SaiFlow's Blog

Featured

Latest insights and industry updates

image of a traffic control center (for a mobility and transportation)

Fortifying EV Charging Networks: Navigating the NIS2 Cybersecurity Directive with SaiFlow

The NIS2 directive, adopted in November 2022 and set to become applicable also on the EV charging sector in October 2024, marks a significant milestone in the EU's cybersecurity efforts. Building upon the original NIS directive, NIS2 expands its scope to cover essential additional entities in critical sectors.
image of a traffic control center (for a mobility and transportation)

The EV Charging Security Dilemma

On the requirements of EV Charging Security Infrastructure and why relying solely on the individual Electric Vehicle Supply Equipment (EVSE) vendors or Charge Point Operators (CPOs) is not enough.
image of a traffic control center (for a mobility and transportation)

SaiFlow and Check Point Software Technologies Partner to Secure EV Charging Sites and Distributed Energy Networks

The rapid adoption of Electric Vehicles (EVs) has spurred the growth of EV Charging Stations and Distributed Energy Resources installations
image of a traffic control center (for a mobility and transportation)

eMSP and CPOs Could Expose EV Chargers to OCPP Hijacking

The SaiFlow research team discovered how an adversary can abuse leaked charging stations’ identifiers to perform a wide-scale DoS attack on the public charging infrastructure.
image of a traffic control center (for a mobility and transportation)

NIST Cybersecurity Framework for EV Extreme Fast Charging Infrastructure

The Electric Vehicle and Extreme Fast Charging (EV/XFC) networks and infrastructure. The newly officialized framework combines industry standards and best practices for securing the evolving EV charging sites and networks.
image of a traffic control center (for a mobility and transportation)

ABB Terra AC Improper Authentication Can Lead To EVSE Takeover (CVE 2023-0863 & CVE 2023-0864)

The SaiFlow research team has discovered two vulnerabilities in high severity allowing remote and unauthorized users, within the range of BLE to takeover the EV charger.