Welcome to the JFrog Blog

All Blogs

Why Enterprise and Fortune 500 Companies are Leaving Snyk and Checkmarx for JFrog

Why Enterprise and Fortune 500 Companies are Leaving Snyk and Checkmarx for JFrog

Effectively protecting your software supply chain has reached a critical turning point where the traditional strategy of integrating "best of breed" or point AppSec solutions is no longer sustainable. While tools like Snyk and Checkmarx served a purpose in the era of siloed development and security, today we’re seeing how leading companies are moving away…
JFrog vs Checkmarx: An AppSec Solution Comparison

JFrog vs Checkmarx: An AppSec Solution Comparison

Application Security (AppSec) can’t stop at source code. Today’s software is assembled, not written, from open-source packages, containers, binaries, and increasingly - AI models. While traditional AppSec tools like Checkmarx focus primarily on source code scanning, that approach leaves critical security and compliance gaps across the software supply chain. JFrog takes AppSec to the next…
JFrog vs Snyk: Why Effective AppSec Must Move Beyond Source Code

JFrog vs Snyk: Why Effective AppSec Must Move Beyond Source Code

The tech world is abuzz with the potential of AI and automated development, but this rapid advance is fueling a massive increase in regulatory scrutiny and supply chain risk. While many teams rely on source code scanning, focusing on code alone leaves a critical "malware blind spot" in the software supply chain. Today’s applications are…
Docker Hardened Images are Free: Scale Their Adoption with JFrog

Docker Hardened Images are Free: Scale Their Adoption with JFrog

Securing your Docker containers just got a lot easier. On December 17, Docker announced that their catalog of over 1,000 Docker Hardened Images (DHI)—previously a premium-only feature—is now free and open source. This big change means every developer can now start their Dockerfile with a minimalist, near-zero CVE, SLSA Level 3 compliant foundation. If you’re…
swampUP Europe 2025 Recap

swampUP Europe 2025 Recap

The energy was electrifying as the inaugural swampUP Europe 2025 kicked off at the JW Marriott this past November! For three days Berlin became the epicenter of the DevOps, DevSecOps, and MLOps universe, buzzing with a sense of intrigue and excitement. This wasn’t just another tech conference; it was a convergence of innovation and regulation,…
CVE-2025-55182 and CVE-2025-66478 (“React2Shell”): All you need to know – UPDATED

CVE-2025-55182 and CVE-2025-66478 (“React2Shell”): All you need to know – UPDATED

IMPORTANT UPDATE:  React2Shell Continues to Attack Cloud Infrastructure  (Dec 9th, 2025) JFrog Security Research continues to track the React2Shell vulnerability. Recent developments include the original POC from the researcher who found this vulnerability. This POC shows the simplicity of exploiting this CVE and reflects the real severity and impact of this CVE. (Dec 12th, 2025)…
Level Up Your Container Security: Introducing the JFrog Kubelet Credential Provider

Level Up Your Container Security: Introducing the JFrog Kubelet Credential Provider

Editors Note: the JFrog Kubelet Credential Provider now supports Google Kubernetes Engine (GKE), Azure Kubernetes Service (AKS), and Amazon EKS including projected tokens (KEP-4412 enhancement). This blog is updated to reflect these capabilities. Amazon EKS, GKE, and AKS are fully managed, compliant Kubernetes services that simplify running, managing, and scaling containerized applications. These services automatically…