CYEQT
CYMETRIS
Breachlabz
CYLABZ

Looking for collaboration for your next project? Do not hesitate to contact us to say hello.

CYLABZ

Looking for collaboration for your next project? Do not hesitate to contact us to say hello.

Success Stories

Establishing an In-House Automotive Penetration Testing Lab (India)

An Indian automotive engineering unit aimed to internalize cybersecurity verification and validation activities to reduce dependency on external testing providers and improve integration with development projects. A structured penetration testing lab was set up, including tooling, test environments, and methodologies aligned with ISO/SAE 21434 and UN R155. Engineering teams were enabled through hands-on testing, standardized reporting, and traceability to risk assessments. The result was a sustainable, audit-ready in-house capability that allowed earlier and more frequent security testing, improved feedback into design decisions, and long-term retention of cybersecurity know-how.

Continuous Penetration Testing Program for a Global Automotive OEM

A global automotive OEM required ongoing cybersecurity testing across vehicle platforms and backend systems to meet lifecycle obligations under UN R155. One-time penetration tests were insufficient to support evolving architectures and software updates.

A long-term testing program was established, covering in-vehicle networks, diagnostics, update mechanisms, hardware interfaces, and connected services. Recurring test cycles were aligned with development milestones, enabling early vulnerability detection, trend analysis across platforms, and a shift from reactive to managed, continuous security validation.

Cyber Resilience Act Gap Analysis for a Special-Purpose Vehicle Manufacturer

An Asian-based special-purpose vehicle manufacturer needed clarity on its exposure to the EU Cyber Resilience Act and its interaction with existing automotive cybersecurity practices. While ISO/SAE 21434 processes were partially in place, CRA obligations introduced new product-level requirements.

A structured gap analysis compared current development, documentation, and vulnerability handling practices against CRA requirements. The outcome was a prioritized roadmap highlighting deviations, implementation effort, and overlaps with existing processes, enabling informed decisions without unnecessary overengineering.

Cybersecurity Management System (CSMS) Implementation for a Motorcycle Manufacturer

A motorcycle manufacturer preparing for global market access required a compliant Cybersecurity Management System in line with UN R155. Existing cybersecurity activities were largely project-specific and lacked organizational consistency.

CSMS processes were defined across governance, risk management, supplier interfaces, and lifecycle activities, and aligned with ongoing engineering workflows. The resulting system provided a scalable, audit-ready foundation, clarified responsibilities, and improved consistency across product lines and development projects.

Cybersecurity Engineering and Risk Assessment Support for a Component Supplier

An automotive component supplier faced increasing and divergent cybersecurity requirements from multiple OEM customers. Risk assessments and documentation efforts were largely duplicated across projects.

Cybersecurity engineering support focused on structured risk assessments, reusable TARA building blocks, and alignment with customer-specific expectations. This enabled consistent cybersecurity work products, reduced redundant effort, and improved transparency during customer reviews and audits.

Interim Cybersecurity and Safety Engineering Support for an Automotive OEM

During a critical development phase, an automotive OEM required short-term reinforcement in cybersecurity and safety-related engineering activities. The challenge was rapid integration into ongoing projects without disrupting established processes.

An interim expert team supported risk assessments, security-safety alignment, and coordination with internal stakeholders and suppliers. Project continuity was ensured, critical milestones were stabilized, and knowledge transfer allowed internal teams to retain capabilities beyond the interim phase.

Penetration Testing for a Hardware Provider in Charging Infrastructure

A hardware provider developing components for electric vehicle charging infrastructure needed to assess the cybersecurity resilience of its products in light of increasing regulatory scrutiny and customer security requirements. The scope included embedded hardware, firmware, communication interfaces, and backend connectivity used in charging environments.

Penetration testing activities covered physical interfaces, firmware extraction and analysis, communication protocols, and interaction with connected services. Testing results were systematically mapped to identified risk scenarios and used to validate existing security assumptions.

The engagement provided clear visibility into real-world attack surfaces, supported prioritization of remediation measures, and strengthened the provider’s security posture toward automotive customers and infrastructure operators.

Functional Safety Support for a Manufacturer of Hydraulic Components for Commercial Vehicles and Construction Machinery

A manufacturer of hydraulic components supplying commercial vehicles and construction machinery required additional functional safety support to strengthen compliance across development projects. Existing safety activities needed to be aligned more consistently with system-level requirements and customer expectations.

Functional safety engineering support focused on safety analyses, refinement of safety concepts, and alignment of component-level safety work products with higher-level vehicle and machine architectures. Close coordination with development and quality teams ensured that safety considerations were integrated into ongoing projects without disrupting delivery timelines.

The project improved consistency and traceability of functional safety artifacts, enhanced communication with OEM customers, and increased confidence in meeting safety expectations across multiple application domains.