npm supply chain attack targeting Germany-based companies

Npm Supply Chain Attack Targets Germany-based Companies with Dangerous Backdoor Malware

Update May 11th: Following the publication of this blog post, a penetration testing company called โ€œCode Whiteโ€ took responsibility for this dependency confusion attack The JFrog Security research team constantly monitors the npm and PyPI ecosystems for malicious packages that may lead to widespread software supply chain attacks. Last month, we shared a widespread npm โ€ฆ

DevSecOps 101 Webinar Series

DevSecOps 101 Webinar Series

Security should be embedded into the DevOps workflow by default, but for many organizations, it isnโ€™t. Enter โ€œDevSecOpsโ€. What is DevSecOps? It is a practice to build more secure applications, secure the software supply chain, and secure cloud and on-prem workloads. It is an essential practice that needs visibility. Our new โ€œDevSecOps 101โ€ webinar series โ€ฆ

Secure your git repository with Frogbot the git bot

Introducing the newest member of the JFrog ecosystem team โ€“ Frogbot. This new git bot tool works for you by protecting your git projects, as they are being developed, from security vulnerabilities. Register for my talk โ€œBots to Protect your Source Codeโ€ swampUP 2022 How does Frogbot work? The concept is simple. Frogbot scans every โ€ฆ

How to Integrate JFrog and Cycode

How to Integrate JFrog and Cycode

Four years ago the Clark School of engineering at the University of Maryland published a study quantifying that there is some kind of hacker attack happening every 39 seconds (on average). Which is unreal!! Source: University of Maryland A cyberattack can harm millions of people. Letโ€™s take for example the Atlanta ransomware attack that used โ€ฆ

SpringShell / Spring4Shell Remediation Cookbook

Your SpringShell (Spring4Shell) Remediation Cookbook Using the JFrog Platform

A new zero-day exploit in the spring-web package called โ€œSpringShellโ€ (nicknamed โ€œSpring4Shellโ€) was just leaked and is threatening the internet and the community. The JFrog security research team is investigating the exploit and continuously updating our blog post with technical details on the SpringShell (Spring4Shell) vulnerability.  In this technical blog post, we explain how you โ€ฆ

How to Use Pub Repositories in Artifactory

If youโ€™re one of the growing number of client app developers embracing the Dart programming language and Flutter and AngularDart toolkits, weโ€™ve got some exciting news for you!  JFrog can now welcome Dart developers to the empowerment of Artifactoryโ€™s robust binaries management and the ways that it contributes to continuous integration. Weโ€™ve added Pub, the โ€ฆ

How to set up a Go Registry

How to set up a Private, Remote and Virtual Go Registry

The simplest way to manage and organize your Go dependencies is with a Go Repository. You need reliable, secure, consistent and efficient access to your dependencies that are shared across your team, in a central location. Including a place to set up multiple registries, that work transparently with the Go client. With the JFrog free โ€ฆ

Our Solution for Scalable Multi-Region SaaS Deployment

Just like many other production DevOps engineering teams, our JFrog team deploys new version releases several times a day to AWS, Azure and GCP, across more than 20 cloud regions. This process used to take us many hours and could have even failed if it was done alongside maintenance by other teams. As part of โ€ฆ

Part I: A Journey Into the World of Advanced Security Monitoring

Dealing with hundreds of security alerts on a daily basis is a challenge. Especially when many are false positives that waste our time and all take up too much of our valuable time to sift through. Let me tell you how our security team fixed this, as we built security around the JFrog products. First, โ€ฆ