Welcome to the JFrog Blog

swampUP Sneak Peek

swampUP Sneak Peek

TL;DR: Register for swampUP today to learn from the best DevOps and DevSecOps leaders. Summer is almost over and you know what that means… swampUP 2023 is right around the corner! If you’re like us your attention span is torn between getting your last bit of fun in the sun while at the same time…
Spring WebFlux – CVE-2023-34034 – Write-Up and Proof-of-Concept

Spring WebFlux – CVE-2023-34034 – Write-Up and Proof-of-Concept

Spring Security's newly released versions contain a fix for a broken access control vulnerability - CVE-2023-34034 - which was given a critical NVD severity (CVSS 9.8) and a high severity by Spring’s maintainers. Given the severe potential impact of the vulnerability on Spring WebFlux applications (that use Spring Security for authentication and access control), its…
The Latest JFrog Plugin for Jenkins

The Latest JFrog Plugin for Jenkins

We all know that artifact management is an important part of our development lifecycle, and if you’re using Jenkins you’ll also need to store your builds and binaries. In the world of DevOps, efficient integration and management of artifacts and dependencies are crucial for successful software delivery. Together,  Jenkins and JFrog Artifactory offer a powerful…
Don’t waste time on irrelevant false positive alerts in your source code

Don’t waste time on irrelevant false positive alerts in your source code

Are you tired of using security tools that generate endless results, making it impossible to identify actual risks? Do you struggle with inefficient prioritization due to a lack of context, making the process of assessing and remediating vulnerabilities a time-consuming nightmare? Look no further than JFrog’s Contextual Analysis, available as part of the "jf audit"…
Prevent Credential Exposure in Code

Prevent Credential Exposure in Code

In today's software development world, developers rely on numerous types of secrets (credentials), to facilitate seamless interaction between application components. As modern applications become more complex and require authentication for services and dependencies, the practice of hardcoding secrets during software development is on the rise. The most common types of credentials are: Application Program Interface…
swampUP 2023 – Top 10 Reasons To Attend

swampUP 2023 – Top 10 Reasons To Attend

JFrog’s DevOps and DevSecOps user conference is a unique and inspiring in-person event. Here’s why you don’t want to miss it! Wednesday, September 13 | San Jose, California Get lessons learned on how industry-leading companies are approaching their DevOps and DevSecOps challenges - with fellow practitioners that have implemented large scale solutions. Including companies such…
JFrog and Atlassian simplify DevOps-Centric security

JFrog and Atlassian simplify DevOps-Centric security

Atlassian has long been helping agile teams collaborate, track progress, and manage projects more efficiently, and is now simplifying software security for Jira Software Cloud users. We’re excited to announce that JFrog has joined Atlassian as a security partner. The integration with the JFrog Platform enables JFrog Xray data to be surfaced in Jira, making…
Got tool sprawl? Let’s consolidate.

Got tool sprawl? Let’s consolidate.

If you’re a developer, DevOps engineer, or security technician, you know the feeling of managing multiple tools at once. It’s a phenomenon so prevalent in software development that it has its own name, “tool sprawl,” and it can make it hard for teams to do their jobs efficiently. What causes tool sprawl? Problems caused by…
How a software supply chain platform streamlines DevOps best practices

How a software supply chain platform streamlines DevOps best practices

Today's software developers are tasked with a lot more than just coding. To keep up with the fast-paced software-driven economy, they need to focus on automation, collaboration, security, distribution, data analysis, and agility to ensure quality builds and get releases to customers quickly and securely. DevOps and security professionals need a centralized system of records…
From zero to breach in seconds: Why you need to focus on software supply chain security now

From zero to breach in seconds: Why you need to focus on software supply chain security now

The RSA Conference 2023 addressed several key issues and trends in the cybersecurity industry. Generative AI was a key topic of discussion, with attendees, executives and policymakers seeing its potential in both offense and defense in the cybersecurity arms race. The White House's National Cybersecurity Strategy was also a topic of conversation across panels and…