Episodes

  • Invisible Conduits: The Control Plane Siege
    Feb 28 2026

    This episode dissects the strategic shift toward control plane exploitation, using the recent Cisco SD-WAN bypass (CVE-2026-20127) to illustrate how attackers are rewriting network segmentation in real-time. We analyze the fallout of the Odido leak and why "availability" has become the primary risk factor for industrial and automotive supply chains. We wrap up with a "Tier 0" roadmap for hardening the remote access and maintenance paths that often exist outside your formal security models.

    Show More Show Less
    34 mins
  • Hostile Time: When the Clock Lies in Critical OT
    Feb 27 2026

    We are back with another episode of Cybersecurity Under Pressure. Real Attacks, Real Lessons, diving into one of the most insidious vectors in operational technology: hostile time. At 06:05, a rail control room gets a burst of alarms, but the chronological sequence is physically impossible. The interlocking system reports an input changing after the command that supposedly triggered it. Time synchronization is a physical operational dependency, not a forensic luxury. Today, we unpack the physics of attacks that introduce asymmetric network delays to silently shift clocks. Join us as we discuss establishing hard drift limits that trigger deterministic safe modes, and how to protect safety-relevant sequences using causality and Byzantine fault-tolerant state machines.

    Show More Show Less
    46 mins
  • The 18:45 Reflash: When Usability Friction Becomes a Threat
    Feb 25 2026

    In this new chapter of Cybersecurity Under Pressure. Real Attacks, Real Lessons, we tackle the dangerous intersection of operational friction and systems engineering. A dealership laptop starts a DoIP reflash at 18:45. The authentication portal lags, the technician forces a shared session to stay alive, and suddenly the trust chain is compromised by a manual workaround. This episode challenges the "IT vs. Workshop" divide, arguing that latency, token refresh rates, and bay throughput are strict security requirements. We discuss how to architect revocation as a safety-critical OT function using transactional flows and A/B partitions, and dive into formally verifying the backend-to-bootloader handshake as a robust state machine.

    Show More Show Less
    23 mins
  • The Friday Night Patch & The Illusion of Segmentation
    Feb 23 2026

    Welcome to a new episode of Cybersecurity Under Pressure. Real Attacks, Real Lessons. It is Friday at 22:30, and a rail depot applies a minor network change to fix a flaky engineering link. By Monday morning, everything looks functional, but the security boundary has silently drifted. In this chapter, we break down why probabilistic defense and manual audits fundamentally fail in OT environments. We explore how to treat IEC 62443 zones and conduits as mathematical invariants, leveraging intent-based network verification to compute actual data plane behavior from configurations. Tune in to learn how to continuously attest your running state against a signed baseline and definitively prove your segmentation.

    Show More Show Less
    29 mins
  • Weekly Roundup: State Machine Breakdown & Engineering the Degraded Mode
    Feb 21 2026

    Welcome to a new weekly roundup episode of Cybersecurity Under Pressure. Real Attacks, Real Lessons. This week, we examine a cascade of high-impact events across multiple critical sectors: a massive DDoS wave knocking Deutsche Bahn’s passenger systems offline, ransomware forcing the University of Mississippi Medical Center to revert to manual workflows, a major data breach of France's FICOBA bank account registry, and a ransomware strike on the semiconductor supply chain at Advantest.

    While the attack vectors differ, the operational failure mode shares a common thread. In this chapter, we analyze an uncomfortable truth: when core services degrade, operators stop following verified workflows and invent new ones under pressure. We discuss how this human response fundamentally bypasses your defined state machine, introducing untestable variables like shared logins and undocumented remote access paths. Finally, we explore how to leverage IEC 62443 zones and conduits alongside NIS2 accountability mandates to engineer degraded modes exactly like safety functions. Tune in to learn how to design pre-approved fallbacks, time-bounded break-glass procedures, and resilient logging that survives when everything else is on fire.

    Show More Show Less
    41 mins