266 blog posts published by month since the start of 2023. Start from a different year:

Blog URL
Posts year-to-date
87 (82 posts by this month last year.)
Average posts per month since 2023
7.4

Post details (2023 to today)

Title Author Date Word count HN points
Machine Learning Bug Bonanza – Exploiting ML Clients and “Safe” Model Formats Shachar Menashe, JFrog VP Security Research Dec 04, 2024 2650 -
Expanding Artifactory’s Hugging Face Support with Datasets Sean Pratt, Senior Manager, JFrog Jul 16, 2024 436 -
Point Solutions vs Platform – Which is Best to Secure your Software Supply Chain? Shani Achwal, Senior Product Marketing Manager Jul 25, 2024 353 -
JFrog swampUP 2025: News and Updates Live From the Show Floor The JFrog Team Sep 09, 2025 6080 -
JFrog Security research discovers coordinated attacks on Docker Hub that planted millions of malicious repositories Andrey Polkovnichenko, JFrog Security Researcher Apr 30, 2024 3271 -
CVE-2024-38428 Wget Vulnerability: All you need to know Goni Golan, Junior Security Researcher, JFrog Security Aug 12, 2024 1817 -
Top 5 Reasons to Attend JFrog’s Inaugural swampUP Europe 2025 The JFrog Team Oct 16, 2025 626 -
A Heartfelt Thank You to Jessica Neal Shlomi Ben Haim, CEO & Co-founder, JFrog Mar 28, 2025 219 -
Three approaches to strengthening security with allowlists Avinash Jha, Solution Engineer, JFrog Jun 21, 2023 950 -
Combine Copilot and JFrog Artifactory for Maximum Efficiency Batel Zohar, JFrog Developer Advocate Aug 07, 2023 504 -
Accelerating Enterprise AI Development: A Guide to the JFrog-NVIDIA NIM Integration Kristian Taernhed, JFrog Senior Technical Alliance Manager Mar 04, 2025 759 -
Real best practices for modern application development Melissa McKay, Developer Advocate, JFrog Aug 03, 2023 1133 -
Advancing MLOps with JFrog and Qwak Yonatan Arbel, JFrog Developer Advocate Feb 28, 2024 818 -
The State of the Software Supply Chain 2025 Sean Pratt, Senior Manager, JFrog Apr 01, 2025 999 -
Empowering DevSecOps: JFrog’s Enterprise-Ready Platform for Federal NIST SP 800-218 Compliance Sudhindra Rao, Strategic Solutions Architect Jan 31, 2024 702 -
CVE-2025-6515 Prompt Hijacking Attack – How Session Hijacking Affects MCP Ecosystems Ori Hollander, JFrog Security Researcher Oct 21, 2025 1678 -
CVE-2025-29927 – Authorization Bypass Vulnerability in Next.js: All You Need to Know Yoav Saporta, JFrog Junior Security Researcher Mar 24, 2025 1660 -
The Power of JFrog Artifactory as Your Model Registry Rami Pinku, Senior Product Manager, JFrog ML Oct 24, 2025 861 -
Revival Hijack – PyPI hijack technique exploited in the wild, puts 22K packages at risk Andrey Polkovnichenko, JFrog Security Researcher Sep 04, 2024 3216 -
Striving for a “DigitALL” World That Empowers Everyone on International Women’s Day Shlomi Ben Haim, CEO, JFrog Mar 08, 2023 932 -
Critical RCE Vulnerability in mcp-remote: CVE-2025-6514 Threatens LLM Clients Or Peles, JFrog Senior Security Researcher Jul 09, 2025 2074 -
10 Reasons DevOps Pros Must Attend swampUP 2024 The JFrog Team Jul 15, 2024 338 -
Top 5 Reasons to Make the Quantum Shift by Attending swampUP 2025 The JFrog Team Jul 28, 2025 552 -
Announcing JFrog SAST: Build Trust and Release Code With Confidence Paul Garden, JFrog Partner and Industry Solutions Sep 13, 2023 851 -
What Is Artifactory? JFrog Team Apr 30, 2025 1694 -
The JFrog Partner Ecosystem: Shaping the Future of DevOps and DevSecOps Kelly Hartman, SVP, Channels & Alliances, JFrog Sep 14, 2023 573 -
Got tool sprawl? Let’s consolidate. Sean Pratt, Senior Product Marketing Manager May 25, 2023 796 -
JFrog Achieves ISO/IEC 27001:2022 Tamar Ashtar, JFrog GRC Specialist Feb 10, 2025 394 -
Introducing Support for Hex Packages Brian Chang, Product Marketing Manager Feb 18, 2025 267 -
Streamlining Secure, Intelligent Development: The Power of GitHub and JFrog Together Yonatan Arbel, JFrog Developer Advocate Sep 10, 2024 928 -
Helm OCI support in JFrog Artifactory Adam Browning, Senior Product Manager, JFrog Dec 06, 2023 411 -
Collect and Manage your Binary Metadata using Build-Info Eyal Ben Moshe, JFrog Director of R&D Feb 08, 2023 1255 -
swampUP 2025 Recap: The Quantum Shift in Software Delivery Requires a Unified Approach The JFrog Team Sep 17, 2025 2226 -
Case Study: Ndustrial Expands Globally With Help From JFrog Connect The JFrog Team Jan 10, 2023 796 -
Achieving Sovereign AI with the JFrog Platform and NVIDIA Enterprise AI Factory Paul Garden, JFrog Partner and Industry Solutions Jun 11, 2025 1456 -
CVE-2024-10524 Wget Zero Day Vulnerability Goni Golan, Junior Security Researcher, JFrog Security Nov 18, 2024 1484 -
Seamlessly Minimize Unnecessary Data Fetching with GraphQL Queries Andrey Granovsky, Senior Developer Support Engineer, JFrog Jul 24, 2023 584 -
Trusted Software Delivered! Shlomi Ben Haim, CEO & Co-founder, JFrog Sep 20, 2024 1041 -
Free for the Community, Built by JFrog: Introducing the DSSE Attestation Online Decoder Yonatan Arbel, JFrog Developer Advocate Jul 22, 2025 364 -
The Power of Evidence Collection and Release Lifecycle Management Sean Pratt, Senior Manager, JFrog Jan 29, 2025 1129 -
International Cyber Security Month Tips Moran Ashkenazi, Chief Security Officer, JFrog Oct 31, 2023 543 -
Out with the Old – Keeping Your Software Secure by Managing Dependencies Yonatan Arbel, JFrog Developer Advocate Aug 19, 2024 1224 -
JFrog and Hugging Face Join Forces to Expose Malicious ML Models David Cohen, JFrog Senior Security Researcher Mar 04, 2025 3116 -
Accelerate Your Migration to JFrog SaaS with the AWS ISV Workload Migration Program Kate Kwiatkowski, Senior Director of Global Alliances Aug 14, 2024 953 -
Improve Cloud Visibility with JFrog’s SaaS Log Streamer Jay Kumar, Partner Engineering Manager Feb 05, 2024 794 -
How Capture the Flag Raises Security Awareness and Enhances Enforcement The JFrog AppSec Team Jan 22, 2024 1253 -
Analyzing Impala Stealer – Payload of the first NuGet attack campaign Ori Hollander, JFrog Security Research Apr 10, 2023 1368 -
The basics of securing GenAI and LLM development Sean Pratt, Senior Manager, JFrog May 28, 2024 683 -
Contextual Analysis for Python, Java, and JavaScript Projects with JFrog Frogbot Omer Zidkoni, Software Engineer in Ecosystem Group, JFrog Sep 08, 2023 558 -
Mitigating Image Integrity Violations: A Real-World Example in Runtime Environments Asaf Ezra, R&D Group Leader, JFrog Oct 17, 2024 1547 -
How to Optimize DevSecOps Workflows Using JFrog Pranav Hegde, Tech Lead, JFrog Jul 15, 2025 1273 -
Shai-Hulud npm supply chain attack – new compromised packages detected Andrey Polkovnichenko, JFrog Security Researcher Sep 16, 2025 1133 -
Shifting Security ‘Lefter’ Than Left Is The Key To Avoiding Risky Packages Asaf Karas, JFrog CTO & SVP Security Sep 19, 2025 639 -
Leveraging Shift Left and Shift Right for End-To-End Application Security Elana Marom, JFrog Director of Product Marketing May 02, 2024 681 -
Best practices for deploying software on large fleets of Linux-based IoT devices Roee Alfasi, Product Manager and IoT Specialist, JFrog Mar 28, 2024 2024 -
Top DevOps Experts offer Key Insights at swampUP Carlos Chang Oct 02, 2023 1690 -
JFrog swampUP 2024: News and Updates Live From the Show Floor The JFrog Team Sep 10, 2024 3317 -
*nix libX11: Uncovering and exploiting a 35-year-old vulnerability – Part 1 of 2 Yair Mizrahi, JFrog Security Research Team Leader Jan 17, 2024 2457 -
An Interview with a Data Scientist Pavel Klushin Mar 16, 2023 983 -
8 Malicious npm Packages Deliver Multi-Layered Chrome Browser Information Stealer Guy Korolevski, JFrog Security Researcher Aug 27, 2025 1172 -
Enhancing JFrog Internal Operations with Near Zero Downtime Migration Karam Jaber, JFrog Site Reliability Engineer Oct 08, 2025 1068 -
Trusted AI Delivery: Introducing the JFrog AI Catalog Yuval Fernbach, JFrog VP and CTO MLOps Sep 09, 2025 791 -
Data Scientists Targeted by Malicious Hugging Face ML Models with Silent Backdoor David Cohen, JFrog Senior Security Researcher Feb 27, 2024 2351 -
Adopt a “Release-first” Approach with Release Lifecycle Management in JFrog Artifactory Yossi Shaul, SVP DevOps, JFrog Sep 13, 2023 1015 -
Spring WebFlux – CVE-2023-34034 – Write-Up and Proof-of-Concept Yair Mizrahi, JFrog Security Research Team Leader Aug 08, 2023 1234 -
Elevating DevSecOps: JFrog and GitHub’s Unified Platform Experience Deepens Kristian Taernhed, JFrog Senior Technical Alliance Manager Oct 29, 2024 955 -
Machine Learning Bug Bonanza – Exploiting ML Services Shachar Menashe, JFrog VP Security Research Nov 04, 2024 3336 -
JFrog Cloud: Architected for Performance at Scale Eldad Assis, Principal DevOps Architect, JFrog Dec 10, 2024 1190 -
High-Performance AI Unleashed Kristian Taernhed, JFrog Senior Technical Alliance Manager Sep 10, 2024 883 -
How JFrog Delivers Self-Service Cloud Environments for our Developers Hanan Cohen, JFrog DevOps Team Leader May 27, 2025 1595 -
A Guide to Installing the JFrog Platform on Amazon EKS Yann Chaysinh, DevOps Solution Architect Jul 26, 2023 924 -
Everything You Need to Know About Evil Proxy Attacks and MFA Bypass Yarin Zaddik, JFrog IR SecOps Engineer Nov 26, 2024 1584 -
How to Onboard to a Federated Repository Muhammed Kashif, Enterprise Solution Lead, JFrog Mar 08, 2023 1281 -
Enhancing IoT Deployment Security Under the Cyber Resilience Act Shani Achwal, Senior Product Marketing Manager, JFrog Oct 14, 2024 927 -
JFrog Unveils First Runtime Security Solution to Deliver Complete Software Integrity and Lineage from Code to Cloud Asaf Karas, CTO Security, JFrog Sep 10, 2024 777 -
Top JFrog Security Research Blogs of the Year The JFrog Security Research Team Jan 12, 2024 1393 -
From zero to breach in seconds: Why you need to focus on software supply chain security now Paul Garden, JFrog Partner and Industry Solutions May 10, 2023 887 -
Announcing JFrog AppTrust: Building Unshakeable Trust in Every Application You Deliver Eyal Dyment, JFrog VP Security Sep 09, 2025 1205 -
JFrog Named as a Visionary in the 2025 Gartner® Magic Quadrant™ for Application Security Testing Eyal Dyment, JFrog VP of Product Oct 22, 2025 800 -
Arbitrary File Creation vulnerability in plexus-archiver – CVE-2023-37460 Uriya Yavnieli, JFrog Security Researcher Oct 24, 2023 1206 -
Is TensorFlow Keras “Safe Mode” Actually Safe? Bypassing safe_mode Mitigation to Achieve Arbitrary Code Execution Andrey Polkovnichenko, JFrog Security Researcher Mar 12, 2025 1562 -
Unveiling Secrets Detection with JFrog Frogbot Michael Sverdlov, Senior Software Engineer, JFrog Oct 17, 2023 602 -
CVE-2024-3094 XZ Backdoor: All you need to know Shachar Menashe, JFrog VP Security Research Mar 31, 2024 2569 -
Top 7 ML Model Monitoring Tools in 2024 Alon Lev, JFrog VP and GM MLOps Dec 31, 2023 3105 -
Navigating DORA Compliance: Software Development Requirements for Financial Services Companies Paul Garden, JFrog Partner and Industry Solutions May 01, 2025 1384 -
JFrog4JFrog: DevSecOps Made Simple Batel Zohar, JFrog Developer Advocate Jun 17, 2024 1079 -
Breaking Silos: Unifying DevOps and MLOps into a Cohesive Software Supply Chain – Part 2 Yuval Fernbach, JFrog VP and CTO MLOps Dec 19, 2024 2254 -
swampUP 2023 City Tour: Call for Speakers Is Open Lori Lorusso, JFrog Open Source Program Manager Mar 03, 2023 208 -
Building a Software Data Retention Strategy and Why You Need One Sean Pratt, Senior Manager, JFrog Apr 03, 2025 1249 -
JFrog Cloud Native Innovation – Availability, Security Performance and Efficiency at Scale Batel Zohar, JFrog Developer Advocate Jan 09, 2025 1318 -
RSAC 2025 Recap: Software Supply Chain Security Takes Center Stage Paul Davis, Field CISO May 12, 2025 934 -
Stop the Chaos: How to Centralize, Secure, and Control Developer Extensions Achinoam Katsoff-Sitton, JFrog Product Marketing Manager, DevOps Sep 10, 2025 684 -
A Framework for Cloud Resilience: Practical Steps to Harden Your Software Supply Chain Sean Pratt, Senior Manager, JFrog Oct 23, 2025 594 -
Migrating to the Cloud at Scale with Fidelity The JFrog Team Feb 08, 2024 1625 -
Tips from a CSO: How to Secure Your Software Supply Chain Moran Ashkenazi, JFrog Chief Security Officer Mar 25, 2024 1422 -
JFrog’s cloud migration story Noam Zilberman, JFrog Sr. Director of Engineering Productivity/DevX Sep 11, 2023 1262 -
Announcing JFrog’s Evidence Partner Ecosystem Ronny Belenitsky, JFrog Director of Product Sep 09, 2025 1227 -
Integrating JFrog Artifactory with Amazon SageMaker Melissa McKay, JFrog Developer Advocate Jan 17, 2024 2800 -
The Software Extinction Event That Wasn’t Jens Eckels, JFrog VP of Product Marketing Aug 15, 2024 1726 -
My Journey With The Frogs, Taking The Leap From COO Towards Sustainability Orit Goren, Chief Sustainability Officer, JFrog Sep 27, 2023 1446 -
What is JFrog Security? The JFrog Team Jan 08, 2024 1371 -
Strengthening Software Supply Chain Security: Insights from RSA Conference 2024 Elana Marom, JFrog Director of Product Marketing May 15, 2024 1026 -
Four Key Lessons for ML Model Security & Management Zohar Sacks, JFrog Senior Director of Product Feb 21, 2024 1076 -
JFrog’s Release Lifecycle Promotion vs. Build Promotion Irena Guy, JFrog Principal Product Manager Feb 13, 2025 1032 -
JFrog’s SPOF Framework for SaaS Ecosystems Satheesh Balachandran, SRE Architect May 14, 2025 1251 -
Doing DevOps Your Way On SaaS Solutions: Custom Plugins Come to JFrog Cloud with Workers Service Christopher Milazzo, Software Engineer, JFrog Nov 29, 2023 727 -
New and Improved: The JFrog Packages User Experience Brian Chang, Product Marketing Manager Oct 31, 2024 557 -
Cloud Integrations: JFrog Achieves AWS PrivateLink Service Ready Validation Kate Kwiatkowski, Sr. Director, Global AWS Alliance, JFrog Nov 20, 2023 626 -
SwiftPM, CocoaPods, and the Future of Enterprise Development for Apple Platforms Adam Browning, Senior Product Manager Jun 25, 2025 1554 -
New .NET Malware “WhiteSnake” Targets Python Developers, Uses Tor for C&C Communication Andrey Polkovnychenko, Security Researcher Apr 24, 2023 3139 -
Meet JFrog’s Newest Board Member, Luis Felipe Visoso Micheline Nijmeh, JFrog Chief Marketing Officer Jul 23, 2024 1174 -
Agentic Software Supply Chain Security: AI-Assisted Curation and Remediation Paul Garden, JFrog Partner and Industry Solutions Sep 09, 2025 1174 -
Attackers are starting to target .NET developers with malicious-code NuGet packages Natan Nehorai, Application Security Researcher Mar 20, 2023 1915 -
Release with Trust or Die. Key swampUP 2023 Announcements Yoav Landman, CTO & Co-founder, JFrog Sep 14, 2023 1033 -
The UK’s New Software Security Code of Practice and How JFrog Can Help Dafna Zahger Bernanka, JFrog Director of Product Marketing, Security Jul 16, 2025 1405 -
Get to Know JFrog ML William Manning, Senior Solution Architect, JFrog ML Mar 04, 2025 971 -
What is JFrog Connect? JFrog Team Mar 12, 2023 1461 -
Proactive Vulnerability Management is a No Brainer for Security, but… Elana Marom, JFrog Director of Product Marketing Jan 04, 2024 944 -
Bridging the gap between AI/ML model development and DevSecOps Zohar Sacks, Senior Director of Product, JFrog Sep 13, 2023 1122 -
Analyzing common vulnerabilities introduced by Code-Generative AI Natan Nehorai, JFrog Application Security Researcher Feb 07, 2024 2660 -
Designing New Frontiers for DevOps: Meet Gal Marder, JFrog’s New EVP of Strategy Shlomi Ben Haim, CEO & Co-founder, JFrog Nov 07, 2023 1077 -
Testing the actual security of the most insecure Docker application David Fadida, JFrog Security Researcher Feb 28, 2023 2587 -
DevOps and CI/CD for IoT: Automating Continuous Deployment with JFrog Connect Maxim Yurkovsky, Architect, JFrog Connect Dec 04, 2024 1128 -
MLOps Your Way with the JFrog Platform William Manning, Senior Solution Architect, JFrog ML Jan 22, 2025 758 -
How to Authenticate Access to the JFrog Platform through Your IDE Batel Zohar, JFrog Developer Advocate Sep 18, 2023 631 -
JFrog Deployed on AWS: The Foundation for Cloud-Native Excellence Kate Kwiatkowski, Senior Director of Global Alliances Jul 25, 2025 587 -
MyJFrog Portal: The Solution for Managing Your JFrog Cloud Subscription The JFrog Team Feb 09, 2024 525 -
JFrog & GitHub: Unifying the Software Supply Chain, One Step at a Time… and Our 2025 GitHub Technology Partner Award Paul Garden, JFrog Partner and Industry Solutions Oct 28, 2025 1024 -
Top Four JFrog Artifactory Enterprise Use Cases Sean Pratt, Sr. Product Marketing Manager Oct 23, 2023 1321 -
CVE-2023-38545 & CVE-2023-38546 Curl and libcurl Vulnerabilities: All you need to know Yair Mizrahi, JFrog Security Research Team Leader Oct 10, 2023 1255 -
Experience Partnering the JFrog Way Kelly Hartman, SVP, Channels & Alliances, JFrog Jul 17, 2023 399 -
Empowering Kubernetes Security: JFrog’s Seamless Integration with AWS AssumeRole Yonatan Arbel, JFrog Developer Advocate Dec 15, 2023 698 -
Meet Sunny Rao, JFrog’s New SVP of Asia Pacific Tali Notman, CRO, JFrog May 29, 2025 925 -
Expanding OCI support in JFrog Artifactory with dedicated OCI repos Gal Zilberman, Product Manager, JFrog Dec 05, 2023 427 -
JFrog’s Software Artifact State of the Union is Here! See What’s Actually Being Used in Software Technology Today Sean Pratt, Senior Product Marketing Manager Feb 06, 2023 444 -
Why Cloudsmith Is a Risk You Can’t Afford: A Wake-Up Call on Superficial Software Supply Chain Security The JFrog Security Research Team Jun 24, 2025 4373 -
IoT Trends in Manufacturing: Moving Beyond Smart to Virtual Michal Lewinsohn, Director of Product, JFrog Connect Sep 05, 2024 1242 -
Meet Aran Azarzar, JFrog’s New CIO Shlomi Ben Haim, CEO & Co-founder, JFrog Mar 30, 2023 869 -
Save time fixing security vulnerabilities much earlier in your SDLC Paul Garden, JFrog Partner and Industry Solutions Mar 22, 2023 573 -
Automate Your Deployments on Kubernetes Using GitHub Workflows and JFrog Artifactory Custom Webhooks Yann Chaysinh, DevOps Solution Architect Feb 21, 2023 1268 -
Doing DevOps Your Way On SaaS Solutions: Writing Your First JFrog Worker Service to Extend JFrog SaaS Batel Zohar, JFrog Developer Advocate Dec 07, 2023 476 -
Advanced Security in your Software Supply Chain – Part 1 Neophytos Michael, Technical Market Analyst Feb 02, 2023 739 -
Multi-Stage Malware Attack on PyPI: Malicious Package Threatens Chimera Sandbox Users Guy Korolevski, JFrog Security Researcher Jun 10, 2025 1361 -
Addressing the npm Manifest Confusion Vulnerability Adam Browning, Senior Product Manager, JFrog Jul 20, 2023 1089 -
Release Trusted Software Faster – Our New release Lifecycle Management Beta Is Here Sean Pratt, Senior Product Marketing Manager Mar 09, 2023 668 -
Breaking Silos: Unifying DevOps and MLOps into a Cohesive Software Supply Chain – Part 1 Yuval Fernbach, JFrog VP and CTO MLOps Dec 03, 2024 1795 -
From MLOps to MLOops: Exposing the Attack Surface of Machine Learning Platforms Ori Hollander, JFrog Security Researcher Aug 20, 2024 4613 -
Customer Success Story: Computer Vision Company The JFrog Team Apr 20, 2023 694 -
Using Docker Desktop and Artifactory for Enterprise Container Management Jens Eckels Jun 07, 2023 1346 -
Don’t Guess What to Scan: Runtime Scope Ensures Full Production Coverage Ariel Antoni, JFrog Senior Product Manager Oct 15, 2025 757 -
Now Available: Smart Archiving with the JFrog Platform Sean Pratt, Senior Manager, JFrog Apr 23, 2025 691 -
Introducing JFrog Fly: The World’s First Agentic Artifact Repository Sean Pratt, Senior Manager, JFrog Oct 28, 2025 891 -
JFrog and Atlassian simplify DevOps-Centric security Kristian Taernhed, Sr. Technical Alliance Manager Jun 06, 2023 528 -
Binary secret scanning helped us prevent (what might have been) the worst supply chain attack you can imagine Andrey Polkovnichenko, JFrog Security Researcher Jul 09, 2024 1339 -
From Silos to Synergy: Unifying Your Security Tools for a Stronger More Resilient Software Supply Chain Paul Davis, Field CISO Oct 01, 2025 694 -
JCenter Sunset on August 15th, 2024 Melissa McKay, JFrog Developer Advocate Jul 02, 2024 776 -
New Invisible Attack Creates Parallel Poisoned Web Only for AI Agents Shaked Zychlinski, JFrog AI Architect Sep 04, 2025 1137 -
Gain real-time observability into your software supply chain with the New Relic Log Analytics Integration Kristian Taernhed, Sr. Technical Alliance Manager and Mahitha Byreddy, Senior Software Engineer Mar 15, 2023 688 -
How to Deploy Machine Learning Models into Production Pavel Klushin, JFrog Senior Solution Engineering Manager Sep 23, 2024 2182 -
Customer Success Story: Manufacturing Automation The JFrog Team Apr 06, 2023 493 -
JFrog and GitHub: Next-Level DevSecOps Paul Garden, JFrog Partner and Industry Solutions Sep 10, 2025 954 -
Part II: A Journey of a Thousand Binaries – The Challenges with Software Dependencies Ixchel Ruiz, Developer Advocate Apr 28, 2023 1218 -
Customer Success Story: Telehealth The JFrog Team Mar 29, 2023 672 -
Beyond the Law: Meet our New Chief Legal Officer, Shanti Ariker Micheline Nijmeh, JFrog Chief Marketing Officer Sep 06, 2023 1552 -
Conan Launches C/C++ Audit Functionality Diego Rodriguez-Losada Gonzalez, JFrog Lead Architect Mar 19, 2025 1086 -
Watch out for DoS when using Rust’s popular Hyper package Ori Hollander, JFrog Security Researcher Jan 05, 2023 924 -
The Latest JFrog Plugin for Jenkins Yahav Itzhak, Jfrog Tech Lead Jul 10, 2023 775 -
Building Cloud Excellence: How JFrog Supports the AWS Well-Architected Framework Nitin Khanna, Senior Partner Solutions Engineer Feb 14, 2025 563 -
5 tips on how Developers, DevOps and security teams can work together Batel Zohar, JFrog Developer Advocate Mar 23, 2023 457 -
Live Panel Recap: Women in DevOps 2025 The JFrog Team Mar 26, 2025 588 -
Get Ready for Next. Put DevOps, DevSecOps, and AI to Work. Shlomi Ben Haim, CEO & Co-founder, JFrog Sep 13, 2023 822 -
Mind the Gap: The Disconnect Between Execs & Developers Paul Davis, Field CISO Aug 12, 2024 532 -
Still Trusting Automated Patches Blindly? Think Again Yonatan Arbel, JFrog Developer Advocate Jul 23, 2025 588 -
Don’t waste time on irrelevant false positive alerts in your source code Or Toren, Software Engineer at JFrog Jul 04, 2023 497 -
Complete your Software Supply Chain with GitLab CI/CD and JFrog Robi Nino, Software Engineer Feb 27, 2023 750 -
OpenTofu support comes to JFrog Artifactory Sean Pratt, Senior Manager, JFrog Apr 23, 2024 339 -
How to Combine Speed and Trust in Enterprise Software Development Elana Marom, JFrog Director of Product Marketing Nov 23, 2023 705 -
How to Connect the JFrog Platform to Your GitHub Environment to Create a Seamless Integration Batel Zohar, JFrog Developer Advocate May 30, 2024 1216 -
JFrog AppTrust: A Technical Deep Dive into Building a Trusted Software Supply Chain Jacqueline Basil, JFrog Product Marketing Manager, Security Oct 16, 2025 1150 -
JFrog swampUP 2023: News and Updates Live From the Show Floor The JFrog Team Sep 13, 2023 3046 -
Prevent Credential Exposure in Code Paul Garden, JFrog Partner and Industry Solutions Jun 28, 2023 844 -
FINMA Compliance: DevSecOps Strategies for Securing the Swiss Financial Ecosystem Danny Parizada, JFrog Senior Solution Engineer Feb 24, 2025 960 -
Top JFrog Security Research Discoveries of 2024 Ofri Ouzan, JFrog Security Research Jan 30, 2025 1292 -
Detecting Malicious Packages and How They Obfuscate Their Malicious Code Jonathan Sar Shalom, JFrog Director of Threat Research Jan 30, 2023 2518 -
Confessions of a CISO: I Have Trust Issues Paul Davis, Field CISO Sep 03, 2025 2089 -
NIS2 Compliance in 2025: Compliance Doesn’t Have to Mean Complexity Danny Parizada, JFrog Senior Solution Engineer Feb 06, 2025 898 -
Evolving ML Model Versioning Zohar Sacks, JFrog Senior Director of Product Jan 11, 2024 1457 -
N-Day Hijack: Analyzing the lifespan of package hijacking attacks Yair Mizrahi, JFrog Security Research Team Leader Dec 14, 2023 1321 -
JFrog’s EveryOps Day Sydney Recap Sunny Rao, Senior Vice President of APAC, JFrog Jul 10, 2025 777 -
CVE-2024-6197 Curl and Libcurl: Use-after-Free on the Stack Ben Gross, Security Researcher Dec 18, 2024 2142 -
Announcing JFrog Curation: Defend Your Software Supply Chain by Curating Open-Source Packages Entering Your Organization Asaf Karas, CTO Security, JFrog Sep 13, 2023 1226 -
Using JFrog to Align Your Systems for ISO 27001 Compliance Paul Davis, Field CISO Aug 28, 2025 1506 -
The Need for Proactive GRC (Governance, Risk, Compliance) Paul Davis, Field CISO Aug 06, 2025 875 -
Supporting Next-Level Enterprise Scale in Software Development Sean Pratt, Senior Manager, JFrog Apr 22, 2024 914 -
The AI/ML Regulatory Landscape and How to Stay Ahead Paul Davis, Field CISO Sep 11, 2025 779 -
Shifting Left of Left: Secure Enterprise Data with JFrog Curation Prasanna Raghavendra, Senior Director, R&D, JFrog Aug 17, 2023 733 -
Take control of your Security: How to use Build-Info in your VCS to track vulnerable versions Asaf Gabai, Software Engineer, JFrog Ecosystem Team Aug 29, 2023 698 -
How a DevOps Company Does DevOps Noam Zilberman, JFrog Sr. Director of Engineering Productivity/DevX Mar 06, 2024 983 -
Scaling Docker Usage with JFrog Sean Pratt, Senior Manager, JFrog May 01, 2025 1020 -
Raspberry Pi 5 is Here: Features, Launch Details, and Compatibility with JFrog Connect The JFrog Team Oct 31, 2023 590 -
Elevate and Streamline Your Developer Experience with JFrog-Coder Fusion Yonatan Arbel, JFrog Developer Advocate Apr 10, 2024 799 -
The State of Software Supply Chain Security in 2024 Sean Pratt, Senior Manager, JFrog Mar 27, 2024 617 -
When Prompts Go Rogue: Analyzing a Prompt Injection Code Execution in Vanna.AI Natan Nehorai, JFrog Application Security Researcher Jun 27, 2024 2171 -
Doing DevOps Your Way On SaaS Solutions: Connecting JFrog CLI to Your JFrog Workers Batel Zohar, JFrog Developer Advocate Jul 08, 2024 825 -
Feature Store Benefits: The Advantages of Feature Stores in Machine Learning Development Pavel Klushin, JFrog Senior Solution Engineering Manager Oct 22, 2024 1602 -
JFrog’s Journey with AWS Graviton Shiran Melamed, DevOps Group Leader Apr 25, 2025 931 -
Gain Clarity on Cloud Usage with Enhanced Monitoring from MyJFrog The JFrog Team Nov 20, 2024 790 -
Secure Access To Your Software Development with GitHub OpenID Connect (OIDC) and JFrog Yonatan Arbel, JFrog Developer Advocate Feb 14, 2024 747 -
Ensure your models flow with the JFrog plugin for MLflow Yonatan Arbel, JFrog Developer Advocate Apr 25, 2024 1036 -
Understanding a release-first approach to software supply chain management Sean Pratt, Product Marketing Manager Sep 01, 2023 576 -
Unlock 2024 at DevSecOps EMEA this November in London Eyal Rudnik, SVP Sales, EMEA, JFrog Nov 02, 2023 815 -
Introducing Support for Chocolatey and PowerShell Packages Brian Chang, Product Marketing Manager Apr 22, 2025 370 -
Software Supply Chain Security at RSA Conference 2023 Huz Dalal, Senior Director Product Marketing Apr 24, 2023 606 -
GitHub and JFrog Partner To Unify Code and Binaries for DevSecOps Thomas Dohmke, GitHub CEO May 29, 2024 769 -
Embracing Complexity in DevOps: Software Supply Chain State of the Union 2024 Sean Pratt, Senior Manager, JFrog Jul 05, 2024 710 -
Key Takeaways from Frogward Innovation Days in India Prasanna Raghavendra, JFrog Senior Director of R&D Sep 18, 2025 1155 -
Manage Ansible Collections with JFrog Artifactory Sean Pratt, Senior Manager, JFrog Jul 23, 2024 578 -
SaaS or Self-Hosted, JFrog Has You Covered Rakesh Krishna, JFrog Solution Engineer Jan 02, 2024 1275 -
Announcing the New JFrog Partner Program! The Evolving Tech Landscape Requires Agile Partnership Strategies Kelly Hartman, SVP, Channels & Alliances, JFrog Sep 12, 2023 666 -
*nix libX11: Uncovering and exploiting a 35-year-old vulnerability – Part 2 of 2 Yair Mizrahi, JFrog Security Research Team Leader Jan 24, 2024 2632 -
How to set up a Private, Remote and Virtual Docker Registry Melissa McKay, JFrog Developer Advocate Mar 05, 2024 951 -
New compromised packages identified in largest npm attack in history Andrey Polkovnichenko, JFrog Security Researcher Sep 09, 2025 514 -
Unix CUPS Unauthenticated RCE Zero-Day Vulnerabilities (CVE-2024-47076, CVE-2024-47175, CVE-2024-47176, CVE-2024-47177): All you need to know Shachar Menashe, JFrog VP Security Research Sep 26, 2024 1186 -
JFrog Simplifies Compliance with India’s new CERT SBOM Guidelines Yashaswi Mudumbai, JFrog Senior Director of Solution Engineering Feb 12, 2025 1391 -
How a software supply chain platform streamlines DevOps best practices JFrog Team May 09, 2023 815 -
Taking a GenAI Project to Production Shaked Zychlinski, JFrog AI Architect Jun 10, 2024 1118 -
Examining OpenSSH Sandboxing and Privilege Separation – Attack Surface Analysis Yair Mizrahi, JFrog Security Research Team Leader Mar 14, 2023 3377 -
Navigating AI’s New Horizons: Empowering AI Model Development, Security and Compliance Huz Dalal, Senior Director, Product Marketing, JFrog Dec 14, 2023 1005 -
2023 Best of JFrog Software Supply Chain Blogs The JFrog Team Jan 10, 2024 966 -
Now Available: Evidence Collection with JFrog Sean Pratt, Senior Manager, JFrog Jan 21, 2025 700 -
OpenSSH Pre-Auth Double Free CVE-2023-25136 – Writeup and Proof-of-Concept Yair Mizrahi, JFrog Security Research Team Leader Feb 08, 2023 1447 -
What is Platform Engineering? Bill Manning, Solution Engineering Manager, JFrog May 02, 2023 806 -
JFrog & Qwak: Accelerating Models Into Production – The DevOps Way Yuval Fernbach, JFrog VP and CTO MLOps Jun 25, 2024 1435 -
Empowering IoT with Docker: Exploring Advantages, Challenges, and Security in the Software Supply Chain Roee Alfasi, Connect Solutions Architect, JFrog Dec 06, 2023 1644 -
FrogML SDK: the Gateway to Model Governance Rami Pinku, Senior Product Manager, JFrog ML Aug 19, 2025 933 -
GitHub Tried to Change the Checksum for Release Archives. You Should Start Hosting Your Own. Christopher McArthur, Conan Developer Advocate Jan 31, 2023 437 -
3 Key Considerations for Securing Your Software Supply Chain Shani Achwal, Senior Product Marketing Manager May 16, 2024 502 -
JFrog Log Analytics with Datadog just got better! Shailendra Dhamankar, Senior Product Manager, JFrog Nov 30, 2023 770 -
Introducing JFrog’s MCP Server: Better vibes and easier AI automation Sean Pratt, Senior Manager, JFrog Jul 17, 2025 698 -
JFrog and ServiceNow: Accelerate Trusted Software Application Development Brian Chang, Product Marketing Manager Sep 30, 2025 565 -
Advanced DevOps Security With Development Flexibility Paul Garden, JFrog Partner and Industry Solutions Mar 07, 2023 1371 -
Not Built to Scale: The Hidden Fragility of Cloudsmith The JFrog Artifactory Team Jul 29, 2025 1855 -
Malicious PyPI Package Hijacks MEXC Orders, Steals Crypto Tokens Guy Korolevski, JFrog Security Researcher Apr 15, 2025 1546 -
NPM Manifest Confusion: Six Months Later Andrey Polkovnichenko, JFrog Security Researcher Mar 26, 2024 1575 -
A Vulnerable Future: MITRE’s Close Call in CVE Management Ofri Ouzan, JFrog Security Researcher Apr 23, 2025 2930 -
Integrating Vector Databases with LLMs: A Hands-On Guide Ran Romano, VP of P&E, JFrog May 14, 2024 3994 -
The Innovation vs. Control Syndrome: Unlocking Enterprise AI’s Full Potential Ohad Shalev, JFrog Product Marketing Manager, AI/ML Aug 05, 2025 736 -
Live Panel Recap: Women in DevOps Melissa McKay, JFrog Developer Advocate Apr 22, 2024 1345 -
JFrog & GitHub Integration: Q&A on Implementation and Impact The JFrog Team Jul 29, 2024 1107 -
The JFrog Platform Delivered 393% ROI Huz Dalal, Senior Director, Product Marketing May 23, 2023 584 -
The Agenda is Live for swampUP 2024! The JFrog swampUP Team Jun 19, 2024 475 -
SSH protocol flaw – Terrapin Attack CVE-2023-48795: All you need to know Yair Mizrahi, JFrog Security Research Team Leader Dec 25, 2023 2404 -
Key Take Aways from RSA 2024 Paul Davis, Field CISO May 23, 2024 1214 -
JFrog Connect: DevOps for Edge and IoT Connected Devices Michael Vakulenko, Senior Product Manager, JFrog Mar 02, 2023 1241 -
What to look for in an IoT device management platform The JFrog Team May 04, 2023 1016 -
What is a Feature Store in ML, and Do I Need One? Grig Duta, JFrog Solution Engineer Jan 31, 2025 3560 -
Software Ate the World, but Digital Transformation Can Give You Indigestion Paul Garden, JFrog Partner and Industry Solutions Mar 14, 2024 1369 -
The Security Imperative: Trust, Speed, and Integral Defense The JFrog Team Nov 11, 2025 1878 -
swampUP Recap: “EveryOps” is Trending as a Software Development Requirement The JFrog Team Oct 23, 2024 1006 -
Beyond Models: JFrog AI Catalog Evolves to Detect Shadow AI and Govern MCPs Ran Romano, JFrog VP of P&E Nov 13, 2025 808 -
Chaotic Deputy: Critical vulnerabilities in Chaos Mesh lead to Kubernetes cluster takeover Natan Nehorai, JFrog Application Security Researcher Sep 16, 2025 1923 -
Breaking Silos: Unifying DevOps and MLOps into a Cohesive Software Supply Chain – Part 3 Yuval Fernbach, JFrog VP and CTO MLOps Jan 15, 2025 1344 -
Critical RCE Vulnerability CVE-2025-11953 Puts React Native Developers at Risk Or Peles, JFrog Senior Security Researcher Nov 04, 2025 2172 -
Securing Vibe Coding: JFrog Introduces AI-Generated Code Validation Jacqueline Basil, JFrog Product Marketing Manager, Security Nov 13, 2025 744 -
Prevent Inadvertent Software Supply Chain Exposures When Allowing Public Access to Private Registries Sean Pratt, Senior Product Marketing Manager Feb 09, 2023 1053 -
Proudly Announcing JFrog’s Full Conformance to OCI v1.1 Brian Chang, Product Marketing Manager Sep 24, 2024 536 -