Cybersecurity Under Pressure. Real Attacks, Real Lessons Podcast Por Antonio González arte de portada

Cybersecurity Under Pressure. Real Attacks, Real Lessons

Cybersecurity Under Pressure. Real Attacks, Real Lessons

De: Antonio González
Escúchala gratis

This podcast breaks down real cybersecurity incidents to understand what actually went wrong, not in theory, but in practice. Each episode analyzes a recent attack, explains the technical mechanics in clear language, and translates them into concrete lessons for security, engineering, and business teams. The focus is on operational reality, decision making under pressure, and the controls that truly reduce risk in production environments.Antonio González
Episodios
  • Jeep, Gateways and the Myth of Clean Isolation
    Mar 27 2026

    In this episode, we dive into why the infamous Jeep hack is not just nostalgia, but a live architectural problem that the automotive sector still wrestles with today.

    While connected features demand reach and product teams crave convenience, we explore how modern vehicle architectures struggle to neatly isolate trust boundaries in the real world.In theory, gateways, domain controllers, and embedded firewalls should separate critical functions.

    In practice, however, diagnostics, telematics, backend services, and over-the-air update paths keep creating privileged bridges across those very boundaries.

    The core challenge isn't simply about better CAN bus segmentation; it’s about whether a vehicle platform, already frozen across suppliers, validation cycles, and cost targets, can remain cleanly isolated as remote services and lifecycle updates continue to expand.

    The real risk is a security boundary that only exists on paper and gets looser with every program year.

    Join us as we unpack why the trust problem never truly left, but simply moved, and how emerging frameworks like UN R155, UN R156, and ISO/SAE 21434 are attempting to address these critical vulnerabilities

    Más Menos
    36 m
  • Rail Service Risk Starts Outside the SIL Boundary
    Mar 25 2026

    In this episode of Cybersecurity Under Pressure: Real Attacks, Real Problems, we explore the rapidly evolving threat landscape facing modern railway networks.

    The era of 'security by isolation' is officially over, as digital twins, AI, and interconnected operational technologies turn railways into massive, distributed attack surfaces.

    We break down real-world cyber incidents, including the 2023 Poland 'radio stop' attacks, the 2024 UK station Wi-Fi defacement, recent opportunistic incidents in Romania, and the severe service disruptions faced by Deutsche Bahn.

    We also discuss the very real, day-to-day problems facing operators today: from vulnerable legacy infrastructure and unencrypted radio frequencies, to the rising threat of supply chain sabotage and autonomous 'agentic AI' attacks.

    Join us as we analyze why hiding behind 'Non-SIL' (Safety Integrity Level) labels is a dangerous illusion that can collapse services and public trust, and how adopting technical specifications like TS 50701 and complying with the EU's NIS2 and CER directives can help transform reactive compliance into proactive cyber and physical resilience.

    Más Menos
    35 m
  • Oldsmar Was About Standing Trust
    Mar 23 2026

    In the realm of Operational Technology (OT), cyberattacks are not just IT problems; they are events with physical consequences, financial disasters, and threats to human safety. In this episode, we dive into how digital transformation and IT/OT convergence have expanded the attack surface, exposing critical infrastructure to unprecedented threats.

    We will explore devastating real-world cases that have shaped the history of industrial cybersecurity, including:

    ◦The attack on the Oldsmar water treatment plant (2021), where an attacker exploited remote access to attempt a dangerous increase in sodium hydroxide levels in the public water supply.

    ◦The ransomware attack on the Colonial Pipeline (2021), which forced a complete shutdown of physical pipeline operations supplying fuel to the US East Coast.

    ◦The Ukrainian power grid blackouts (2015 and 2016) caused by the BlackEnergy3 and Industroyer malware—the latter being the first malware specifically designed to attack power grids.

    ◦The sabotage of a German steel mill (2014), where attackers prevented the proper shutdown of a blast furnace, resulting in massive damage.

    ◦The infamous Stuxnet worm (2010), specifically designed to target industrial software and equipment like Iranian centrifuges.

    ◦The crisis at a semiconductor company (2018), which suffered $256 million in damages when a human error (connecting a new device without a virus scan) introduced the WannaCry ransomware and shut down the factory.

    ◦Legacy protocols: Older systems designed for reliability in noisy industrial environments, but lacking modern security controls like authentication or encryption.

    ◦The production vs. patching dilemma: Why applying security patches often feels riskier than leaving systems vulnerable, simply because continuous processes "cannot be stopped" without planned downtime.

    ◦Forgotten access: The critical issue of vendor VPNs opened for an urgent support session that mistakenly remain active months later.

    ◦Human error: From innocent mistakes like accidentally typing the wrong set points, to rebooting computers that cause safety systems to interpret data incorrectly and initiate plant shutdowns.

    Beyond the headlines, we will discuss the "real problems" that operators and engineers face in the trenches every day.

    Join us to understand why in the OT environment, safety and availability always trump confidentiality, and how industry standards and Zero Trust architectures offer a practical path toward resilience

    Más Menos
    19 m
Todavía no hay opiniones