Comment by rvz
2 days ago
What do we have here? Unaudited software completely compromised with a fake SOC 2 and ISO 27001 certification.
An actual infosec audit would have rigorously enforced basic security best practices in preventing this supply chain attack.
No comments yet
Contribute on Hacker News ↗