Search Articles

Search through our archive of curated compliance and cybersecurity news.

Found 7 results for "SOC 2"

Clear search

Flaws in Claude Code Put Developers' Machines at Risk

Feb 25, 2026 Dark Reading security incident

Vulnerabilities discovered in Claude Code interpreter could potentially expose developers' machines to security risks. This security incident highlights the importance of secure code execution environments and vendor security practices in developm...

My Take: If you're letting AI tools execute code in your dev environment, you'd better understand their sandbox model—or lack thereof. This is a good reminder that "AI-powered" doesn't mean "security-reviewed," and your SOC 2 auditor is going to start asking about AI tools in scope whether you're ready or not.

From digest: 2026-08

Malicious Next.js repositories are being used in a social engineering campaign targeting developers through fraudulent job interview processes. Attackers are distributing compromised code packages designed to compromise developer environments and ...

My Take: The supply chain attack everyone's been worried about is now hiding in your hiring process—and your SOC 2 controls probably don't say a word about vetting code sent during interviews. Time to add "candidate-provided code" to your secure development policies before your next senior dev hire opens a backdoor.

From digest: 2026-08

Detecting and Monitoring OpenClaw (clawdbot, moltbot), (Tue, Feb 3rd)

Feb 03, 2026 SANS Internet Storm Center security incident

Article addresses detection and monitoring of OpenClaw malware variants (clawdbot, moltbot), which represents an active security threat. Organizations need to implement detection mechanisms and monitoring strategies to identify and respond to this...

My Take: If your detection stack can't spot an active, documented malware family like this, your SOC 2 controls are fiction. Use this as a test case—if your SIEM/EDR would miss OpenClaw variants, you've got bigger problems than this one threat.

From digest: 2026-05

A coordinated cyberattack attributed to Russian hacking group Sandworm targeted Poland's power grid in late December, compromising control and communications systems at approximately 30 energy facilities. While the attack did not cause power outag...

My Take: If you're running critical infrastructure on remote access without robust segmentation and monitoring, you're not compliant—you're just filling out paperwork. This attack didn't cause outages because the operators caught it, not because their SOC 2 checkboxes saved them.

From digest: 2026-04

Scanning Webserver with /$(pwd)/ as a Starting Path, (Sun, Jan 25th)

Jan 26, 2026 SANS Internet Storm Center security incident

Article discusses a webserver vulnerability scanning technique using /$(pwd)/ as an attack vector, which could lead to command injection or path traversal vulnerabilities. This type of security vulnerability is relevant to organizations maintainin...

My Take: If your vulnerability scanners aren't catching this kind of path injection nonsense, your SOC 2 "comprehensive vulnerability management" control is just paperwork. This is exactly the gap between passing an audit and actually having defensible infrastructure.

From digest: 2026-04

Corrupting LLMs Through Weird Generalizations

Jan 12, 2026 Schneier on Security security incident

Research demonstrates vulnerabilities in Large Language Models (LLMs) where narrow finetuning can cause unpredictable behavioral shifts and enable data poisoning attacks. The study reveals that LLMs can be corrupted through generalization mechanis...

My Take: If you're treating your LLM deployment like any other SaaS integration, you're missing the point—these things don't just break, they generalize in weird, unpredictable ways that turn a small poisoning attack into a systemic behavior shift. Your SOC 2 controls need to account for model drift and training data integrity, not just access logs and encryption at rest.

From digest: 2026-02

New GlassWorm malware wave targets Macs with trojanized crypto wallets

Jan 01, 2026 BleepingComputer security incident

GlassWorm malware campaign has launched a fourth wave targeting macOS developers through trojanized VSCode extensions in OpenVSX and Microsoft Visual Studio Marketplace. The malware steals developer credentials, cryptocurrency wallet data, browser...

My Take: If your developers are installing VS Code extensions without vetting them, your supply chain security controls are theoretical at best. This is exactly the kind of attack path your ISO 27001 asset management and SOC 2 change management controls should catch—but only if you're actually enforcing them beyond the policy doc.

From digest: 2026-01