Cybersecurity Under Pressure. Real Attacks, Real Lessons cover art

Cybersecurity Under Pressure. Real Attacks, Real Lessons

Cybersecurity Under Pressure. Real Attacks, Real Lessons

By: Antonio González
Listen for free

About this listen

This podcast breaks down real cybersecurity incidents to understand what actually went wrong, not in theory, but in practice. Each episode analyzes a recent attack, explains the technical mechanics in clear language, and translates them into concrete lessons for security, engineering, and business teams. The focus is on operational reality, decision making under pressure, and the controls that truly reduce risk in production environments.Antonio González
Episodes
  • Invisible Conduits: The Control Plane Siege
    Feb 28 2026

    This episode dissects the strategic shift toward control plane exploitation, using the recent Cisco SD-WAN bypass (CVE-2026-20127) to illustrate how attackers are rewriting network segmentation in real-time. We analyze the fallout of the Odido leak and why "availability" has become the primary risk factor for industrial and automotive supply chains. We wrap up with a "Tier 0" roadmap for hardening the remote access and maintenance paths that often exist outside your formal security models.

    Show More Show Less
    34 mins
  • Hostile Time: When the Clock Lies in Critical OT
    Feb 27 2026

    We are back with another episode of Cybersecurity Under Pressure. Real Attacks, Real Lessons, diving into one of the most insidious vectors in operational technology: hostile time. At 06:05, a rail control room gets a burst of alarms, but the chronological sequence is physically impossible. The interlocking system reports an input changing after the command that supposedly triggered it. Time synchronization is a physical operational dependency, not a forensic luxury. Today, we unpack the physics of attacks that introduce asymmetric network delays to silently shift clocks. Join us as we discuss establishing hard drift limits that trigger deterministic safe modes, and how to protect safety-relevant sequences using causality and Byzantine fault-tolerant state machines.

    Show More Show Less
    46 mins
  • The 18:45 Reflash: When Usability Friction Becomes a Threat
    Feb 25 2026

    In this new chapter of Cybersecurity Under Pressure. Real Attacks, Real Lessons, we tackle the dangerous intersection of operational friction and systems engineering. A dealership laptop starts a DoIP reflash at 18:45. The authentication portal lags, the technician forces a shared session to stay alive, and suddenly the trust chain is compromised by a manual workaround. This episode challenges the "IT vs. Workshop" divide, arguing that latency, token refresh rates, and bay throughput are strict security requirements. We discuss how to architect revocation as a safety-critical OT function using transactional flows and A/B partitions, and dive into formally verifying the backend-to-bootloader handshake as a robust state machine.

    Show More Show Less
    23 mins
No reviews yet
In the spirit of reconciliation, Audible acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples today.