Showing all posts by Tor Beer
![Legit Security | Our team investigated how sensitive information can get exposed via SDLC tools that may be used as part of your development pipeline.](https://20956152.fs1.hubspotusercontent-na1.net/hub/20956152/hubfs/Blog%20Exposing%20Secrets%20%282%29.png?width=740&height=220&name=Blog%20Exposing%20Secrets%20%282%29.png)
Exposing Secrets Via SDLC Tools: The Artifactory Case
Our team investigated how sensitive information can get exposed via SDLC tools that may be used as part of your development pipeline.
Read More![Legit Security | We investigate how sensitive information can get exposed via AppSec tools that you use in your dev pipeline, using the SonarQube Case.](https://20956152.fs1.hubspotusercontent-na1.net/hub/20956152/hubfs/3020e7f2-b389-40d8-9030-a202c8454f3d.png?width=740&height=220&name=3020e7f2-b389-40d8-9030-a202c8454f3d.png)
![We explore our findings in a popular implementation vulnerability of the markdown engine and potential Denial-of-Service (DoS) attack that it could cause.](https://20956152.fs1.hubspotusercontent-na1.net/hub/20956152/hubfs/MarkdownTime2.png?width=740&height=220&name=MarkdownTime2.png)
![Earlier today, Stephan Lacy published a Twitter post about a massive attack on GitHub. Even though later it was understood that none of the original GitHub repositories was infected, the attack attempt is a huge deal.](https://20956152.fs1.hubspotusercontent-na1.net/hub/20956152/hubfs/GitHub%20Malware%20Attempt%20Blog.jpg?width=740&height=220&name=GitHub%20Malware%20Attempt%20Blog.jpg)
Breaking News: How a Massive Malware Attack Almost Occurred on GitHub
Earlier today, Stephan Lacy published a Twitter post about a massive attack on GitHub. Even though later it was understood that none of the original GitHub repositories was infected, the attack attempt is a huge deal.
Read More![Create a Secure Software Supply Chain in 10 Easy Steps
In today’s age of security breaches, it’s more important than ever to create a secure software supply chain. Follow these 10 easy steps to keep your business safe.](https://20956152.fs1.hubspotusercontent-na1.net/hub/20956152/hubfs/Secure%20Your%20Supply%20Chain%20in%2010%20Steps.jpg?width=740&height=220&name=Secure%20Your%20Supply%20Chain%20in%2010%20Steps.jpg)
How to Secure Your Software Supply Chain in 10 Steps
Create a Secure Software Supply Chain in 10 Easy Steps In today’s age of security breaches, it’s more important than ever to create a secure software supply chain. Follow these 10 easy steps to keep your business safe.
Read More![On April 1st, GitLab announced Critical Security Release CVE-2022-1162, disclosing a very bizarre vulnerability and illustrating some important lessons in securing a software supply chain.](https://20956152.fs1.hubspotusercontent-na1.net/hub/20956152/hubfs/GitLab%20Backdoor%20header%20image_59175186-5afd-4896-b789-4c46e0443997.png?width=740&height=220&name=GitLab%20Backdoor%20header%20image_59175186-5afd-4896-b789-4c46e0443997.png)
A Cautionary Tale: The Untold Story of the GitLab CVE Backdoor (CVE-2022-1162)
On April 1st, GitLab announced Critical Security Release CVE-2022-1162, disclosing a very bizarre vulnerability and illustrating some important lessons in securing a software supply chain.
Read MoreRequest a Demo
Request a demo including the option to analyze your own software supply chain.