Cybersecurity Under Pressure. Real Attacks, Real Lessons

By Antonio González

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.


Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 2
Reviews: 0
Episodes: 46

Description

This podcast breaks down real cybersecurity incidents to understand what actually went wrong, not in theory, but in practice. Each episode analyzes a recent attack, explains the technical mechanics in clear language, and translates them into concrete lessons for security, engineering, and business teams. Topics covered: OT security, ICS cybersecurity, industrial control systems, critical infrastructure protection, NIS2 compliance, Zero Trust architecture, operational technology resilience, railway cybersecurity, automotive security, and cyber-physical systems.

Episode Date
When a Patch Reopens the Safety Case
May 20, 2026
The Trap of the Trusted Engineering Session
May 19, 2026
When VEX Becomes a Bureaucratic Shield
May 15, 2026
Why FRMCS Cannot Trust the Mobile Carrier
May 13, 2026
The Token That Bypassed the Jump Host
May 11, 2026
Poisoning the Software Defined Vehicle at Birth
May 08, 2026
Why Rail Operators Fear the Patch
May 06, 2026
When Physics is the Final Firewall
May 04, 2026
That is the part many cybersecurity plans still miss, OT controls under revision
May 01, 2026
Supply Chain: When the supplier will not cooperate resilience must become
Apr 29, 2026
Zero Trust in OT does not start at the HMI
Apr 27, 2026
[2026] Critical: The NIS2 problem is no longer whether the | Incident Response
Apr 24, 2026
[2026] Deep Dive: Some of the hardest OT risks in rail | Zero Trust
Apr 22, 2026
[2026] Deep Dive: A bad weld passes inspection | OT Security
Apr 20, 2026
[2026] Critical: Zero Trust for Brownfield OT - IEC 62443
Apr 17, 2026
[2026] Critical: Vendor Lock-in - Ransomware
Apr 15, 2026
[2026] Critical: The Plausibility Gap - IEC 62443
Apr 13, 2026
IBM Data Breach Report 2026: The $1.9M Resilience Gap and NIS2 Compliance
Apr 10, 2026
The 56% Problem: Why Attackers No Longer Need Passwords (IBM X-Force Analysis)
Apr 08, 2026
When Your Security Scanner Becomes the Trojan Horse: The CERT-EU Supply Chain Breach
Apr 06, 2026
Why Evidence Does Not Equal Confidence
Apr 03, 2026
Legacy rail assets do not become secure by policy
Apr 01, 2026
If the secure reflash takes longer, the shortcut wins
Mar 30, 2026
Jeep, Gateways and the Myth of Clean Isolation
Mar 27, 2026
Rail Service Risk Starts Outside the SIL Boundary
Mar 25, 2026
Oldsmar Was About Standing Trust
Mar 23, 2026
Why Quantum Security Paralyzes Industrial Infrastructure
Mar 20, 2026
Cybersecurity Under Pressure: The Executive Brief
Mar 19, 2026
How Stolen Credentials Break Industrial Plants
Mar 18, 2026
Cybersecurity Under Pressure: The Executive Brief
Mar 17, 2026
Why Hidden Text Hacks Enterprise AI
Mar 16, 2026
DDoS and Hacktivism: When Disruption Becomes a Board-Level Threat
Mar 14, 2026
[2026] Urgent: When AI Agents Become the New Insider Threat - Zero Trust
Mar 11, 2026
[2026] Critical: Logged In, Not Hacked - Railway
Mar 09, 2026
KEV-First Patch Ops: Defending the Exposed Control Plane
Mar 06, 2026
The Illusion of MFA: AiTM Phishing and Session Token Theft
Mar 04, 2026
Automotive Extortion Goes Upstream: Protecting the New Vehicle Perimeter
Mar 02, 2026
Invisible Conduits: The Control Plane Siege
Feb 28, 2026
Hostile Time: When the Clock Lies in Critical OT
Feb 27, 2026
The 18:45 Reflash: When Usability Friction Becomes a Threat
Feb 25, 2026
The Friday Night Patch & The Illusion of Segmentation
Feb 23, 2026
Weekly Roundup: State Machine Breakdown & Engineering the Degraded Mode
Feb 21, 2026
Engineer the Path, Not Just the Perimeter
Feb 20, 2026
02:00 AM Panic: Does "Break-Glass" Mean "Break-Security"?
Feb 18, 2026
When Maintenance Becomes the Weapon: The Oldsmar Incident
Feb 16, 2026
[2026] Critical: When the Hypervisor Becomes the Attack Surface - Patching
Feb 07, 2026