Welcome to the JFrog Blog

FILTER BY

All
Products
Solutions
Other
From zero to breach in seconds: Why you need to focus on software supply chain security now

From zero to breach in seconds: Why you need to focus on software supply chain security now

The RSA Conference 2023 addressed several key issues and trends in the cybersecurity industry. Generative AI was a key topic of discussion, with attendees, executives and policymakers seeing its potential in both offense and defense in the cybersecurity arms race. The White House's National Cybersecurity Strategy was also a topic of conversation across panels and…
What is Platform Engineering?

What is Platform Engineering?

If DevOps is an approach to software development that emphasizes collaboration between Development and Operations teams, then Platform Engineering operationalizes that approach by creating a centralized platform that has specific sets of tools and processes. It’s the discipline of designing and building toolchains and workflows that enable self-service capabilities for software engineering organizations in a…
Software Supply Chain Security at RSA Conference 2023

Software Supply Chain Security at RSA Conference 2023

The risk of supply chain attacks increases as more companies rely on third-party vendors and suppliers for critical services and products. Supply chain attacks have become increasingly prominent in recent years. In 2022, for instance, supply chain attacks surpassed the number of malware-based attacks by 40%. These types of attacks involve targeting a company's suppliers,…
New .NET Malware “WhiteSnake” Targets Python Developers, Uses Tor for C&C Communication

New .NET Malware “WhiteSnake” Targets Python Developers, Uses Tor for C&C Communication

The JFrog Security Research team recently discovered a new malware payload in the PyPI repository, written in C#. This is uncommon since PyPI is primarily a repository for Python packages, and its codebase consists mostly of Python code, or natively compiled libraries used by Python programs. This finding raised our concerns about the potential for…
Analyzing Impala Stealer – Payload of the first NuGet attack campaign

Analyzing Impala Stealer – Payload of the first NuGet attack campaign

Analyzing Impala Stealer - Payload of the first NuGet attack campaign In this blog post, we’ll provide a detailed analysis of a malicious payload we’ve dubbed “Impala Stealer”, a custom crypto stealer which was used as the payload for the NuGet malicious packages campaign we’ve exposed in our previous post. The sophisticated campaign targeted .NET…
Meet Aran Azarzar, JFrog’s New CIO

Meet Aran Azarzar, JFrog’s New CIO

Traditionally, a company’s chief information officer (CIO), is a highly technical person who usually ‘sits in the back office’ and oversees the information technology department's resources and staff. But that basic job description has dramatically evolved over the last decade, and now CIOs are considered one of the most strategic roles in the company, charged…
Save time fixing security vulnerabilities much earlier in your SDLC

Save time fixing security vulnerabilities much earlier in your SDLC

Are you or your development team tired of using application security tools that generate countless results, making it difficult to identify which vulnerabilities pose actual risks? Do you struggle with inefficient or incorrect prioritization due to a lack of context? What adds insult to injury is that traditional CVSS scoring methods ignore critical details like…
Gain real-time observability into your software supply chain with the New Relic Log Analytics Integration

Gain real-time observability into your software supply chain with the New Relic Log Analytics Integration

JFrog’s new log analytics integration with New Relic brings together powerful observability capabilities to monitor, analyze, and visualize logs and metrics from self-hosted JFrog environments. The integration is free for all tiers of self-hosted JFrog customers and utilizes the powerful, open source log management tool, Fluentd, to collect, process, and surface data in New Relic…