- Blog
- Authors
- Nadav Noy
Nadav Noy
Showing all posts by Nadav Noy
Securing AI-Generated Code
Explore Legit Security's revolutionary AI application security, risks, and solutions in our blog.
Read MoreEmerging Risks with Embedded LLM in Applications
Learn how the use of Large Language Models (LLMs) like OpenAI's GPT and Google's Bard can create security risks in your applications.
Read MoreSecuring Your CI/CD Pipeline: Exploring the Dangers of Self-Hosted Runners
CI/CD automates software development, while self-hosted runners enable general customization. SaaS platforms provide limited control.
Read MoreSophisticated 3CX Software Supply Chain Attack Affects Millions of Users
3CX, an international VoIP IPBX software, experienced software supply chain attack. We detail what occurred, and how it can be prevented.
Read MoreHow to Continuously Detect Vulnerable Jenkins Plugins to Avoid a Software Supply Chain Attack
See how attackers used compromised Jenkins plugins to attack the software supply chain and how to continuously detect vulnerable Jenkins plugins at scale.
Read MoreSoftware Supply Chain Attack Leads to Trojanized Comm100 Installer
On the 29th of September, it was revealed that the installer for the widely used Comm100 Live Chat application included malicious trojan malware. The installer was compromised using a supply chain attack on the Comm100 development pipeline.
Read More5 Things You Need to Know About Application Security in DevOps
AppSec isn’t always top of mind - but it should be. And here’s why. Learn about the 5 things you need to know about application security in DevOps.
Read MoreRequest a Demo
Request a demo including the option to analyze your own software supply chain.