| Machine Learning Bug Bonanza – Exploiting ML Clients and “Safe” Model Formats |
Shachar Menashe, JFrog VP Security Research |
Dec 04, 2024 |
2650 |
- |
| Expanding Artifactory’s Hugging Face Support with Datasets |
Sean Pratt, Senior Manager, JFrog |
Jul 16, 2024 |
436 |
- |
| Point Solutions vs Platform – Which is Best to Secure your Software Supply Chain? |
Shani Achwal, Senior Product Marketing Manager |
Jul 25, 2024 |
353 |
- |
| JFrog swampUP 2025: News and Updates Live From the Show Floor |
The JFrog Team |
Sep 09, 2025 |
6080 |
- |
| JFrog Security research discovers coordinated attacks on Docker Hub that planted millions of malicious repositories |
Andrey Polkovnichenko, JFrog Security Researcher |
Apr 30, 2024 |
3271 |
- |
| CVE-2024-38428 Wget Vulnerability: All you need to know |
Goni Golan, Junior Security Researcher, JFrog Security |
Aug 12, 2024 |
1817 |
- |
| Top 5 Reasons to Attend JFrog’s Inaugural swampUP Europe 2025 |
The JFrog Team |
Oct 16, 2025 |
626 |
- |
| A Heartfelt Thank You to Jessica Neal |
Shlomi Ben Haim, CEO & Co-founder, JFrog |
Mar 28, 2025 |
219 |
- |
| Accelerating Enterprise AI Development: A Guide to the JFrog-NVIDIA NIM Integration |
Kristian Taernhed, JFrog Senior Technical Alliance Manager |
Mar 04, 2025 |
759 |
- |
| Advancing MLOps with JFrog and Qwak |
Yonatan Arbel, JFrog Developer Advocate |
Feb 28, 2024 |
818 |
- |
| The State of the Software Supply Chain 2025 |
Sean Pratt, Senior Manager, JFrog |
Apr 01, 2025 |
999 |
- |
| Empowering DevSecOps: JFrog’s Enterprise-Ready Platform for Federal NIST SP 800-218 Compliance |
Sudhindra Rao, Strategic Solutions Architect |
Jan 31, 2024 |
702 |
- |
| CVE-2025-6515 Prompt Hijacking Attack – How Session Hijacking Affects MCP Ecosystems |
Ori Hollander, JFrog Security Researcher |
Oct 21, 2025 |
1678 |
- |
| CVE-2025-29927 – Authorization Bypass Vulnerability in Next.js: All You Need to Know |
Yoav Saporta, JFrog Junior Security Researcher |
Mar 24, 2025 |
1660 |
- |
| The Power of JFrog Artifactory as Your Model Registry |
Rami Pinku, Senior Product Manager, JFrog ML |
Oct 24, 2025 |
861 |
- |
| Revival Hijack – PyPI hijack technique exploited in the wild, puts 22K packages at risk |
Andrey Polkovnichenko, JFrog Security Researcher |
Sep 04, 2024 |
3216 |
- |
| Critical RCE Vulnerability in mcp-remote: CVE-2025-6514 Threatens LLM Clients |
Or Peles, JFrog Senior Security Researcher |
Jul 09, 2025 |
2074 |
- |
| 10 Reasons DevOps Pros Must Attend swampUP 2024 |
The JFrog Team |
Jul 15, 2024 |
338 |
- |
| Top 5 Reasons to Make the Quantum Shift by Attending swampUP 2025 |
The JFrog Team |
Jul 28, 2025 |
552 |
- |
| What Is Artifactory? |
JFrog Team |
Apr 30, 2025 |
1694 |
- |
| JFrog Achieves ISO/IEC 27001:2022 |
Tamar Ashtar, JFrog GRC Specialist |
Feb 10, 2025 |
394 |
- |
| Introducing Support for Hex Packages |
Brian Chang, Product Marketing Manager |
Feb 18, 2025 |
267 |
- |
| Streamlining Secure, Intelligent Development: The Power of GitHub and JFrog Together |
Yonatan Arbel, JFrog Developer Advocate |
Sep 10, 2024 |
928 |
- |
| swampUP 2025 Recap: The Quantum Shift in Software Delivery Requires a Unified Approach |
The JFrog Team |
Sep 17, 2025 |
2226 |
- |
| Achieving Sovereign AI with the JFrog Platform and NVIDIA Enterprise AI Factory |
Paul Garden, JFrog Partner and Industry Solutions |
Jun 11, 2025 |
1456 |
- |
| CVE-2024-10524 Wget Zero Day Vulnerability |
Goni Golan, Junior Security Researcher, JFrog Security |
Nov 18, 2024 |
1484 |
- |
| Trusted Software Delivered! |
Shlomi Ben Haim, CEO & Co-founder, JFrog |
Sep 20, 2024 |
1041 |
- |
| Free for the Community, Built by JFrog: Introducing the DSSE Attestation Online Decoder |
Yonatan Arbel, JFrog Developer Advocate |
Jul 22, 2025 |
364 |
- |
| The Power of Evidence Collection and Release Lifecycle Management |
Sean Pratt, Senior Manager, JFrog |
Jan 29, 2025 |
1129 |
- |
| Out with the Old – Keeping Your Software Secure by Managing Dependencies |
Yonatan Arbel, JFrog Developer Advocate |
Aug 19, 2024 |
1224 |
- |
| JFrog and Hugging Face Join Forces to Expose Malicious ML Models |
David Cohen, JFrog Senior Security Researcher |
Mar 04, 2025 |
3116 |
- |
| Accelerate Your Migration to JFrog SaaS with the AWS ISV Workload Migration Program |
Kate Kwiatkowski, Senior Director of Global Alliances |
Aug 14, 2024 |
953 |
- |
| Improve Cloud Visibility with JFrog’s SaaS Log Streamer |
Jay Kumar, Partner Engineering Manager |
Feb 05, 2024 |
794 |
- |
| How Capture the Flag Raises Security Awareness and Enhances Enforcement |
The JFrog AppSec Team |
Jan 22, 2024 |
1253 |
- |
| The basics of securing GenAI and LLM development |
Sean Pratt, Senior Manager, JFrog |
May 28, 2024 |
683 |
- |
| Mitigating Image Integrity Violations: A Real-World Example in Runtime Environments |
Asaf Ezra, R&D Group Leader, JFrog |
Oct 17, 2024 |
1547 |
- |
| How to Optimize DevSecOps Workflows Using JFrog |
Pranav Hegde, Tech Lead, JFrog |
Jul 15, 2025 |
1273 |
- |
| Shai-Hulud npm supply chain attack – new compromised packages detected |
Andrey Polkovnichenko, JFrog Security Researcher |
Sep 16, 2025 |
1133 |
- |
| Shifting Security ‘Lefter’ Than Left Is The Key To Avoiding Risky Packages |
Asaf Karas, JFrog CTO & SVP Security |
Sep 19, 2025 |
639 |
- |
| Leveraging Shift Left and Shift Right for End-To-End Application Security |
Elana Marom, JFrog Director of Product Marketing |
May 02, 2024 |
681 |
- |
| Best practices for deploying software on large fleets of Linux-based IoT devices |
Roee Alfasi, Product Manager and IoT Specialist, JFrog |
Mar 28, 2024 |
2024 |
- |
| JFrog swampUP 2024: News and Updates Live From the Show Floor |
The JFrog Team |
Sep 10, 2024 |
3317 |
- |
| *nix libX11: Uncovering and exploiting a 35-year-old vulnerability – Part 1 of 2 |
Yair Mizrahi, JFrog Security Research Team Leader |
Jan 17, 2024 |
2457 |
- |
| 8 Malicious npm Packages Deliver Multi-Layered Chrome Browser Information Stealer |
Guy Korolevski, JFrog Security Researcher |
Aug 27, 2025 |
1172 |
- |
| Enhancing JFrog Internal Operations with Near Zero Downtime Migration |
Karam Jaber, JFrog Site Reliability Engineer |
Oct 08, 2025 |
1068 |
- |
| Trusted AI Delivery: Introducing the JFrog AI Catalog |
Yuval Fernbach, JFrog VP and CTO MLOps |
Sep 09, 2025 |
791 |
- |
| Data Scientists Targeted by Malicious Hugging Face ML Models with Silent Backdoor |
David Cohen, JFrog Senior Security Researcher |
Feb 27, 2024 |
2351 |
- |
| Elevating DevSecOps: JFrog and GitHub’s Unified Platform Experience Deepens |
Kristian Taernhed, JFrog Senior Technical Alliance Manager |
Oct 29, 2024 |
955 |
- |
| Machine Learning Bug Bonanza – Exploiting ML Services |
Shachar Menashe, JFrog VP Security Research |
Nov 04, 2024 |
3336 |
- |
| JFrog Cloud: Architected for Performance at Scale |
Eldad Assis, Principal DevOps Architect, JFrog |
Dec 10, 2024 |
1190 |
- |
| High-Performance AI Unleashed |
Kristian Taernhed, JFrog Senior Technical Alliance Manager |
Sep 10, 2024 |
883 |
- |
| How JFrog Delivers Self-Service Cloud Environments for our Developers |
Hanan Cohen, JFrog DevOps Team Leader |
May 27, 2025 |
1595 |
- |
| Everything You Need to Know About Evil Proxy Attacks and MFA Bypass |
Yarin Zaddik, JFrog IR SecOps Engineer |
Nov 26, 2024 |
1584 |
- |
| Enhancing IoT Deployment Security Under the Cyber Resilience Act |
Shani Achwal, Senior Product Marketing Manager, JFrog |
Oct 14, 2024 |
927 |
- |
| JFrog Unveils First Runtime Security Solution to Deliver Complete Software Integrity and Lineage from Code to Cloud |
Asaf Karas, CTO Security, JFrog |
Sep 10, 2024 |
777 |
- |
| Top JFrog Security Research Blogs of the Year |
The JFrog Security Research Team |
Jan 12, 2024 |
1393 |
- |
| Announcing JFrog AppTrust: Building Unshakeable Trust in Every Application You Deliver |
Eyal Dyment, JFrog VP Security |
Sep 09, 2025 |
1205 |
- |
| JFrog Named as a Visionary in the 2025 Gartner® Magic Quadrant™ for Application Security Testing |
Eyal Dyment, JFrog VP of Product |
Oct 22, 2025 |
800 |
- |
| Is TensorFlow Keras “Safe Mode” Actually Safe? Bypassing safe_mode Mitigation to Achieve Arbitrary Code Execution |
Andrey Polkovnichenko, JFrog Security Researcher |
Mar 12, 2025 |
1562 |
- |
| CVE-2024-3094 XZ Backdoor: All you need to know |
Shachar Menashe, JFrog VP Security Research |
Mar 31, 2024 |
2569 |
- |
| Navigating DORA Compliance: Software Development Requirements for Financial Services Companies |
Paul Garden, JFrog Partner and Industry Solutions |
May 01, 2025 |
1384 |
- |
| JFrog4JFrog: DevSecOps Made Simple |
Batel Zohar, JFrog Developer Advocate |
Jun 17, 2024 |
1079 |
- |
| Breaking Silos: Unifying DevOps and MLOps into a Cohesive Software Supply Chain – Part 2 |
Yuval Fernbach, JFrog VP and CTO MLOps |
Dec 19, 2024 |
2254 |
- |
| Building a Software Data Retention Strategy and Why You Need One |
Sean Pratt, Senior Manager, JFrog |
Apr 03, 2025 |
1249 |
- |
| JFrog Cloud Native Innovation – Availability, Security Performance and Efficiency at Scale |
Batel Zohar, JFrog Developer Advocate |
Jan 09, 2025 |
1318 |
- |
| RSAC 2025 Recap: Software Supply Chain Security Takes Center Stage |
Paul Davis, Field CISO |
May 12, 2025 |
934 |
- |
| Stop the Chaos: How to Centralize, Secure, and Control Developer Extensions |
Achinoam Katsoff-Sitton, JFrog Product Marketing Manager, DevOps |
Sep 10, 2025 |
684 |
- |
| A Framework for Cloud Resilience: Practical Steps to Harden Your Software Supply Chain |
Sean Pratt, Senior Manager, JFrog |
Oct 23, 2025 |
594 |
- |
| Migrating to the Cloud at Scale with Fidelity |
The JFrog Team |
Feb 08, 2024 |
1625 |
- |
| Tips from a CSO: How to Secure Your Software Supply Chain |
Moran Ashkenazi, JFrog Chief Security Officer |
Mar 25, 2024 |
1422 |
- |
| Announcing JFrog’s Evidence Partner Ecosystem |
Ronny Belenitsky, JFrog Director of Product |
Sep 09, 2025 |
1227 |
- |
| Integrating JFrog Artifactory with Amazon SageMaker |
Melissa McKay, JFrog Developer Advocate |
Jan 17, 2024 |
2800 |
- |
| The Software Extinction Event That Wasn’t |
Jens Eckels, JFrog VP of Product Marketing |
Aug 15, 2024 |
1726 |
- |
| What is JFrog Security? |
The JFrog Team |
Jan 08, 2024 |
1371 |
- |
| Strengthening Software Supply Chain Security: Insights from RSA Conference 2024 |
Elana Marom, JFrog Director of Product Marketing |
May 15, 2024 |
1026 |
- |
| Four Key Lessons for ML Model Security & Management |
Zohar Sacks, JFrog Senior Director of Product |
Feb 21, 2024 |
1076 |
- |
| JFrog’s Release Lifecycle Promotion vs. Build Promotion |
Irena Guy, JFrog Principal Product Manager |
Feb 13, 2025 |
1032 |
- |
| JFrog’s SPOF Framework for SaaS Ecosystems |
Satheesh Balachandran, SRE Architect |
May 14, 2025 |
1251 |
- |
| New and Improved: The JFrog Packages User Experience |
Brian Chang, Product Marketing Manager |
Oct 31, 2024 |
557 |
- |
| SwiftPM, CocoaPods, and the Future of Enterprise Development for Apple Platforms |
Adam Browning, Senior Product Manager |
Jun 25, 2025 |
1554 |
- |
| Meet JFrog’s Newest Board Member, Luis Felipe Visoso |
Micheline Nijmeh, JFrog Chief Marketing Officer |
Jul 23, 2024 |
1174 |
- |
| Agentic Software Supply Chain Security: AI-Assisted Curation and Remediation |
Paul Garden, JFrog Partner and Industry Solutions |
Sep 09, 2025 |
1174 |
- |
| The UK’s New Software Security Code of Practice and How JFrog Can Help |
Dafna Zahger Bernanka, JFrog Director of Product Marketing, Security |
Jul 16, 2025 |
1405 |
- |
| Get to Know JFrog ML |
William Manning, Senior Solution Architect, JFrog ML |
Mar 04, 2025 |
971 |
- |
| Proactive Vulnerability Management is a No Brainer for Security, but… |
Elana Marom, JFrog Director of Product Marketing |
Jan 04, 2024 |
944 |
- |
| Analyzing common vulnerabilities introduced by Code-Generative AI |
Natan Nehorai, JFrog Application Security Researcher |
Feb 07, 2024 |
2660 |
- |
| DevOps and CI/CD for IoT: Automating Continuous Deployment with JFrog Connect |
Maxim Yurkovsky, Architect, JFrog Connect |
Dec 04, 2024 |
1128 |
- |
| MLOps Your Way with the JFrog Platform |
William Manning, Senior Solution Architect, JFrog ML |
Jan 22, 2025 |
758 |
- |
| JFrog Deployed on AWS: The Foundation for Cloud-Native Excellence |
Kate Kwiatkowski, Senior Director of Global Alliances |
Jul 25, 2025 |
587 |
- |
| MyJFrog Portal: The Solution for Managing Your JFrog Cloud Subscription |
The JFrog Team |
Feb 09, 2024 |
525 |
- |
| JFrog & GitHub: Unifying the Software Supply Chain, One Step at a Time… and Our 2025 GitHub Technology Partner Award |
Paul Garden, JFrog Partner and Industry Solutions |
Oct 28, 2025 |
1024 |
- |
| Meet Sunny Rao, JFrog’s New SVP of Asia Pacific |
Tali Notman, CRO, JFrog |
May 29, 2025 |
925 |
- |
| Why Cloudsmith Is a Risk You Can’t Afford: A Wake-Up Call on Superficial Software Supply Chain Security |
The JFrog Security Research Team |
Jun 24, 2025 |
4373 |
- |
| IoT Trends in Manufacturing: Moving Beyond Smart to Virtual |
Michal Lewinsohn, Director of Product, JFrog Connect |
Sep 05, 2024 |
1242 |
- |
| Multi-Stage Malware Attack on PyPI: Malicious Package Threatens Chimera Sandbox Users |
Guy Korolevski, JFrog Security Researcher |
Jun 10, 2025 |
1361 |
- |
| Breaking Silos: Unifying DevOps and MLOps into a Cohesive Software Supply Chain – Part 1 |
Yuval Fernbach, JFrog VP and CTO MLOps |
Dec 03, 2024 |
1795 |
- |
| From MLOps to MLOops: Exposing the Attack Surface of Machine Learning Platforms |
Ori Hollander, JFrog Security Researcher |
Aug 20, 2024 |
4613 |
- |
| Don’t Guess What to Scan: Runtime Scope Ensures Full Production Coverage |
Ariel Antoni, JFrog Senior Product Manager |
Oct 15, 2025 |
757 |
- |
| Now Available: Smart Archiving with the JFrog Platform |
Sean Pratt, Senior Manager, JFrog |
Apr 23, 2025 |
691 |
- |
| Introducing JFrog Fly: The World’s First Agentic Artifact Repository |
Sean Pratt, Senior Manager, JFrog |
Oct 28, 2025 |
891 |
- |
| Binary secret scanning helped us prevent (what might have been) the worst supply chain attack you can imagine |
Andrey Polkovnichenko, JFrog Security Researcher |
Jul 09, 2024 |
1339 |
- |
| From Silos to Synergy: Unifying Your Security Tools for a Stronger More Resilient Software Supply Chain |
Paul Davis, Field CISO |
Oct 01, 2025 |
694 |
- |
| JCenter Sunset on August 15th, 2024 |
Melissa McKay, JFrog Developer Advocate |
Jul 02, 2024 |
776 |
- |
| New Invisible Attack Creates Parallel Poisoned Web Only for AI Agents |
Shaked Zychlinski, JFrog AI Architect |
Sep 04, 2025 |
1137 |
- |
| How to Deploy Machine Learning Models into Production |
Pavel Klushin, JFrog Senior Solution Engineering Manager |
Sep 23, 2024 |
2182 |
- |
| JFrog and GitHub: Next-Level DevSecOps |
Paul Garden, JFrog Partner and Industry Solutions |
Sep 10, 2025 |
954 |
- |
| Conan Launches C/C++ Audit Functionality |
Diego Rodriguez-Losada Gonzalez, JFrog Lead Architect |
Mar 19, 2025 |
1086 |
- |
| Building Cloud Excellence: How JFrog Supports the AWS Well-Architected Framework |
Nitin Khanna, Senior Partner Solutions Engineer |
Feb 14, 2025 |
563 |
- |
| Live Panel Recap: Women in DevOps 2025 |
The JFrog Team |
Mar 26, 2025 |
588 |
- |
| Mind the Gap: The Disconnect Between Execs & Developers |
Paul Davis, Field CISO |
Aug 12, 2024 |
532 |
- |
| Still Trusting Automated Patches Blindly? Think Again |
Yonatan Arbel, JFrog Developer Advocate |
Jul 23, 2025 |
588 |
- |
| OpenTofu support comes to JFrog Artifactory |
Sean Pratt, Senior Manager, JFrog |
Apr 23, 2024 |
339 |
- |
| How to Connect the JFrog Platform to Your GitHub Environment to Create a Seamless Integration |
Batel Zohar, JFrog Developer Advocate |
May 30, 2024 |
1216 |
- |
| JFrog AppTrust: A Technical Deep Dive into Building a Trusted Software Supply Chain |
Jacqueline Basil, JFrog Product Marketing Manager, Security |
Oct 16, 2025 |
1150 |
- |
| FINMA Compliance: DevSecOps Strategies for Securing the Swiss Financial Ecosystem |
Danny Parizada, JFrog Senior Solution Engineer |
Feb 24, 2025 |
960 |
- |
| Top JFrog Security Research Discoveries of 2024 |
Ofri Ouzan, JFrog Security Research |
Jan 30, 2025 |
1292 |
- |
| Confessions of a CISO: I Have Trust Issues |
Paul Davis, Field CISO |
Sep 03, 2025 |
2089 |
- |
| NIS2 Compliance in 2025: Compliance Doesn’t Have to Mean Complexity |
Danny Parizada, JFrog Senior Solution Engineer |
Feb 06, 2025 |
898 |
- |
| Evolving ML Model Versioning |
Zohar Sacks, JFrog Senior Director of Product |
Jan 11, 2024 |
1457 |
- |
| JFrog’s EveryOps Day Sydney Recap |
Sunny Rao, Senior Vice President of APAC, JFrog |
Jul 10, 2025 |
777 |
- |
| CVE-2024-6197 Curl and Libcurl: Use-after-Free on the Stack |
Ben Gross, Security Researcher |
Dec 18, 2024 |
2142 |
- |
| Using JFrog to Align Your Systems for ISO 27001 Compliance |
Paul Davis, Field CISO |
Aug 28, 2025 |
1506 |
- |
| The Need for Proactive GRC (Governance, Risk, Compliance) |
Paul Davis, Field CISO |
Aug 06, 2025 |
875 |
- |
| Supporting Next-Level Enterprise Scale in Software Development |
Sean Pratt, Senior Manager, JFrog |
Apr 22, 2024 |
914 |
- |
| The AI/ML Regulatory Landscape and How to Stay Ahead |
Paul Davis, Field CISO |
Sep 11, 2025 |
779 |
- |
| How a DevOps Company Does DevOps |
Noam Zilberman, JFrog Sr. Director of Engineering Productivity/DevX |
Mar 06, 2024 |
983 |
- |
| Scaling Docker Usage with JFrog |
Sean Pratt, Senior Manager, JFrog |
May 01, 2025 |
1020 |
- |
| Elevate and Streamline Your Developer Experience with JFrog-Coder Fusion |
Yonatan Arbel, JFrog Developer Advocate |
Apr 10, 2024 |
799 |
- |
| The State of Software Supply Chain Security in 2024 |
Sean Pratt, Senior Manager, JFrog |
Mar 27, 2024 |
617 |
- |
| When Prompts Go Rogue: Analyzing a Prompt Injection Code Execution in Vanna.AI |
Natan Nehorai, JFrog Application Security Researcher |
Jun 27, 2024 |
2171 |
- |
| Doing DevOps Your Way On SaaS Solutions: Connecting JFrog CLI to Your JFrog Workers |
Batel Zohar, JFrog Developer Advocate |
Jul 08, 2024 |
825 |
- |
| Feature Store Benefits: The Advantages of Feature Stores in Machine Learning Development |
Pavel Klushin, JFrog Senior Solution Engineering Manager |
Oct 22, 2024 |
1602 |
- |
| JFrog’s Journey with AWS Graviton |
Shiran Melamed, DevOps Group Leader |
Apr 25, 2025 |
931 |
- |
| Gain Clarity on Cloud Usage with Enhanced Monitoring from MyJFrog |
The JFrog Team |
Nov 20, 2024 |
790 |
- |
| Secure Access To Your Software Development with GitHub OpenID Connect (OIDC) and JFrog |
Yonatan Arbel, JFrog Developer Advocate |
Feb 14, 2024 |
747 |
- |
| Ensure your models flow with the JFrog plugin for MLflow |
Yonatan Arbel, JFrog Developer Advocate |
Apr 25, 2024 |
1036 |
- |
| Introducing Support for Chocolatey and PowerShell Packages |
Brian Chang, Product Marketing Manager |
Apr 22, 2025 |
370 |
- |
| GitHub and JFrog Partner To Unify Code and Binaries for DevSecOps |
Thomas Dohmke, GitHub CEO |
May 29, 2024 |
769 |
- |
| Embracing Complexity in DevOps: Software Supply Chain State of the Union 2024 |
Sean Pratt, Senior Manager, JFrog |
Jul 05, 2024 |
710 |
- |
| Key Takeaways from Frogward Innovation Days in India |
Prasanna Raghavendra, JFrog Senior Director of R&D |
Sep 18, 2025 |
1155 |
- |
| Manage Ansible Collections with JFrog Artifactory |
Sean Pratt, Senior Manager, JFrog |
Jul 23, 2024 |
578 |
- |
| SaaS or Self-Hosted, JFrog Has You Covered |
Rakesh Krishna, JFrog Solution Engineer |
Jan 02, 2024 |
1275 |
- |
| *nix libX11: Uncovering and exploiting a 35-year-old vulnerability – Part 2 of 2 |
Yair Mizrahi, JFrog Security Research Team Leader |
Jan 24, 2024 |
2632 |
- |
| How to set up a Private, Remote and Virtual Docker Registry |
Melissa McKay, JFrog Developer Advocate |
Mar 05, 2024 |
951 |
- |
| New compromised packages identified in largest npm attack in history |
Andrey Polkovnichenko, JFrog Security Researcher |
Sep 09, 2025 |
514 |
- |
| Unix CUPS Unauthenticated RCE Zero-Day Vulnerabilities (CVE-2024-47076, CVE-2024-47175, CVE-2024-47176, CVE-2024-47177): All you need to know |
Shachar Menashe, JFrog VP Security Research |
Sep 26, 2024 |
1186 |
- |
| JFrog Simplifies Compliance with India’s new CERT SBOM Guidelines |
Yashaswi Mudumbai, JFrog Senior Director of Solution Engineering |
Feb 12, 2025 |
1391 |
- |
| Taking a GenAI Project to Production |
Shaked Zychlinski, JFrog AI Architect |
Jun 10, 2024 |
1118 |
- |
| 2023 Best of JFrog Software Supply Chain Blogs |
The JFrog Team |
Jan 10, 2024 |
966 |
- |
| Now Available: Evidence Collection with JFrog |
Sean Pratt, Senior Manager, JFrog |
Jan 21, 2025 |
700 |
- |
| JFrog & Qwak: Accelerating Models Into Production – The DevOps Way |
Yuval Fernbach, JFrog VP and CTO MLOps |
Jun 25, 2024 |
1435 |
- |
| FrogML SDK: the Gateway to Model Governance |
Rami Pinku, Senior Product Manager, JFrog ML |
Aug 19, 2025 |
933 |
- |
| 3 Key Considerations for Securing Your Software Supply Chain |
Shani Achwal, Senior Product Marketing Manager |
May 16, 2024 |
502 |
- |
| Introducing JFrog’s MCP Server: Better vibes and easier AI automation |
Sean Pratt, Senior Manager, JFrog |
Jul 17, 2025 |
698 |
- |
| JFrog and ServiceNow: Accelerate Trusted Software Application Development |
Brian Chang, Product Marketing Manager |
Sep 30, 2025 |
565 |
- |
| Not Built to Scale: The Hidden Fragility of Cloudsmith |
The JFrog Artifactory Team |
Jul 29, 2025 |
1855 |
- |
| Malicious PyPI Package Hijacks MEXC Orders, Steals Crypto Tokens |
Guy Korolevski, JFrog Security Researcher |
Apr 15, 2025 |
1546 |
- |
| NPM Manifest Confusion: Six Months Later |
Andrey Polkovnichenko, JFrog Security Researcher |
Mar 26, 2024 |
1575 |
- |
| A Vulnerable Future: MITRE’s Close Call in CVE Management |
Ofri Ouzan, JFrog Security Researcher |
Apr 23, 2025 |
2930 |
- |
| Integrating Vector Databases with LLMs: A Hands-On Guide |
Ran Romano, VP of P&E, JFrog |
May 14, 2024 |
3994 |
- |
| The Innovation vs. Control Syndrome: Unlocking Enterprise AI’s Full Potential |
Ohad Shalev, JFrog Product Marketing Manager, AI/ML |
Aug 05, 2025 |
736 |
- |
| Live Panel Recap: Women in DevOps |
Melissa McKay, JFrog Developer Advocate |
Apr 22, 2024 |
1345 |
- |
| JFrog & GitHub Integration: Q&A on Implementation and Impact |
The JFrog Team |
Jul 29, 2024 |
1107 |
- |
| The Agenda is Live for swampUP 2024! |
The JFrog swampUP Team |
Jun 19, 2024 |
475 |
- |
| Key Take Aways from RSA 2024 |
Paul Davis, Field CISO |
May 23, 2024 |
1214 |
- |
| What is a Feature Store in ML, and Do I Need One? |
Grig Duta, JFrog Solution Engineer |
Jan 31, 2025 |
3560 |
- |
| Software Ate the World, but Digital Transformation Can Give You Indigestion |
Paul Garden, JFrog Partner and Industry Solutions |
Mar 14, 2024 |
1369 |
- |
| The Security Imperative: Trust, Speed, and Integral Defense |
The JFrog Team |
Nov 11, 2025 |
1878 |
- |
| swampUP Recap: “EveryOps” is Trending as a Software Development Requirement |
The JFrog Team |
Oct 23, 2024 |
1006 |
- |
| Beyond Models: JFrog AI Catalog Evolves to Detect Shadow AI and Govern MCPs |
Ran Romano, JFrog VP of P&E |
Nov 13, 2025 |
808 |
- |
| Chaotic Deputy: Critical vulnerabilities in Chaos Mesh lead to Kubernetes cluster takeover |
Natan Nehorai, JFrog Application Security Researcher |
Sep 16, 2025 |
1923 |
- |
| Breaking Silos: Unifying DevOps and MLOps into a Cohesive Software Supply Chain – Part 3 |
Yuval Fernbach, JFrog VP and CTO MLOps |
Jan 15, 2025 |
1344 |
- |
| Critical RCE Vulnerability CVE-2025-11953 Puts React Native Developers at Risk |
Or Peles, JFrog Senior Security Researcher |
Nov 04, 2025 |
2172 |
- |
| Securing Vibe Coding: JFrog Introduces AI-Generated Code Validation |
Jacqueline Basil, JFrog Product Marketing Manager, Security |
Nov 13, 2025 |
744 |
- |
| Proudly Announcing JFrog’s Full Conformance to OCI v1.1 |
Brian Chang, Product Marketing Manager |
Sep 24, 2024 |
536 |
- |