<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Cybersecurity Engineering on Juan Carlos Munera</title><link>https://cybersecpro.me/categories/cybersecurity-engineering/</link><description>Recent content in Cybersecurity Engineering on Juan Carlos Munera</description><generator>Hugo -- gohugo.io</generator><language>en</language><copyright>© 2026 Juan Carlos Munera</copyright><lastBuildDate>Thu, 16 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://cybersecpro.me/categories/cybersecurity-engineering/index.xml" rel="self" type="application/rss+xml"/><item><title>Claude Opus 4.7 Drops with Built-In Cyber Safeguards: What Security Practitioners Need to Know</title><link>https://cybersecpro.me/posts/claude-opus-4-7-cyber-safeguards-verification-program/</link><pubDate>Thu, 16 Apr 2026 00:00:00 +0000</pubDate><guid>https://cybersecpro.me/posts/claude-opus-4-7-cyber-safeguards-verification-program/</guid><description>Anthropic shipped Claude Opus 4.7 today as its most capable generally available model, but the cybersecurity story is bigger than the benchmarks. The model includes automated safeguards that block high-risk cyber requests, deliberately reduced offensive capabilities compared to Mythos Preview, and a new Cyber Verification Program that gates legitimate security use behind a formal application process. This is the first generally available model where Anthropic is actively testing the controls it needs before it can release Mythos-class capabilities to the public.</description></item><item><title>CPU-Z and HWMonitor Hijacked: Inside the CPUID Supply Chain Attack</title><link>https://cybersecpro.me/posts/cpuid-cpu-z-hwmonitor-supply-chain-attack/</link><pubDate>Sun, 12 Apr 2026 00:00:00 +0000</pubDate><guid>https://cybersecpro.me/posts/cpuid-cpu-z-hwmonitor-supply-chain-attack/</guid><description>Attackers compromised CPUID&amp;rsquo;s official website and swapped download links for CPU-Z and HWMonitor with trojanized packages delivering STX RAT. The attack targeted the exact tools IT professionals carry on USB drives and run on production servers, turning implicit trust in a 20-year-old download source into a direct path to privileged credentials.</description></item></channel></rss>