Couverture de Cybersecurity Under Pressure. Real Attacks, Real Lessons

Cybersecurity Under Pressure. Real Attacks, Real Lessons

Cybersecurity Under Pressure. Real Attacks, Real Lessons

De : Antonio González
Écouter gratuitement

À propos de ce contenu audio

This podcast breaks down real cybersecurity incidents to understand what actually went wrong, not in theory, but in practice. Each episode analyzes a recent attack, explains the technical mechanics in clear language, and translates them into concrete lessons for security, engineering, and business teams. The focus is on operational reality, decision making under pressure, and the controls that truly reduce risk in production environments.Antonio González
Épisodes
  • The Illusion of MFA: AiTM Phishing and Session Token Theft
    Mar 4 2026

    Welcome to a new episode of Cybersecurity Under Pressure: Real Attacks, Real Lessons. If your security dashboard shows complete MFA adoption, you might still be compromised. Sarah and Alex break down the mechanics of Adversary-in-the-Middle (AiTM) attacks targeting the banking and insurance sectors. Discover why attackers are bypassing traditional authentication to steal session tokens, and learn the architectural pivots required—from implementing cryptographic session binding to meeting DORA's strict incident response and revocation mandates.

    Afficher plus Afficher moins
    33 min
  • Automotive Extortion Goes Upstream: Protecting the New Vehicle Perimeter
    Mar 2 2026

    In this new episode of Cybersecurity Under Pressure: Real Attacks, Real Lessons, hosts Sarah and Alex dissect the structural shift in automotive cyber threats. Moving past the outdated CAN bus hacking narrative, they explore how extortion crews are now targeting cloud services, APIs, and CI/CD pipelines to hold fleets hostage. Listen in for a rigorous breakdown of how to secure the update chain with HSM-backed keys, and how to leverage ISO/SAE 21434 and UNECE R155/156 to enforce safety-grade supply chain defense.

    Afficher plus Afficher moins
    40 min
  • Invisible Conduits: The Control Plane Siege
    Feb 28 2026

    This episode dissects the strategic shift toward control plane exploitation, using the recent Cisco SD-WAN bypass (CVE-2026-20127) to illustrate how attackers are rewriting network segmentation in real-time. We analyze the fallout of the Odido leak and why "availability" has become the primary risk factor for industrial and automotive supply chains. We wrap up with a "Tier 0" roadmap for hardening the remote access and maintenance paths that often exist outside your formal security models.

    Afficher plus Afficher moins
    34 min
Aucun commentaire pour le moment