Showing all posts by Nadav Noy




Securing AI-Generated Code
Explore Legit Security's revolutionary AI application security, risks, and solutions in our blog.
Read More
Emerging Risks with Embedded LLM in Applications
Learn how the use of Large Language Models (LLMs) like OpenAI's GPT and Google's Bard can create security risks in your applications.
Read More
Securing Your CI/CD Pipeline: Exploring the Dangers of Self-Hosted Runners
CI/CD automates software development, while self-hosted runners enable general customization. SaaS platforms provide limited control.
Read More
Sophisticated 3CX Software Supply Chain Attack Affects Millions of Users
3CX, an international VoIP IPBX software, experienced software supply chain attack. We detail what occurred, and how it can be prevented.
Read More

How to Continuously Detect Vulnerable Jenkins Plugins to Avoid a Software Supply Chain Attack
See how attackers used compromised Jenkins plugins to attack the software supply chain and how to continuously detect vulnerable Jenkins plugins at scale.
Read More

Software Supply Chain Attack Leads to Trojanized Comm100 Installer
On the 29th of September, it was revealed that the installer for the widely used Comm100 Live Chat application included malicious trojan malware. The installer was compromised using a supply chain attack on the Comm100 development pipeline.
Read More
What Is AppSec? Application Security 101
Discover the fundamentals of what AppSec is, its importance, types of tools, and best practices to protect your applications from vulnerabilities.
Read MoreRequest a Demo
Request a demo including the option to analyze your own software supply chain.