{"id":92210,"date":"2026-02-17T12:53:15","date_gmt":"2026-02-17T15:53:15","guid":{"rendered":"https:\/\/automotive.einnews.com\/article\/893079522"},"modified":"2026-02-17T12:53:15","modified_gmt":"2026-02-17T15:53:15","slug":"vicone-report-finds-automotive-cyber-incidents-tripled","status":"publish","type":"post","link":"https:\/\/new7.shop\/zerocostfreehost\/index.php\/2026\/02\/17\/vicone-report-finds-automotive-cyber-incidents-tripled\/","title":{"rendered":"VicOne report finds automotive cyber incidents tripled"},"content":{"rendered":"<p>Cross-region, multi-business cyber incidents in the automotive sector more than tripled in 2025, according to VicOne\u2019s 2026 Automotive Cybersecurity Report. The cybersecurity firm recorded 161 such incidents out of 610 total cases, attributing the increase to centralised software platforms and over-the-air update infrastructures that amplify the impact of security failures across subsidiaries and regions.<\/p>\n<p>The report found that 33% of observed cyber risk now directly impacts driver-facing systems, increasing customer exposure and brand trust implications. VicOne said attacks now routinely span enterprise IT, cloud services, and in-vehicle systems simultaneously, describing this convergence as the \u201cOverlap Era.\u201d<\/p>\n<p><img data-opt-id=758893364  fetchpriority=\"high\" decoding=\"async\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/ywAAAAAAQABAAACAUwAOw==\" fifu-lazy=\"1\" fifu-data-sizes=\"auto\" fifu-data-srcset=\"https:\/\/i3.wp.com\/media.automotiveworld.com\/app\/uploads\/2026\/02\/17122153\/vicone-2026-automotive-cybersecurity-threat-report.jpg?ssl=1&w=75&resize=75&ssl=1 75w, https:\/\/i3.wp.com\/media.automotiveworld.com\/app\/uploads\/2026\/02\/17122153\/vicone-2026-automotive-cybersecurity-threat-report.jpg?ssl=1&w=100&resize=100&ssl=1 100w, https:\/\/i3.wp.com\/media.automotiveworld.com\/app\/uploads\/2026\/02\/17122153\/vicone-2026-automotive-cybersecurity-threat-report.jpg?ssl=1&w=150&resize=150&ssl=1 150w, https:\/\/i3.wp.com\/media.automotiveworld.com\/app\/uploads\/2026\/02\/17122153\/vicone-2026-automotive-cybersecurity-threat-report.jpg?ssl=1&w=240&resize=240&ssl=1 240w, https:\/\/i3.wp.com\/media.automotiveworld.com\/app\/uploads\/2026\/02\/17122153\/vicone-2026-automotive-cybersecurity-threat-report.jpg?ssl=1&w=320&resize=320&ssl=1 320w, https:\/\/i3.wp.com\/media.automotiveworld.com\/app\/uploads\/2026\/02\/17122153\/vicone-2026-automotive-cybersecurity-threat-report.jpg?ssl=1&w=500&resize=500&ssl=1 500w, https:\/\/i3.wp.com\/media.automotiveworld.com\/app\/uploads\/2026\/02\/17122153\/vicone-2026-automotive-cybersecurity-threat-report.jpg?ssl=1&w=640&resize=640&ssl=1 640w, https:\/\/i3.wp.com\/media.automotiveworld.com\/app\/uploads\/2026\/02\/17122153\/vicone-2026-automotive-cybersecurity-threat-report.jpg?ssl=1&w=800&resize=800&ssl=1 800w, https:\/\/i3.wp.com\/media.automotiveworld.com\/app\/uploads\/2026\/02\/17122153\/vicone-2026-automotive-cybersecurity-threat-report.jpg?ssl=1&w=1024&resize=1024&ssl=1 1024w, https:\/\/i3.wp.com\/media.automotiveworld.com\/app\/uploads\/2026\/02\/17122153\/vicone-2026-automotive-cybersecurity-threat-report.jpg?ssl=1&w=1280&resize=1280&ssl=1 1280w, https:\/\/i3.wp.com\/media.automotiveworld.com\/app\/uploads\/2026\/02\/17122153\/vicone-2026-automotive-cybersecurity-threat-report.jpg?ssl=1&w=1600&resize=1600&ssl=1 1600w\" class=\"aligncenter size-full wp-image-461068\" fifu-data-src=\"https:\/\/i3.wp.com\/media.automotiveworld.com\/app\/uploads\/2026\/02\/17122153\/vicone-2026-automotive-cybersecurity-threat-report.jpg?ssl=1\" alt width=\"640\" height=\"503\"><\/p>\n<p>In a statement, Max Cheng, Chief Executive of VicOne, said: \u201cIn the Overlap Era, vehicles, cloud platforms, and enterprise IT systems function as a single operational fabric. Governing these environments as isolated silos is no longer sustainable. Cybersecurity has become a board-level accountability issue.\u201d<\/p>\n<p>The report also identified electric vehicle charging infrastructure as a growing source of exposure, as chargers connect vehicles, backend services, mobile applications, and power grids. VicOne noted that while regulations such as UN R155 and ISO\/SAE 21434 have raised baseline cybersecurity maturity, domain-specific compliance alone cannot address cross-platform risk propagation in modern software-defined vehicle architectures.<\/p>\n<p>Source: <a href=\"https:\/\/vicone.com\/company\/press-releases\/vicone-2026-automotive-cybersecurity-report-cyber-incidents-now-span-entire-organizations\" target=\"_blank\" rel=\"noopener\">VicOne<\/a><\/p>\n<p><strong><a href=\"https:\/\/blockads.fivefilters.org\"> <\/a><\/strong> <a href=\"https:\/\/blockads.fivefilters.org\/acceptable.html\"> <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8230; 2026 report found cross-region <span class=\"match\">automotive<\/span> cyber incidents more than tripled &#8230; -business cyber incidents in the <span class=\"match\">automotive<\/span> sector more than tripled in &#8230; , according to VicOne\u00e2\u0080\u0099s 2026 <span class=\"match\">Automotive<\/span> Cybersecurity Report. The cybersecurity firm &#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-92210","post","type-post","status-publish","format-standard","hentry","category-news","wpcat-1-id"],"_links":{"self":[{"href":"https:\/\/new7.shop\/zerocostfreehost\/index.php\/wp-json\/wp\/v2\/posts\/92210","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new7.shop\/zerocostfreehost\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new7.shop\/zerocostfreehost\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new7.shop\/zerocostfreehost\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/new7.shop\/zerocostfreehost\/index.php\/wp-json\/wp\/v2\/comments?post=92210"}],"version-history":[{"count":0,"href":"https:\/\/new7.shop\/zerocostfreehost\/index.php\/wp-json\/wp\/v2\/posts\/92210\/revisions"}],"wp:attachment":[{"href":"https:\/\/new7.shop\/zerocostfreehost\/index.php\/wp-json\/wp\/v2\/media?parent=92210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new7.shop\/zerocostfreehost\/index.php\/wp-json\/wp\/v2\/categories?post=92210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new7.shop\/zerocostfreehost\/index.php\/wp-json\/wp\/v2\/tags?post=92210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}