Welcome to the JFrog Blog

How I Leaped Forward My Jenkins Build with JFrog Pipelines

How I Leaped Forward My Jenkins Build with JFrog Pipelines

Jenkins is the most popular open source CI tool on the market today. Being an early entry into the marketplace, Jenkins popularized CI. Like other CI tools Jenkins empowers developers to automatically build, integrate, and test code as soon as they commit it to the source repository. This allows developers to catch bugs quickly and…
Our Groundbreaking Partnership with Docker Is a Boon for DevOps Teams

Our Groundbreaking Partnership with Docker Is a Boon for DevOps Teams

Today we’re announcing a big move that will yield substantial, concrete benefits for our customers and for the entire DevOps community: A groundbreaking partnership with Docker that exempts Cloud users of the JFrog DevOps Platform from image-pull rate limits on Docker Hub. This agreement further boosts JFrog’s vibrant ecosystem of integration partners, built on the…
Simply the Best: JFrog’s Top DevOps Articles from 2020

Simply the Best: JFrog’s Top DevOps Articles from 2020

In 2020, JFrog’s experts published a treasure trove of content -- blogs, articles, infographics, and more -- to share insights and advice with our customers and the DevOps community at large. In case you missed them -- or want to re-read them -- here’s a list of the most popular ones. They range from a…
The Year DevOps Leaped to the Center

The Year DevOps Leaped to the Center

At the beginning of 2020, none of us could have imagined what we would be talking and thinking about at the end of the year.  At JFrog, we began by talking about unifying everything in the DevOps lifecycle. Of course very quickly, the message of unity and togetherness would soon become even bigger than we…
SDLC Security: It’s Personal for JFrog

SDLC Security: It’s Personal for JFrog

The SolarWinds hack, which has affected high-profile Fortune 500 companies and large U.S. federal government agencies, has put the spotlight on software development security -- a critical issue for the DevOps community and for JFrog. At a fundamental level, if the code released via CI/CD pipelines is unsafe, all other DevOps benefits are for naught.…
CVE-2020-25860 – Significant Vulnerability Discovered in RAUC Embedded Firmware Update Framework

CVE-2020-25860 – Significant Vulnerability Discovered in RAUC Embedded Firmware Update Framework

JFrog’s security research team (formerly Vdoo) are constantly researching leading embedded devices and their supply chain. As part of this research, we discovered CVE-2020-25860, a potentially critical vulnerability with CVSSv3 8.8 score in a Robust Auto-Update Controller (RAUC), an open-source framework for firmware updates. JFrog has responsibly disclosed this vulnerability and have worked closely with…
Install JFrog Platform on Kubernetes in Under 20 Minutes

Install JFrog Platform on Kubernetes in Under 20 Minutes

We get it, installing Artifactory and the JFrog DevOps Platform on Kubernetes can be daunting. As easy as we’ve sought to make it with our official JFrog installation Helm charts, there are a lot of decisions to be made. That’s meant to give you the widest possible choice for how to best fit your JFrog…
A Few Minutes More: Add Xray DevSecOps to Artifactory Enterprise on Azure

A Few Minutes More: Add Xray DevSecOps to Artifactory Enterprise on Azure

Editor’s Note (2024): Please refer to the current JFrog Software Supply Chain Platform listing on Azure Marketplace to get started with JFrog on Microsoft Azure.   In a prior blog post, we explained how to install or update Artifactory through the Azure Marketplace in the amount of time it takes for your coffee order to arrive on…
Major Vulnerabilities Discovered in Qualcomm QCMAP

Major Vulnerabilities Discovered in Qualcomm QCMAP

In a recent supply chain security assessment, we analyzed multiple networking devices for security vulnerabilities and exposures. During the analysis we discovered and have responsibly disclosed four major vulnerabilities in Qualcomm’s QCMAP (Qualcomm Mobile Access Point) architecture that these devices were based on. An attacker that exploits the discovered vulnerabilities can gain remote root access…