Blogs about Threats
Sign up for our newsletter

Emerging Risks with Embedded LLM in Applications
Learn how the use of Large Language Models (LLMs) like OpenAI's GPT and Google's Bard can create security risks in your applications.
Read More

Supply Chain Attacks Overflow: PyPI Suspended New Registrations
On May 20th, PyPI (the official Python Package manager) announced they are temporarily suspending new users and new project registration.
Read More


The Business Risks and Costs of Source Code Leaks and Prevention Tips
Protect your business from the serious consequences of code leaks by taking proactive measures to enhance your cybersecurity posture.
Read More
Sophisticated 3CX Software Supply Chain Attack Affects Millions of Users
3CX, an international VoIP IPBX software, experienced software supply chain attack. We detail what occurred, and how it can be prevented.
Read More

The Top 8 Cloud Application Threats in 2023
Discover 8 of the top threats to cloud applications in 2023 and learn about techniques that can be employed to help keep your cloud applications secure.
Read More

The MarkdownTime Vulnerability: How to Avoid This DoS Attack on Business Critical Services
We explore a vulnerability we found in a popular implementation of the markdown engine and the potential Denial-of-Service (DoS) attack that it could cause on projects rendering markdown.
Read More
How to Continuously Detect Vulnerable Jenkins Plugins to Avoid a Software Supply Chain Attack
See how attackers used compromised Jenkins plugins to attack the software supply chain and how to continuously detect vulnerable Jenkins plugins at scale.
Read More



Software Supply Chain Attack Leads to Trojanized Comm100 Installer
On the 29th of September, it was revealed that the installer for the widely used Comm100 Live Chat application included malicious trojan malware. The installer was compromised using a supply chain attack on the Comm100 development pipeline.
Read More
Why You Can Still Get Hacked Even After Signing Your Software Artifacts
Malicious actors are poisoning your artifacts in an attempt to infect your software supply chain so that you deploy those compromised artifacts to your production servers.
Read More
New Software Supply Chain Attack Installs Trojans on Adobe's Magento E-Commerce Platform
A popular vendor of Magento-Wordpress plug-ins/integrations with 200,000 downloads, has been hacked. This attack is a reminder that malicious 3rd party plug-ins for popular platforms, in this case FishPig integrations for Magento e-commerce platforms, can open the door to critical vulnerabilities.
Read More


LastPass Software Supply Chain Attack: What Happened and Tips to Protect Against Similar Attacks
LastPass disclosed that an unauthorized party had gained access to portions of the LastPass developer environment. An attacker gained access to developer account credentials and used them to exfiltrate portions of their proprietary source code.
Read More
Breaking News: How a Massive Malware Attack Almost Occurred on GitHub
Earlier today, Stephan Lacy published a Twitter post about a massive attack on GitHub. Even though later it was understood that none of the original GitHub repositories was infected, the attack attempt is a huge deal.
Read More
Vulnerable GitHub Actions Workflows Part 2: Actions That Open the Door to CI/CD Pipeline Attacks
We examine a bug we’ve found in a popular third-party GitHub action and how it could lead to your SDLC pipeline being attacked. Read more to improve GitHub security and secure your software supply chain.
Read More
Latest GitHub OAuth Tokens Attack Explained and How to Protect Yourself
This GitHub OAuth access token attack was announced by GitHub Security and is a compromise of OAuth access tokens issued to Heroku and Travis-CI integrations.
Read More

Vulnerable GitHub Actions Workflows Part 1: Privilege Escalation Inside Your CI/CD Pipeline
Learn how Legit Security discovered a vulnerable GitHub actions workflow. Get details on the vulnerability and and what you can do to mitigate it.
Read More
Detecting Secrets in Your Source Code
What are secrets in source code, why they must be protected, and how to keep them safe.
Read MoreSchedule a Demo
Book a demo including the option to analyze your own software supply chain.