Épisodes

  • The Illusion of MFA: AiTM Phishing and Session Token Theft
    Mar 4 2026

    Welcome to a new episode of Cybersecurity Under Pressure: Real Attacks, Real Lessons. If your security dashboard shows complete MFA adoption, you might still be compromised. Sarah and Alex break down the mechanics of Adversary-in-the-Middle (AiTM) attacks targeting the banking and insurance sectors. Discover why attackers are bypassing traditional authentication to steal session tokens, and learn the architectural pivots required—from implementing cryptographic session binding to meeting DORA's strict incident response and revocation mandates.

    Afficher plus Afficher moins
    33 min
  • Automotive Extortion Goes Upstream: Protecting the New Vehicle Perimeter
    Mar 2 2026

    In this new episode of Cybersecurity Under Pressure: Real Attacks, Real Lessons, hosts Sarah and Alex dissect the structural shift in automotive cyber threats. Moving past the outdated CAN bus hacking narrative, they explore how extortion crews are now targeting cloud services, APIs, and CI/CD pipelines to hold fleets hostage. Listen in for a rigorous breakdown of how to secure the update chain with HSM-backed keys, and how to leverage ISO/SAE 21434 and UNECE R155/156 to enforce safety-grade supply chain defense.

    Afficher plus Afficher moins
    40 min
  • Invisible Conduits: The Control Plane Siege
    Feb 28 2026

    This episode dissects the strategic shift toward control plane exploitation, using the recent Cisco SD-WAN bypass (CVE-2026-20127) to illustrate how attackers are rewriting network segmentation in real-time. We analyze the fallout of the Odido leak and why "availability" has become the primary risk factor for industrial and automotive supply chains. We wrap up with a "Tier 0" roadmap for hardening the remote access and maintenance paths that often exist outside your formal security models.

    Afficher plus Afficher moins
    34 min
  • Hostile Time: When the Clock Lies in Critical OT
    Feb 27 2026

    We are back with another episode of Cybersecurity Under Pressure. Real Attacks, Real Lessons, diving into one of the most insidious vectors in operational technology: hostile time. At 06:05, a rail control room gets a burst of alarms, but the chronological sequence is physically impossible. The interlocking system reports an input changing after the command that supposedly triggered it. Time synchronization is a physical operational dependency, not a forensic luxury. Today, we unpack the physics of attacks that introduce asymmetric network delays to silently shift clocks. Join us as we discuss establishing hard drift limits that trigger deterministic safe modes, and how to protect safety-relevant sequences using causality and Byzantine fault-tolerant state machines.

    Afficher plus Afficher moins
    46 min
  • The 18:45 Reflash: When Usability Friction Becomes a Threat
    Feb 25 2026

    In this new chapter of Cybersecurity Under Pressure. Real Attacks, Real Lessons, we tackle the dangerous intersection of operational friction and systems engineering. A dealership laptop starts a DoIP reflash at 18:45. The authentication portal lags, the technician forces a shared session to stay alive, and suddenly the trust chain is compromised by a manual workaround. This episode challenges the "IT vs. Workshop" divide, arguing that latency, token refresh rates, and bay throughput are strict security requirements. We discuss how to architect revocation as a safety-critical OT function using transactional flows and A/B partitions, and dive into formally verifying the backend-to-bootloader handshake as a robust state machine.

    Afficher plus Afficher moins
    23 min
  • The Friday Night Patch & The Illusion of Segmentation
    Feb 23 2026

    Welcome to a new episode of Cybersecurity Under Pressure. Real Attacks, Real Lessons. It is Friday at 22:30, and a rail depot applies a minor network change to fix a flaky engineering link. By Monday morning, everything looks functional, but the security boundary has silently drifted. In this chapter, we break down why probabilistic defense and manual audits fundamentally fail in OT environments. We explore how to treat IEC 62443 zones and conduits as mathematical invariants, leveraging intent-based network verification to compute actual data plane behavior from configurations. Tune in to learn how to continuously attest your running state against a signed baseline and definitively prove your segmentation.

    Afficher plus Afficher moins
    29 min
  • Weekly Roundup: State Machine Breakdown & Engineering the Degraded Mode
    Feb 21 2026

    Welcome to a new weekly roundup episode of Cybersecurity Under Pressure. Real Attacks, Real Lessons. This week, we examine a cascade of high-impact events across multiple critical sectors: a massive DDoS wave knocking Deutsche Bahn’s passenger systems offline, ransomware forcing the University of Mississippi Medical Center to revert to manual workflows, a major data breach of France's FICOBA bank account registry, and a ransomware strike on the semiconductor supply chain at Advantest.

    While the attack vectors differ, the operational failure mode shares a common thread. In this chapter, we analyze an uncomfortable truth: when core services degrade, operators stop following verified workflows and invent new ones under pressure. We discuss how this human response fundamentally bypasses your defined state machine, introducing untestable variables like shared logins and undocumented remote access paths. Finally, we explore how to leverage IEC 62443 zones and conduits alongside NIS2 accountability mandates to engineer degraded modes exactly like safety functions. Tune in to learn how to design pre-approved fallbacks, time-bounded break-glass procedures, and resilient logging that survives when everything else is on fire.

    Afficher plus Afficher moins
    41 min
  • Engineer the Path, Not Just the Perimeter
    Feb 20 2026

    A vendor fixes an alarm at 4 PM. At midnight, that same remote tunnel is used to push an unsafe setpoint. Different intent, identical path.


    How does your network know the difference? Spoiler: It doesn't.


    This is the synthesis. We connect the dots from the previous episodes, the Oldsmar attack and the break-glass dilemma, to deliver a final verdict: You cannot patch your way to safety. You have to design it. We explore how to move from abstract frameworks like IEC 62443 to a concrete "abuse-resistant" architecture.


    Tune in to learn why the most critical firewall in your plant isn't a device, it’s a design philosophy.

    Afficher plus Afficher moins
    33 min