Faster to Audit with Our New Open-Source Repository!

Since the introduction of the first vehicle cybersecurity regulations, audits and type approvals have become a regular and critical requirement in the automotive security world. OEMs and their suppliers invest significant time and resources in preparing detailed presentations and documentation to explain their security approaches. With upcoming regulations like the Cyber Resilience Act on the … Read more

Edge-Device Reverse Proxy Security

Honeypots are intentionally designed to be attacked. They serve as valuable tools for gaining insights into attacker TTPs (tactics, techniques, and procedures) while also acting as decoys to divert attention from actual assets. However, like any other software, honeypots themselves can have vulnerabilities. If an attacker successfully compromises a honeypot system, the potential damage could … Read more

Credibility of Simulated Vehicle Assets as Automotive Honeypots

At CROWSI, we believe that honeypots are a valuable tool in addressing the significant challenge of vehicle security, particularly in the realm of vehicle security monitoring as part of secure vehicle operations. In our first blog post, we discussed why honeypots are beneficial for automotive security. In our previous blog post, we explored different design … Read more

Risks of In-Vehicle Honeypot Concepts

Vehicle security is a major challenge, particularly when it comes to monitoring as part of secure operations. Our first blog post explored why this is the case and how automotive honeypots can help address these challenges. At CROWSI, we believe automotive honeypots are a valuable tool for protecting vehicle fleets and meeting regulatory requirements. However, … Read more

It’s about getting even!

Do you know the women in the picture above? No, then make sure to check out this video before continuing reading. (Picture Source: https://www.youtube.com/watch?v=RV_SdCfZ-0s) The women in the picture is dAIsy – O2s AI powerd honeypot chatbot—a brilliant example of a decoy tailored to the telecommunication ecosystem. dAIsy: A Voice AI Honeypot That Wastes Scammers’ … Read more

Build your own! How to develop and integrate your own CROWSI honeypot decoy

Honeypots offer numerous advantages for your cybersecurity framework, enhancing cyber threat intelligence and deceptive security measures. They provide early warnings of malicious activity, offer invaluable insights into threat behavior and protect critical assets by diverting attackers, while tying up their resources. For a deeper dive into these benefits, check out our earlier blog post. But, … Read more

Honeypot – Basics: Benefits and Why to Use Them

Honeypots are more than just fascinating tools in the cybersecurity landscape—they offer tangible benefits that can significantly strengthen an organization’s defense strategy. Honeypots are decoy systems designed to attract attackers, diverting them from real assets and capturing valuable information about their tactics. For a detailed introduction to honeypots, check out our previous blog post. In … Read more

Honeypot – Basics: A Key Tool in Cybersecurity

When it comes to protecting digital assets, cybersecurity experts need to employ a wide array of tools and strategies. Among these, honeypots stand out as a fascinating and strategic approach to understanding and mitigating cyber threats. In this blog post, we’ll explore what honeypots are, the differences between low- and high-interaction honeypots, and some typical … Read more

Vehicle Security Monitoring and how Honeypots can help

In today’s automotive landscape, connectivity stands as a cornerstone of innovation driving vehicle manufacturers. It enables the development of new features tailored to customer needs, such as controlling vehicle functions via smartphones and facilitating fleet management with real-time vehicle data. However, making vehicles part of the internet of things by integration of connected edge devices, … Read more