IoT
12/13/2017
12:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Upstream Security Secures $9 Million Series A Funding Round

Focuses on ramping up its cloud-based cybersecurity for connected and autonomous car fleets.

HERZLIYA, Israel – Upstream Security, pioneer of the cloud-based cybersecurity platform for connected cars and autonomous vehicles, today announced the closing of $9 million in Series A funding, led by CRV (Charles River Ventures). The round included expanded investments from Israeli-based Glilot Capital Partners and Maniv Mobility. Following a $2 million seed funding round in June, the company will use the latest investment to expand its R&D program and continue building out its world-class engineering and security research teams, and open marketing and sales offices in the United States and Europe. The company is well-resourced to secure the 60 million connected cars on the road today that include commercial trucks, vans, buses and private vehicles, as well as take advantage of the imminent explosion in connected vehicles—Gartner expects there will be 250 million connected vehicles by 2020.

 "Connected and semi-autonomous cars are already a reality, so it’s a matter of ‘when’ not ‘if’ these self-driving technologies will be deployed at scale. Upstream’s engineers were the first to solve how to protect connected cars and autonomous vehicles using the cloud, crucial for near-term and future deployment of automotive cybersecurity at the fleet level," said Izhar Armony, general partner at CRV. "We believe in Upstream’s groundbreaking approach to secure connected and autonomous vehicles and in the abilities of cybersecurity veterans, Yoav Levy and Yonatan Appel, to build a rapidly growing business in this hot, emerging space."

As connected and autonomous driving technologies become mainstream, security attacks on vehicle fleets––groups of motor vehicles owned or leased by a business, government agency or other entity––are likely to increase drastically. Upstream’s cloud-based approach to automotive cybersecurity leverages artificial intelligence and machine learning that is applied to the tremendous data sets continuously produced by vehicles. This provides customers with data protection, anomaly detection and real-time analytics of cyber attacks and vehicle fleet health. By centralizing cybersecurity in the cloud instead of in-vehicle, threats are detected and prevented before they even reach a vehicle's network.

More cars are connected to the Internet today than ever before, driving hackers to develop new and more efficient ways to infiltrate and disrupt automotive software. Today’s automotive cybersecurity solutions are in-vehicle and suffer from slow production cycles, which impede their agility as well as their ability to protect against the most recent cybersecurity threats. Upstream’s unique solution offers non-intrusive protection, effectively securing cars that are already on the road today and upgradable to stand against new cybersecurity threats and vulnerabilities in the future.

“The automotive industry is going through a massive disruption. Consequently, security solutions for the car are undergoing rapid advances at an unprecedented rate. We’re using emerging technologies like AI and machine learning to carry out an evolutionary leap in cybersecurity for passenger and commercial vehicles,” said Upstream CEO and cofounder, Yoav Levy. “Riding the wave of momentum from our recent company launch and early customer wins, this new investment round further validates our technology and approach, and will fuel our commitment to be the leading force of innovation in security for connected and autonomous transportation.”

Upstream is planning to open offices in Silicon Valley in the coming months.

In addition to this news, Levy recently spoke at KPMG’s 8th annual automotive executive forum, the 2017 Los Angeles Auto Show, which announced new research in vehicle fleet security.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
Intel Reveals New Spectre-Like Vulnerability
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/15/2018
Australian Teen Hacked Apple Network
Dark Reading Staff 8/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-2765
PUBLISHED: 2018-08-20
pyro before 3.15 unsafely handles pid files in temporary directory locations and opening the pid file as root. An attacker can use this flaw to overwrite arbitrary files via symlinks.
CVE-2018-15594
PUBLISHED: 2018-08-20
arch/x86/kernel/paravirt.c in the Linux kernel before 4.18.1 mishandles certain indirect calls, which makes it easier for attackers to conduct Spectre-v2 attacks against paravirtual guests.
CVE-2018-15572
PUBLISHED: 2018-08-20
The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c in the Linux kernel before 4.18.1 does not always fill RSB upon a context switch, which makes it easier for attackers to conduct userspace-userspace spectreRSB attacks.
CVE-2018-15573
PUBLISHED: 2018-08-20
** DISPUTED ** An issue was discovered in Reprise License Manager (RLM) through 12.2BL2. Attackers can use the web interface to read and write data to any file on disk (as long as rlm.exe has access to it) via /goform/edit_lf_process with file content in the lfdata parameter and a pathname in the lf...
CVE-2018-15574
PUBLISHED: 2018-08-20
** DISPUTED ** An issue was discovered in the license editor in Reprise License Manager (RLM) through 12.2BL2. It is a cross-site scripting vulnerability in the /goform/edit_lf_get_data lf parameter via GET or POST. NOTE: the vendor has stated "We do not consider this a vulnerability."