
Sign up to save your podcasts
Or


In this episode of "Cybersecurity Under Pressure: Real Attacks, Real Problems", we dive into the messy reality where theoretical cybersecurity collides with operational pressure.
What happens when a dealership technician needs to rush a DoIP reflash at 6:45 PM on a Friday with a growing queue of vehicles on the bay?
We discuss how the clash between security, which demands traceability and controlled releases, and service, which is measured by throughput and turnaround times, often turns dangerous shortcuts like shared credentials and cached approvals into the unofficial workflow.
We also break down the most pressing real-world cyber threats facing the automotive ecosystem today. We analyze how attackers are using devices disguised as Bluetooth speakers to perform CAN injection attacks through a car's headlights, stealing vehicles in under two minutes.
Furthermore, we explore why auto dealerships are prime targets for cybercriminals, with social engineering and ransomware accounting for a massive portion of attacks that threaten to encrypt or leak sensitive customer data.
Finally, we examine the daunting technical and organizational challenges brought by the new UN R155 and R156 regulations and ask the ultimate question: can these mandated secure paths actually survive the intense pressure of the workshop floor?
Tune in as we dissect the vulnerabilities hidden not just in the code, but within human incentive models.
By Antonio GonzálezIn this episode of "Cybersecurity Under Pressure: Real Attacks, Real Problems", we dive into the messy reality where theoretical cybersecurity collides with operational pressure.
What happens when a dealership technician needs to rush a DoIP reflash at 6:45 PM on a Friday with a growing queue of vehicles on the bay?
We discuss how the clash between security, which demands traceability and controlled releases, and service, which is measured by throughput and turnaround times, often turns dangerous shortcuts like shared credentials and cached approvals into the unofficial workflow.
We also break down the most pressing real-world cyber threats facing the automotive ecosystem today. We analyze how attackers are using devices disguised as Bluetooth speakers to perform CAN injection attacks through a car's headlights, stealing vehicles in under two minutes.
Furthermore, we explore why auto dealerships are prime targets for cybercriminals, with social engineering and ransomware accounting for a massive portion of attacks that threaten to encrypt or leak sensitive customer data.
Finally, we examine the daunting technical and organizational challenges brought by the new UN R155 and R156 regulations and ask the ultimate question: can these mandated secure paths actually survive the intense pressure of the workshop floor?
Tune in as we dissect the vulnerabilities hidden not just in the code, but within human incentive models.