Skip to main content
Juan Carlos Munera

Juan Carlos Munera

Cybersecurity and GRC Professional

I’m a cybersecurity and compliance professional working at the intersection of engineering and GRC.

Recent

Reading the 2026 Verizon DBIR: AI Is the Catalyst, Not the Threat Actor

The 2026 DBIR landed today, and the headline numbers tell two stories at once: attackers are getting faster and more efficient, but the techniques they’re running are the same ones we’ve been talking about for years. AI is showing up everywhere in the data, but it’s behaving like a productivity tool, not a new adversary.

When the Negotiator Is on Both Sides of the Table: Rethinking IR Trust After the BlackCat Sentencings

On April 30, 2026, two former incident response professionals were sentenced to four years in federal prison each for conducting BlackCat ransomware attacks against U.S. companies. One had been an IR manager at a well-known IR firm. The other had been a ransomware negotiator at a separate well-known firm. The case forces a question most organizations have never seriously asked: what is the actual control model for the people you call when everything is on fire?

FIRESTARTER and the Detection Gap CISA Just Made Official

On April 23, 2026, CISA and the UK NCSC published a malware analysis report on FIRESTARTER, a custom backdoor that survives patching, reboots, and firmware upgrades on Cisco Firepower and Secure Firewall devices. The federal directive itself states that Sigma rules are not effective against it. That admission has implications well beyond the federal civilian executive branch.

Claude Opus 4.7 Drops with Built-In Cyber Safeguards: What Security Practitioners Need to Know

Anthropic shipped Claude Opus 4.7 today as its most capable generally available model, but the cybersecurity story is bigger than the benchmarks. The model includes automated safeguards that block high-risk cyber requests, deliberately reduced offensive capabilities compared to Mythos Preview, and a new Cyber Verification Program that gates legitimate security use behind a formal application process. This is the first generally available model where Anthropic is actively testing the controls it needs before it can release Mythos-class capabilities to the public.

Operation Masquerade: FBI Disrupts APT28 Campaign Across 18,000 Hijacked Routers

The threat group tracked as APT28 (Forest Blizzard/Fancy Bear) compromised 18,000 SOHO routers across 120+ countries by exploiting known vulnerabilities and default SNMP credentials. They modified DNS settings to redirect traffic through attacker-controlled servers, enabling adversary-in-the-middle attacks that harvested Microsoft OAuth tokens, passwords, and emails from 200+ organizations. The FBI’s Operation Masquerade sent court-authorized commands to reset compromised routers on U.S. soil.