Blogs about

Learn about advanced persistent threat (APT)s, including examples and key prevention strategies.

Advanced Persistent Threat (APT): Examples and Prevention

January 17, 2025

Learn about advanced persistent threat (APT)s, including examples and key prevention strategies.

Read More
Get details on this new cybersecurity Executive Order and its implications. 

White House Executive Order: Strengthening and Promoting Innovation in the Nation’s Cybersecurity

January 16, 2025

Get details on this new cybersecurity Executive Order and its implications. 

Read More
Find out why unknown build assets is a growing problem and how Legit can help.

How to Prevent Risk From Unknown Build Assets

January 14, 2025

Find out why unknown build assets is a growing problem and how Legit can help.

Read More
Get details on Legit's ability to scan for secrets in ServiceNow tickets.

Legit Scans for Secrets in ServiceNow ITSM Tickets

January 08, 2025

Get details on Legit's ability to scan for secrets in ServiceNow tickets.

Read More
What is privilege escalation? Learn how attackers exploit it, ways to prevent such attacks, and strengthen your defenses from unauthorized access.

What Is Privilege Escalation? Types, Examples, and Prevention

December 19, 2024

What is privilege escalation? Learn how attackers exploit it, ways to prevent such attacks, and strengthen your defenses from unauthorized access.

Read More
Implement detection as code to boost your cybersecurity operations. Learn how to create modular, reusable detection logic and build a pipeline.

Detection as Code: Key Components, Tools, and More

December 19, 2024

Implement detection as code to boost your cybersecurity operations. Learn how to create modular, reusable detection logic and build a pipeline.

Read More
Learn how to create and use Kubernetes Secrets to store sensitive data securely. Discover the best practices to manage secrets in your Kubernetes cluster.

Kubernetes Secrets: How to Create and Use Them

December 19, 2024

Learn how to create and use Kubernetes Secrets to store sensitive data securely. Discover the best practices to manage secrets in your Kubernetes cluster.

Read More
Get details on Legit's new secrets capabilities.

Announcing Legit Secrets Detection & Prevention 2.0

December 19, 2024

Get details on Legit's new secrets capabilities.

Read More
Explore what an ISO/IEC 27001 certification is and how to get it. Understand the key requirements, processes, and costs to achieve compliance successfully.

ISO/IEC 27001 Certification: Process and Costs

November 14, 2024

Explore what an ISO/IEC 27001 certification is and how to get it. Understand the key requirements, processes, and costs to achieve compliance successfully.

Read More
Learn about what the software supply chain is and why it’s important to incorporate the whole software factory into security efforts.

What Is a Software Supply Chain?

November 14, 2024

Learn about what the software supply chain is and why it’s important to incorporate the whole software factory into security efforts.

Read More
Discover what a software supply chain attack means for your business and how to mitigate risk if (and when) it happens.

What’s a Software Supply Chain Attack? Examples and Prevention

October 08, 2024

Discover what a software supply chain attack means for your business and how to mitigate risk if (and when) it happens.

Read More
Discover the importance of Application Security Posture Management (ASPM) in financial software protection. Learn how ASPM enhances security practices and compliance in the U.S. financial services sector through Legit Security.

Securing the Vault: ASPM's Role in Financial Software Protection

May 07, 2024

Discover the importance of Application Security Posture Management (ASPM) in financial software protection. Learn how ASPM enhances security practices and compliance in the U.S. financial services sector through Legit Security.

Read More
Legit Security | Securing the Software Supply Chain: Risk Management Tips. Securing the software supply chain can seem daunting, but with the right strategy, you can optimize your software supply chain risk management practices.

Securing the Software Supply Chain: Risk Management Tips

April 01, 2024

Securing the Software Supply Chain: Risk Management Tips. Securing the software supply chain can seem daunting, but with the right strategy, you can optimize your software supply chain risk management practices.

Read More
Legit Security | What You Need to Know About the XZ Utils Backdoor.

What You Need to Know About the XZ Utils Backdoor

March 30, 2024

What You Need to Know About the XZ Utils Backdoor.

Read More
Legit Security | How to Get the Most From Your Secrets Scanning. Secret scanning is essential for unlocking next-level software supply chain security. Get tips & best practices for optimal secret scanning to secure your code.

How to Get the Most From Your Secrets Scanning

March 25, 2024

How to Get the Most From Your Secrets Scanning. Secret scanning is essential for unlocking next-level software supply chain security. Get tips & best practices for optimal secret scanning to secure your code.

Read More
Legit Security | Microsoft Under Attack by Russian Cyberattackers. Understand how these attackers are operating and what their tactics mean for security strategies.

Microsoft Under Attack by Russian Cyberattackers

March 15, 2024

Microsoft Under Attack by Russian Cyberattackers. Understand how these attackers are operating and what their tactics mean for security strategies.

Read More
Legit Security | Using AI to Reduce False Positives in Secrets Scanners. Get an overview of how secrets scanners work, and how Legit is reducing secret-scanning false positives..  

Using AI to Reduce False Positives in Secrets Scanners

March 11, 2024

Using AI to Reduce False Positives in Secrets Scanners. Get an overview of how secrets scanners work, and how Legit is reducing secret-scanning false positives..  

Read More
The Legit Security research team has found and reported a zero-click attack that allowed attackers to submit malicious code and access secrets.

Azure Devops Zero-Click CI/CD Vulnerability

January 31, 2024

The Legit Security research team has found and reported a zero-click attack that allowed attackers to submit malicious code and access secrets.

Read More
Legit Security | Reflections on a Legit 2023 and why we're excited as we look ahead to the new year.

Looking back on a Legit 2023

January 10, 2024

Reflections on a Legit 2023 and why we're excited as we look ahead to the new year.

Read More
Legit Security | Uncovering 'AIJacking': How Attackers Exploit Hugging Face for AI Supply Chain Attacks - A Deep Dive into Vulnerabilities and Risks.

Legit Discovers "AI Jacking" Vulnerability in Popular Hugging Face AI Platform

October 24, 2023

Uncovering 'AIJacking': How Attackers Exploit Hugging Face for AI Supply Chain Attacks - A Deep Dive into Vulnerabilities and Risks.

Read More
Legit Security | Explore Legit Security's revolutionary AI application security, risks, and solutions in our blog.

Securing AI-Generated Code

September 18, 2023

Explore Legit Security's revolutionary AI application security, risks, and solutions in our blog.

Read More
Legit Security | Explore the collaborative effort by OpenSSF and leading security vendors in the release of SCM Best Practices Guide.

OpenSSF SCM Best Practices Guide Released With Contributions From Legitify

September 13, 2023

Explore the collaborative effort by OpenSSF and leading security vendors in the release of SCM Best Practices Guide.

Read More
Legit Security | Legit Security's ASPM platform offers an enterprise-grade ASPM solution, proven by customers.

Legit Security and CrowdStrike: Securing Applications from Code Creation to Cloud Deployment

August 29, 2023

Legit Security's ASPM platform offers an enterprise-grade ASPM solution, proven by customers.

Read More
Legit Security | Legit Security's ASPM platform offers an enterprise-grade ASPM solution, proven by customers.

Legit Security ASPM Platform Update: Accelerating AppSec Efficiency and Effectiveness

August 21, 2023

Legit Security's ASPM platform offers an enterprise-grade ASPM solution, proven by customers.

Read More
Legit Security | This blog shows another case of GitHub Actions environment injection vulnerability in a Google repository.

How We Found Another GitHub Actions Environment Injection Vulnerability in a Google Project

July 03, 2023

This blog shows another case of GitHub Actions environment injection vulnerability in a Google repository.

Read More
 Legit Security | This blog analyzes trends in application security and predicts the future direction of enterprise application security programs.

2023 Predictions for Modern Application Security

July 03, 2023

This blog analyzes trends in application security and predicts the future direction of enterprise application security programs.

Read More
Legit Security | Get insights into the elements of ASPM to learn how this approach transforms AppSec and enables teams to deliver securely at scale. 

What is Application Security Posture Management – Insights Into Gartner’s® New Report

May 15, 2023

Get insights into the elements of ASPM to learn how this approach transforms AppSec and enables teams to deliver securely at scale. 

Read More
Legit Security | Our team investigated how sensitive information can get exposed via SDLC tools that may be used as part of your development pipeline.

Exposing Secrets Via SDLC Tools: The Artifactory Case

February 28, 2023

Our team investigated how sensitive information can get exposed via SDLC tools that may be used as part of your development pipeline.

Read More
Legitify is an open-source GitHub and GitLab configuration scanner from Legit Security that helps manage & enforce SCM configuration best practices in a secure and scalable way

Legitify adds support for GitLab and GitHub Enterprise Server

January 25, 2023

Legitify is an open-source GitHub and GitLab configuration scanner from Legit Security that helps manage & enforce SCM configuration best practices in a secure and scalable way

Read More
Explore our findings on a common markdown syntax vulnerability and its potential to cause Denial-of-Service (DoS) attacks.

The MarkdownTime Vulnerability: How to Avoid DoS Attack on Business

January 18, 2023

Explore our findings on a common markdown syntax vulnerability and its potential to cause Denial-of-Service (DoS) attacks.

Read More
See how attackers used compromised Jenkins plugins to attack the software supply chain and how to continuously detect vulnerable Jenkins plugins at scale.

How to Continuously Detect Vulnerable Jenkins Plugins to Avoid a Software Supply Chain Attack

January 04, 2023

See how attackers used compromised Jenkins plugins to attack the software supply chain and how to continuously detect vulnerable Jenkins plugins at scale.

Read More
Legitify is an open-source GitHub configuration scanner from Legit Security that helps manage & enforce GitHub configurations in a secure and scalable way

Introducing Legitify: A Better Way To Secure GitHub

October 05, 2022

Legitify is an open-source GitHub configuration scanner from Legit Security that helps manage & enforce GitHub configurations in a secure and scalable way

Read More
Learn how Legit Security discovered a vulnerable GitHub actions workflow that affected Google, Apache and potentially many more. Get details on the vulnerability and what you can do to mitigate it.

Google & Apache Found Vulnerable to GitHub Environment Injection

September 01, 2022

Learn how Legit Security discovered a vulnerable GitHub actions workflow that affected Google, Apache and potentially many more. Get details on the vulnerability and what you can do to mitigate it.

Read More
A review of our contributions to the open source community and why the open source community is important to the future of software supply chain security.

The Open Source Community And Its Critical Role in Software Supply Chain Security

June 13, 2022

A review of our contributions to the open source community and why the open source community is important to the future of software supply chain security.

Read More
We examine a bug we’ve found in a popular third-party GitHub action and how it could lead to your SDLC pipeline being attacked. Read more to improve GitHub security and secure your software supply chain.

Vulnerable GitHub Actions Workflows Part 2: Actions That Open the Door to CI/CD Pipeline Attacks

May 02, 2022

We examine a bug we’ve found in a popular third-party GitHub action and how it could lead to your SDLC pipeline being attacked. Read more to improve GitHub security and secure your software supply chain.

Read More
Learn how Legit Security discovered a vulnerable GitHub actions workflow. Get details on the vulnerability and and what you can do to mitigate it.

Vulnerable GitHub Actions Workflows Part 1: Privilege Escalation Inside Your CI/CD Pipeline

April 04, 2022

Learn how Legit Security discovered a vulnerable GitHub actions workflow. Get details on the vulnerability and and what you can do to mitigate it.

Read More
Join us in celebrating the release of stealth mode.

Announcing Legit Security: The Story Behind Our Mission

January 28, 2022

Join us in celebrating the release of stealth mode.

Read More

Request a demo including the option to analyze your own software supply chain.