Vultara, Inc.

Vultara, Inc.

Software Development

Troy, Michigan 2,883 followers

Secure the connected world by design

About us

Vultara, Inc. provides web-based product security risk management tools for electronics manufacturers. Our product portfolio covers a wide range of cybersecurity engineering services and tools. Our flagship product, Vultara, provides a comprehensive CSMS covering cybersecurity engineering from concept design automation to cybersecurity information & event monitoring.

Website
https://www.vultara.com
Industry
Software Development
Company size
11-50 employees
Headquarters
Troy, Michigan
Type
Privately Held
Founded
2020
Specialties
cybersecurity, product security, TARA, risk management, threat modeling, vulnerability management, cybersecurity engineering, threat intelligence, vulnerability analysis, embedded security, IoT device security, automotive cybersecurity, cybersecurity monitoring, iso/sae 21434, cyber security management system, and UNECE WP29 R155

Locations

Employees at Vultara, Inc.

Updates

  • View organization page for Vultara, Inc., graphic

    2,883 followers

    🔦 🚀 Laser Hacking is Now Viable for Everyone🚀🔦 At the upcoming Black Hat cybersecurity conference in Las Vegas, Samantha Isabelle Beaumont Beaumont and Larry Trowell from NetSPI are set to unveil a groundbreaking laser hacking device named the RayV Lite. See their Black Hat info here: https://lnkd.in/gyTynYEG. This innovative tool promises to democratize laser-based chip exploitation, making advanced techniques like laser fault injection and laser logic state imaging accessible to more hardware hackers than ever before. 🌟 Key Highlights: +Affordable Innovation: The RayV Lite costs under $500, significantly lower than the $150,000 price tag of state-of-the-art commercial tools. +Open Source & DIY: By leveraging 3D printing and commodity components, Beaumont and Trowell aim to empower DIY hackers and researchers with open-source designs. +Advanced Techniques: The RayV Lite enables users to reverse engineer chips, trigger vulnerabilities, and expose secrets, all with precise laser targeting. +Industry Impact: This tool challenges the misconception that laser-based chip hacking is impractical or too costly, urging manufacturers to enhance their security measures. With the RayV Lite, the realm of hardware hacking becomes more inclusive and inventive, bridging the gap between academic research and practical, at-home experimentation. This is a significant step towards the "domestication of tooling," ensuring that critical infrastructure and consumer devices are better protected against emerging threats. Join the conversation at #BlackHat2024 and explore the future of cybersecurity with the RayV Lite! 🌐🔒 Source Article: https://lnkd.in/gudPBV4e To always stay informed with the latest in Automotive Cybersecurity relevant intelligence, reach out to us at vultara.com/contact to access our full feed #CyberSecurity #HardwareHacking #Innovation #TechNews #Vultara #BlackHat #NetSPI #RayVLite

    View profile for Samantha Isabelle Beaumont, graphic

    Director of Transportation, Mobility & Cyber-Physical Systems

    I absolutely love, my job. Our BlackHat USA, 2024 talk submission has been accepted 😍 I am speechless, and so pleased I get to present this with my cohort Larry Trowell, supported by our wonderful organisation at NetSPI. Watch this space! We might even have stickers! - The Hackers that go "Pew, Pew"

    Black Hat

    Black Hat

    blackhat.com

  • View organization page for Vultara, Inc., graphic

    2,883 followers

    🚀 Meet us at DEFCON 32 🚀 If you didn't already know that Vultara, Inc. will be attending DEFCON 32 this year, this announcement is for you! 🎉 This is an incredible opportunity for us to immerse ourselves in the latest cybersecurity trends, innovations, and networking with the brightest minds in the industry. Our team members Yuanbo Guo, Phillip Nguyen, and Nick DiVito will be on the ground and are eager to connect, share insights, and explore potential collaborations. 🤝 If you're attending DEFCON 32, we would love to meet up! Feel free to reach out to any of our attending team members or through our website and schedule a meet-up. Use vultara.com/contact to reach out through our website See you in Vegas! 🌟 #DEFCON32 #Cybersecurity #Networking #Innovation #Vultara

    • Vultara will attend DEFCON 32
  • View organization page for Vultara, Inc., graphic

    2,883 followers

    🚨🔌 EV Charging Vulnerabilities Exploited!🔌🚨 The Pwn2Own Auto competition has once again showcased the ingenuity of security researchers, highlighting critical vulnerabilities in modern automotive systems. This time, the spotlight was on the Charx Bugs, which exposed significant flaws in electric vehicle (EV) charging infrastructure. The team at ret2 Systems participated to identify and address these vulnerabilities, aiming to bolster the security of EV charging networks. This post details our research on the Phoenix Contact CHARX SEC-3100 and the discovered bugs. 🔍 Key Findings The controller agent, reachable via ETH1, manages daisy-chained CHARX units, AC controller communication, and vehicle-to-grid (V2G) protocol messaging. It communicates over TCP, UDP, and HomePlug Green PHY protocols. -Bug #1: HomePlug Parsing Mismatch A null dereference vulnerability was found in the HomePlug parsing logic due to a mismatch in AMDATA blob sizes, causing service crashes. -Bug #2: Use-After-Free (UAF) on Process Teardown A UAF bug was discovered during process exit due to destructor ordering issues in C++ code. This can be triggered via a null dereference, causing a SIGSEGV signal. -Full exploit code is available on GitHub: https://lnkd.in/gefcJZtp 📉 Vulnerability Exposure Identified multiple zero-day vulnerabilities in the communication protocols used by EV charging stations. 💻 Exploitation Risk Demonstrated potential for remote code execution and unauthorized access to EV charging station firmware. 🔐 Data Compromise Exposed risks of man-in-the-middle (MitM) attacks leading to sensitive data interception. 🔧 Mitigation Steps Developed and recommended security patches and protocol enhancements to safeguard EV charging infrastructure. 👥 Affected Parties -Car Manufacturers: Required to integrate advanced security measures and regular updates into their EV designs. -Software Developers: Urged to implement secure coding practices and rigorous testing to fortify EV charging software. -Regulatory Bodies: Encouraged to establish and enforce stringent security standards for EV charging networks. -Car Owners: Advised to stay updated on security patches and firmware updates for their vehicles and charging equipment. Get access to our exclusive threat intelligence feed with unpublished insights by contacting us at vultara.com/contact #CyberSecurity #EVCharging #Pwn2Own #ret2Systems #ZeroDay #AutoSecurity #VulnerabilityResearch #Vultara 📧 Email: [email protected]   🐤 Social media: @ret2Systems on Twitter  RET2 is a company that specializes in vulnerability research, program analysis, and security education. Founded in 2017, it aims to reimagine and apply its tailored technologies in the commercial and defense industries.  

    • No alternative text description for this image
  • View organization page for Vultara, Inc., graphic

    2,883 followers

    🚗 🎓 Free Educational Materials! 🎓🚗 We at Vultara love seeing new research that pushes cybersecurity forward and provides fantastic learning resources. The work done by Bartłomiej Ufnalskiand on Toyota RAV4 (XA50) Climatronic panel reverse engineering using STM32 USART/LIN and HAL, and Ford Mustang VI (S550) IPC reverse engineering using STM32 CAN/FDCAN and HAL are a perfect example. It’s full of practical insights and techniques, helping us understand and apply LIN bus protocols and CAN bus communication while emphasizing the importance of industry standards. Projects like these are what drive innovation and keep us all learning and growing. Let’s take advantage of these resources and continue expanding our knowledge in the field of automotive technology. Explore more amazing projects here: https://lnkd.in/dWa9WERt Keep learning and stay curious! 🚀✨ #Research #Learning #Innovation #AutomotiveEngineering #Technology #LINBus #ClimateControl #Vultara Reach out to us at vultara.com/contact to see how we can help you stay up to date with automotive cybersecurity 🎛 Resources -Main repository: https://lnkd.in/dn76FYCd Jacob Schooley's Work: https://bitzero.tech/ Linkedin of Jacob Scooley : https://lnkd.in/gVYd_SH4  🙋♂️ Get in Contact -Mathworks: https://lnkd.in/dHPmwx8M -Website: https://lnkd.in/dWa9WERt

    Bartlomiej Ufnalski - MATLAB Central

    Bartlomiej Ufnalski - MATLAB Central

    ch.mathworks.com

  • View organization page for Vultara, Inc., graphic

    2,883 followers

    🚨 Attention Hardware Security Enthusiasts 🚨 With over 170 pages of insider tips, hacking tools (including purchase links), and detailed explanations, this E-magazine is the perfect place for hardware hackers from beginners to experts. https://lnkd.in/gNKM5V28  For those avid learners, we recommend reading through this magazine. To learn more about Vultara, Inc. and get involved with us, reach out at vultara.com/contact or download this file on Julio's website or on the GitHub #Vultara #Hacking #HardwareHacking #Cybersecurity #AutomotiveCybersecurity #FreeLearning 🗒 Sources Shout out to the main mind behind this Julio Della Flora https://lnkd.in/gG7Rpexq   https://lnkd.in/gZfhCQDW

    Hardware Hacking - YouTube

    Hardware Hacking - YouTube

    youtube.com

  • View organization page for Vultara, Inc., graphic

    2,883 followers

    🚀 Exciting News from Vultara, Inc.! 🌐 We are thrilled to announce our latest partnership with BWI GROUP, a global leader in brake and suspension systems. This strategic collaboration marks a significant milestone as we join forces to enhance BWI Group's cybersecurity engineering capabilities. 🛡️ In an era where automotive electronics face increasingly sophisticated threats, BWI Group has taken a proactive step by choosing Vultara to fortify its cybersecurity posture. Our team is dedicated to providing advanced, tailor-made cybersecurity solutions that meet the unique demands of the automotive industry. 🚗💻 Vincent Marchese, Chief Engineer at BWI Group, and our CEO, Yuanbo Guo, expressed their mutual excited enthusiasm in the full article found here: https://lnkd.in/gHAnPzaN Join us in celebrating this partnership as we continue to support BWI Group in maintaining the highest standards of cybersecurity and operational excellence. Together, we are setting new benchmarks in delivering safe, reliable, and innovative solutions to customers worldwide. 🌍 Want to know how we can help your automotive cybersecurity? Reach out to us at vultara.com/contact #Vultara #Cybersecurity #AutomotiveIndustry #Innovation #Partnership #BWIgroup

    • No alternative text description for this image
  • View organization page for Vultara, Inc., graphic

    2,883 followers

    🚀 Dismantling UWBAD: A practical attack on cybersecurity 🚀 🗒 Introduction to UWBAD A team of skilled researchers based out of China has unveiled a novel approach called UWBAD, targeting Ultra-Wideband (UWB) ranging systems. This method, detailed in their recent publication, uses Commercial Off-The-Shelf (COTS) UWB chips to launch imperceptible jamming attacks, disrupting critical applications like vehicle security systems and mobile device tracking. ➕ Mathematical Foundations The attack exploits vulnerabilities in the normalized cross-correlation (NCC) process essential for UWB systems. By synchronizing jamming signals with legitimate signals, UWBAD manipulates the NCC calculations. This interference reduces the correlation value below the system's threshold, causing the system to discard the data, leading to erroneous or halted distance measurements. 👨🔬 Implications and Conclusions The team's experiments demonstrated the attack's effectiveness across various devices, prompting urgent discussions on enhancing UWB security. The research emphasizes the need for collaborative efforts to fortify UWB systems against such vulnerabilities. 🔗 Dive deeper into the technical details and explore potential defenses in the full study: https://lnkd.in/gkb4a4V5   For our proprietary threat intelligence feeds and even more information related to the automotive world, reach out to us at vultara.com/contact Credit to the researchers from: 犬安科技(GoGoByte) University of Electronic Science and Technology of China Tsinghua University #CyberSecurity #UWBTechnology #Innovation #TechNews #Vultara #AutmotiveCybersecurity

    • No alternative text description for this image
  • View organization page for Vultara, Inc., graphic

    2,883 followers

    🚗💡 Persistent Threat: The Advanced Game Boy Hacker Tool Targeting Hyundai & Kia EVs 💡🚗 Attention, Hyundai and Kia EV owners! 🛑 The "Game Boy" emulator, cleverly disguised to exploit security systems, has been a quiet yet persistent threat and is now targeting vehicles like the Hyundai Ioniq 5, Kia EV6, and Genesis GV60. 🕹️ Old Tech, New Problems 🕹️ This device, mimicking a car’s key fob, unlocks and starts vehicles within seconds, a tactic that's not new but remains dangerously effective. This threat is not only persistent but evolving. 📵 After the Theft 📵 Thieves disable the vehicle's tracking modules, leaving owners and law enforcement in the dark. 🌍 Widespread Impact 🌍 The risk extends beyond Hyundai and Kia. Luxury brands like Infiniti, Lexus, and Mercedes-Benz are also vulnerable, indicating a broader industry challenge. 🔍 No Updates from Automakers Yet Attempts to get comments from Hyundai about their countermeasures were unsuccessful. The lack of information highlights the ongoing challenges in vehicle security. For all automotive threat intelligence and specifically tailored feeds, visit vultara.com/contact and ask us about our proprietary threat feeds #Hyundai #Kia #VehicleSecurity #TechTheft #AutoIndustry #CarTheftAwareness #EVs #ElectricVehicles #Vultara Sources: https://lnkd.in/gn4zY-cv    https://lnkd.in/gcsbMqQS https://lnkd.in/g7FGXbbt https://lnkd.in/gaxDGDP4  

    Game Boy Hack Threatens Hyundai IONIQ 5 and Kia EV6

    Game Boy Hack Threatens Hyundai IONIQ 5 and Kia EV6

    topspeed.com

  • View organization page for Vultara, Inc., graphic

    2,883 followers

    🚨 Bluetooth Vulnerabilities in Cars: BrakTooth Update 🚨 🔗 https://lnkd.in/gVjEEcDM  Fast Facts: Where? Star-V Lab What? BrakTooth vulnerabilities, first disclosed in 2021, now affect car infotainment systems. Key Findings: Researchers tested various car models for vulnerabilities: -Nissan IVI systems froze and failed to detect Bluetooth devices. -Tesla Model 3 & X experienced minor audio issues but were not deemed a security threat by Tesla. -Changan Uni-T was susceptible to nearly all tested vulnerabilities. -Additional tests showed disturbances in NIO, Volkswagen, ARCFOX, Neta V, and Leapmotor models. -BMW's 5 and 7 series also displayed vulnerabilities under BrakTooth attacks. Why It Matters: This isn't just about glitches—these findings spotlight security gaps in automotive Bluetooth systems. Industry must tighten security to steer clear of these threats. Let’s drive the change—share insights, and forge solutions! Reach out to us and get our proprietary Threat intelligence feed for the automotive world at vultara.com/contact #BluetoothSecurity #AutomotiveInnovation #CyberSecurity #BrakTooth #Vultara

    VULTARA

    VULTARA

    vultara.com

  • View organization page for Vultara, Inc., graphic

    2,883 followers

    🚨 TikTag Gadgets and Speculative Execution: A Blow to ARM Device Security 🚨 🔍 In a unique study, researchers from Seoul National University, Georgia Institute of Technology, and Samsung Research have uncovered significant vulnerabilities in ARM's Memory Tagging Extension (MTE). Their paper, titled "TIKTAG: Breaking ARM’s Memory Tagging Extension with Speculative Execution," reveals how speculative execution attacks with TikTag gadgets can bypass MTE’s security measures. MTE has been regarded as the most promising path forward for increasing C/C++ software security 🛡️ Why it matters: As industries increasingly rely on ARM’s MTE for protection against memory corruption attacks, understanding these vulnerabilities is crucial for cybersecurity professionals. 📖 Stay informed, stay secure and reach out to us at vultara.com/contact 🌐 Read the full paper here : https://lnkd.in/gt78KBRA   (The attached image is directly from the source paper) For more insights and analysis, visit us at Vultara.com! #CyberSecurity #ARM #MemoryTaggingExtension #SpeculativeExecution #TechNews #Vultara

    VULTARA

    VULTARA

    vultara.com

Similar pages

Browse jobs