ChatGPT and automotive cybersecurity #1/2: About CSMS from ISO 21434

As promised, I played more with ChatGPT and this time I started to dig a bit into cybersecurity for automotive. Since I am working these days on CSMS (based on ISO ECE 21434 and TISAX), part of my companies consulting offer for automotive I thought maybe I check what ChatGPT things about them. Unfortunately, nothing […]

A brief history of software vulnerabilities in vehicles (Update 2023)

Updated in 2023: 2023: Sam Curry: Web Hackers vs. The Auto Industry: Critical Vulnerabilities in Ferrari, BMW, Rolls Royce, Porsche, and More Kia, Honda, Infiniti, Nissan, Acura Fully remote lock, unlock, engine start, engine stop, precision locate, flash headlights, and honk vehicles using only the VIN number Fully remote account takeover and PII disclosure via VIN […]

Risk Assessment of AWS services used in building a resilient Web App on AWS

We wrote here in the article “Building Resilient Web Applications on AWS: A Comprehensive Approach to Security” how to use certain AWS services to implement a resilient web based application. The services mentioned require also a brief analysis in respect to Security, Confidentiality, Integrity, Availability and Privacy. Contents Toggle CloudTrail Risk Assessment Mitigation Privacy CloudWatch Risk […]

Endpoint Cybersecurity Sponsoring local volleyball team

Endpoint Cybersecurity GmbH is proud to sponsor the volleyball team of 12-16 years old from TV Langenargen. Endpoint Cybersecurity’s CEO, Sorin Mustaca proudly taking a photo together with the team.

Why companies producing security software need 3rd party help in adding additional security technologies

If you produce some security software (Anti-malware, Anti-ransomware, URL Filter, etc.) you should never count only on one source of knowledge to deliver your product’s value to the customers. Many companies think that this is their core competence and they refuse to look into other directions. This is fundamentally wrong, even if you are a […]