay up-to-date on the latest trends, emerging risks, and updates


佐藤俊也は、日本におけるUpstreamの成長加速の陣頭指揮をとります。 Upstreamは、2024年グローバルモビリティサイバーセキュリティ報告書の日本語版�

More Details

Exploring Upstream’s Cybersecurity Report with Giuseppe Serio

The episode explores the latest developments in automotive cybersecurity, focusing on the Upstream Cybersecurity Threat Report for 2023. It highlights the importance of responsible disclosure…

More Details

IoT Cybersecurity in an Evolving Regulatory Landscape

The rising use of IoT devices has transformed operations in the mobility and automotive ecosystem. However, this expansion has also escalated the risks associated with…

More Details

Enhance Cybersecurity Investigations with Ocean AI by Upstream

In the fast-evolving world of automotive and mobility cybersecurity, Ocean AI by Upstream adds another tool to the toolkit used by analysts to identify and…

More Details

2024 グローバル自動車サイバーセキュリティレポートUpstreamのグローバル自動車


More Details

Cybersecurity Challenges in the IoT Device Landscape

The surging use of Mobility and Transportation IoT devices presents a growing attack surface for increasingly complex and sophisticated cyber risks, putting operational availability and…

More Details