Jorge Castañeda's Avatar

Jorge Castañeda

@jcastanedacano.bsky.social

Microsoft MVP - Security | Consultant Cloud | Speaker | Board Member de Cloud Security Alliance – Perú | Lider de la comunidad MUG Perú

75 Followers  |  334 Following  |  73 Posts  |  Joined: 21.10.2024
Posts Following

Posts by Jorge Castañeda (@jcastanedacano.bsky.social)

Developer-targeting campaign using malicious Next.js repositories

Developer-targeting campaign using malicious Next.js repositories

02.03.2026 23:00 — 👍 0    🔁 0    💬 0    📌 0
OAuth redirection abuse enables phishing and malware delivery

OAuth redirection abuse enables phishing and malware delivery

02.03.2026 22:00 — 👍 0    🔁 0    💬 0    📌 0
Monthly news - March 2026

Monthly news - March 2026

02.03.2026 13:00 — 👍 0    🔁 0    💬 0    📌 0
Demystifying the Client Repeatable Feature in Edge

Demystifying the Client Repeatable Feature in Edge

02.03.2026 08:00 — 👍 0    🔁 0    💬 0    📌 0
Running Text to Image and Text to Video with ComfyUI and Nvidia H100 GPU

Running Text to Image and Text to Video with ComfyUI and Nvidia H100 GPU

28.02.2026 00:00 — 👍 1    🔁 0    💬 0    📌 0
Top 5 Microsoft Sentinel Queries for Threat Hunting

Top 5 Microsoft Sentinel Queries for Threat Hunting

27.02.2026 20:02 — 👍 0    🔁 0    💬 0    📌 0
Ask Microsoft Anything: Data & AI Security in the Real World

Ask Microsoft Anything: Data & AI Security in the Real World

27.02.2026 18:00 — 👍 0    🔁 0    💬 0    📌 0
Top 5 Microsoft Sentinel Queries for Threat Hunting

Top 5 Microsoft Sentinel Queries for Threat Hunting

27.02.2026 16:00 — 👍 0    🔁 0    💬 0    📌 0
Core Collapse

Core Collapse

27.02.2026 00:00 — 👍 0    🔁 0    💬 0    📌 0
Unlocking value with Microsoft Sentinel data lake

Unlocking value with Microsoft Sentinel data lake

26.02.2026 23:00 — 👍 0    🔁 0    💬 0    📌 0
Threat modeling AI applications

Threat modeling AI applications

26.02.2026 19:00 — 👍 0    🔁 0    💬 0    📌 0
Introducing a faster, more intelligent, end-to-end insider risk investigation experience

Introducing a faster, more intelligent, end-to-end insider risk investigation experience

26.02.2026 18:00 — 👍 0    🔁 0    💬 0    📌 0
Authorization and Identity Governance Inside AI Agents

Authorization and Identity Governance Inside AI Agents

25.02.2026 18:00 — 👍 0    🔁 0    💬 0    📌 0
Build Sensitivity Label‑Aware, Secure RAG with Azure AI Search and Purview

Build Sensitivity Label‑Aware, Secure RAG with Azure AI Search and Purview

24.02.2026 22:00 — 👍 0    🔁 0    💬 0    📌 0
Disrupt AWS attacks automatically in Microsoft Sentinel

Disrupt AWS attacks automatically in Microsoft Sentinel

24.02.2026 20:00 — 👍 0    🔁 0    💬 0    📌 0
Developer-targeting campaign using malicious Next.js repositories

Developer-targeting campaign using malicious Next.js repositories

24.02.2026 19:00 — 👍 0    🔁 0    💬 0    📌 0
AI Security in Azure with Microsoft Defender for Cloud: Learn the How, Join the Session

AI Security in Azure with Microsoft Defender for Cloud: Learn the How, Join the Session

24.02.2026 18:00 — 👍 0    🔁 0    💬 0    📌 0
Scaling security operations with Microsoft Defender autonomous defense and expert-led services

Scaling security operations with Microsoft Defender autonomous defense and expert-led services

24.02.2026 14:00 — 👍 0    🔁 0    💬 0    📌 0
Introducing the next generation of SOC automation: Sentinel playbook generator

Introducing the next generation of SOC automation: Sentinel playbook generator

23.02.2026 22:00 — 👍 0    🔁 0    💬 0    📌 0
Introducing the next generation of SOC automation: Sentinel SOAR playbook generator

Introducing the next generation of SOC automation: Sentinel SOAR playbook generator

23.02.2026 18:00 — 👍 0    🔁 0    💬 0    📌 0
Security baseline for Windows Server 2025, version 2602

Security baseline for Windows Server 2025, version 2602

23.02.2026 16:00 — 👍 0    🔁 0    💬 0    📌 0
Managed Identity on SQL Server On-Prem: The End of Stored Secrets

Managed Identity on SQL Server On-Prem: The End of Stored Secrets

23.02.2026 13:00 — 👍 0    🔁 0    💬 0    📌 0
Three ways to run KQL on Microsoft Sentinel data lake: Interactive, Async, or Jobs

Three ways to run KQL on Microsoft Sentinel data lake: Interactive, Async, or Jobs

19.02.2026 22:00 — 👍 0    🔁 0    💬 0    📌 0
Running OpenClaw safely: identity, isolation, and runtime risk

Running OpenClaw safely: identity, isolation, and runtime risk

19.02.2026 21:00 — 👍 0    🔁 0    💬 0    📌 0
CCM v4.1 Transition Timeline

CCM v4.1 Transition Timeline

19.02.2026 20:00 — 👍 0    🔁 0    💬 0    📌 0
Accelerate Your UEBA Journey: Introducing the Microsoft Sentinel Behaviors Workbook

Accelerate Your UEBA Journey: Introducing the Microsoft Sentinel Behaviors Workbook

19.02.2026 19:00 — 👍 0    🔁 0    💬 0    📌 0
New e-book: Establishing a proactive defense with Microsoft Security Exposure Management

New e-book: Establishing a proactive defense with Microsoft Security Exposure Management

19.02.2026 18:00 — 👍 0    🔁 0    💬 0    📌 0
Data Quality (DQ) for Standalone Data Assets at Microsoft Purview

Data Quality (DQ) for Standalone Data Assets at Microsoft Purview

19.02.2026 17:00 — 👍 0    🔁 0    💬 0    📌 0
Windows Hello for Business - Registered Methods and Last-used Method

Windows Hello for Business - Registered Methods and Last-used Method

19.02.2026 12:00 — 👍 0    🔁 0    💬 0    📌 0
The strategic SIEM buyer’s guide: Choosing an AI-ready platform for the agentic era

The strategic SIEM buyer’s guide: Choosing an AI-ready platform for the agentic era

19.02.2026 09:00 — 👍 0    🔁 0    💬 0    📌 0