What You Need to Know About the XZ Utils Backdoor

What You Need to Know About the XZ Utils Backdoor

| | AppSec, Legit, threats
Understand how to respond to the announcement of the XZ Utils backdoor ...
How to Get the Most From Your Secrets Scanning

How to Get the Most From Your Secrets Scanning

Secret scanning is essential for unlocking next-level software supply chain security. Get tips & best practices for optimal secret scanning to secure your code ...
Microsoft Under Attack by Russian Cyberattackers

Microsoft Under Attack by Russian Cyberattackers

Understand how these attackers are operating and what their tactics mean for security strategies ...
Using AI to Reduce False Positives in Secrets Scanners

Using AI to Reduce False Positives in Secrets Scanners

| | AppSec, Best Practices, Legit
Get an overview of how secrets scanners work, and how Legit is dramatically reducing secret-scanning false positives ...
Azure Devops Zero-Click CI/CD Vulnerability

Azure Devops Zero-Click CI/CD Vulnerability

| | AppSec, Legit, SCMS, threats
The Legit Security research team has found and reported a zero-click attack that allowed attackers to submit malicious code and access secrets. The vulnerability does not require any action from the project ...
Looking back on a Legit 2023

Looking back on a Legit 2023

| | Legit
2023 was Legit! 2023 was a legit year for Legit Security and I could not be any prouder of the team’s progress! ...
Legit Discovers "AI Jacking" Vulnerability in Popular Hugging Face AI Platform

Legit Discovers “AI Jacking” Vulnerability in Popular Hugging Face AI Platform

| | Legit, threats
Our research revealed how attackers could leverage Hugging Face, the popular AI development and collaboration platform, to carry out an AI supply chain attack that could impact tens of thousands of developers ...
Securing AI-Generated Code

Securing AI-Generated Code

| | Explainers, Legit
Legit Security is the first ASPM platform with advanced capabilities to secure generative AI-based applications and bring visibility, security, and governance into code-generating AI. Millions of developers are using AI-based code assistants ...
OpenSSF SCM Best Practices Guide Released With Contributions From Legitify

OpenSSF SCM Best Practices Guide Released With Contributions From Legitify

| | Legit
We're thrilled to share that the OpenSSF SCM Best Practices working group has released its SCM Best Practices Guide. This guide is the result of collaborative efforts between Legit Security and several ...
Legit Security and CrowdStrike: Securing Applications from Code Creation to Cloud Deployment

Legit Security and CrowdStrike: Securing Applications from Code Creation to Cloud Deployment

| | AppSec, integration, Legit
Cloud environments and the applications running on them present an enormous attack surface that’s frequently exploited. Protecting runtime environments in the cloud is certainly a top concern for any CISO, but solutions ...