{"id":832567,"date":"2025-04-01T13:44:01","date_gmt":"2025-04-01T17:44:01","guid":{"rendered":"https:\/\/www.marketnewsdesk.com\/index.php\/jfrog-enables-trusted-ai-uncovers-critical-security-threats-emerging-from-ais-expansion-in-the-software-supply-chain-2\/"},"modified":"2025-04-01T13:44:01","modified_gmt":"2025-04-01T17:44:01","slug":"jfrog-enables-trusted-ai-uncovers-critical-security-threats-emerging-from-ais-expansion-in-the-software-supply-chain-2","status":"publish","type":"post","link":"https:\/\/www.marketnewsdesk.com\/index.php\/jfrog-enables-trusted-ai-uncovers-critical-security-threats-emerging-from-ais-expansion-in-the-software-supply-chain-2\/","title":{"rendered":"JFrog Enables Trusted AI &#8211; Uncovers Critical Security Threats Emerging from AI\u2019s Expansion in the Software Supply Chain"},"content":{"rendered":"<p>        <!--.bwalignc { text-align: center; list-style-position: inside }\n.bwblockalignl { margin-left: 0px; margin-right: auto }\n.bwcellpmargin { margin-bottom: 0px; margin-top: 0px }\n.bwlistdisc { list-style-type: disc }\n.bwpadl0 { padding-left: 0px }\n.bwtablemarginb { margin-bottom: 10px }\n.bwvertalignt { vertical-align: top }body {font:normal small Arial,Helvetica,sans-serif;color:#000;background-color:#fff;padding:24px;margin:0;} a img {border:0;} h3 {font-size:medium;color:#000;margin:0 0 1em 0; text-align:center;}-->  <\/p>\n<p class=\"bwalignc\"><b>JFrog Enables Trusted AI &#8211; Uncovers Critical Security Threats Emerging from AI\u2019s Expansion in the Software Supply Chain<\/b><\/p>\n<p class=\"bwalignc\"><i>The Software Supply Chain State of the Union 2025 Report Reveals \u201cQuad-fecta\u201d of Security Exploits, Mis-scored CVEs, Poor ML Model Governance, &amp; more are Jeopardizing Trust in Newly Created Software<\/i><\/p>\n<p>SUNNYVALE, Calif. &amp; LONDON&#8211;(<a href=\"http:\/\/www.businesswire.com\">BUSINESS WIRE<\/a>)&#8211;<b>(KubeCon + CloudNativeCon Europe) \u2014 <\/b><a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fjfrog.com%2F%3Futm_source%3Dsscstounion%26utm_medium%3Dbusinesswire%26utm_campaign%3D2025%26utm_content%3Dpr&amp;esheet=54231490&amp;newsitemid=20250401200753&amp;lan=en-US&amp;anchor=JFrog+Ltd&amp;index=1&amp;md5=22ee6b8aea931c11040b1816ea1dbd92\">JFrog Ltd<\/a> (Nasdaq: FROG), the Liquid Software company and creators of the <a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fjfrog.com%2Fplatform%2F%3Futm_source%3Dsscstounion%26utm_medium%3Dbusinesswire%26utm_campaign%3D2025%26utm_content%3Dpr&amp;esheet=54231490&amp;newsitemid=20250401200753&amp;lan=en-US&amp;anchor=JFrog+Software+Supply+Chain+Platform&amp;index=2&amp;md5=690c78e653dc16b16326069721b176e6\">JFrog Software Supply Chain Platform<\/a>, today released the <a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fjfrog.com%2Fsoftware-supply-chain-state-of-union%2F%3Futm_source%3Dsscstounion%26utm_medium%3Dbusinesswire%26utm_campaign%3D2025%26utm_content%3Dpr&amp;esheet=54231490&amp;newsitemid=20250401200753&amp;lan=en-US&amp;anchor=Software+Supply+Chain+State+of+the+Union&amp;index=3&amp;md5=dba49e30d4d07aea3ed08dc999e4aea4\">Software Supply Chain State of the Union<\/a><a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fjfrog.com%2Fsoftware-supply-chain-state-of-union%2F&amp;esheet=54231490&amp;newsitemid=20250401200753&amp;lan=en-US&amp;anchor=2025&amp;index=4&amp;md5=ff06f084b0fa1c45b8e6858a4b804d98\"> 2025<\/a> report, which highlights emerging software security threats, evolving DevOps risks and best practices, and potentially explosive security concerns in the AI era.\n<\/p>\n<p id=\"news-body-cta\">This press release features multimedia. View the full release here: <a href=\"https:\/\/www.businesswire.com\/news\/home\/20250401200753\/en\/\" rel=\"nofollow\">https:\/\/www.businesswire.com\/news\/home\/20250401200753\/en\/<\/a><\/p>\n<div id=\"bwbodyimg\" style=\"width: 480px;float:left;padding-left:0px;padding-right:20px;padding-top:0px;padding-bottom:0px\"><img decoding=\"async\" src=\"https:\/\/mms.businesswire.com\/media\/20250401200753\/en\/2426717\/4\/SSCSU_2025_1280x960.jpg\" alt=\"The Software Supply Chain State of the Union 2025 Report Reveals \u201cQuad-fecta\u201d of Security Exploits, Mis-scored CVEs, Poor ML Model Governance, &amp; more are Jeopardizing Trust in Newly Created Software\" \/><\/p>\n<p style=\"font-size:85%\">The Software Supply Chain State of the Union 2025 Report Reveals \u201cQuad-fecta\u201d of Security Exploits, Mis-scored CVEs, Poor ML Model Governance, &amp; more are Jeopardizing Trust in Newly Created Software<\/p>\n<\/div>\n<p>\n&#8220;Many organizations are enthusiastically embracing public ML models to drive rapid innovation, demonstrating a strong commitment to leveraging AI for growth. However, over a third still rely on manual efforts to manage access to secure, approved models, which can lead to potential oversights,&#8221; said Yoav Landman, CTO and Co-Founder, JFrog. &#8220;AI adoption will only grow more rapidly. Thus, in order for organizations to thrive in today\u2019s AI era they should automate their toolchains and governance processes with AI-ready solutions, ensuring they remain both secure and agile while maximizing their innovative potential.&#8221;\n<\/p>\n<p>\nManaging and securing the software supply chain end-to-end is an imperative for delivering trusted software releases. By combining insights from over 1,400 development, security and operations professionals across the U.S., U.K., France, Germany, India and Israel, with developer usage data from JFrog\u2019s 7K+ customers, alongside original CVE analysis by the JFrog Security Research team, the JFrog Software Supply Chain State of the Union 2025 report reveals why this task is often challenging for companies amidst the expanding and frenzied threat landscape faced in today\u2019s AI era.\n<\/p>\n<p><b>Key Report Findings Include:<\/b><\/p>\n<ul class=\"bwlistdisc\">\n<li><b>A \u201cQuad-fecta\u201d of Security Vulnerabilities are Threatening the Software Supply Chain<\/b><b>:<\/b> The top security factors impacting the integrity and safety of the software supply chain include: CVEs, malicious packages, secrets\u2019 exposures, and misconfigurations\/human errors. As an example, the JFrog Security Research Team detected 25,229 exposed secrets\/tokens in public registries (up 64% YoY). The increasing complexity of software security threats are making it harder to maintain consistent software supply chain security.\n<\/li>\n<li><b>AI\/ML Model Proliferation and Attacks are Growing: <\/b>In 2024, more than 1 million new ML models were added to Hugging Face, with an <a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fjfrog.com%2Fblog%2Fjfrog-and-hugging-face-join-forces%2F&amp;esheet=54231490&amp;newsitemid=20250401200753&amp;lan=en-US&amp;anchor=accompanying&amp;index=5&amp;md5=472cf15194479307257f144032148a83\">accompanying<\/a><a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fjfrog.com%2Fblog%2Fjfrog-and-hugging-face-join-forces%2F%3Futm_source%3Dsscstounion%26utm_medium%3Dbusinesswire%26utm_campaign%3D2025%26utm_content%3Dpr&amp;esheet=54231490&amp;newsitemid=20250401200753&amp;lan=en-US&amp;anchor=6.5x+increase+in+malicious+models&amp;index=6&amp;md5=13cf11c5acb36750627fa306925cfde3\"> 6.5x increase in malicious models<\/a>, indicating AI and ML models are increasingly becoming a preferred attack vector for bad actors.\n<\/li>\n<li><b>Manual Governance of ML Models is Increasing Risk:<\/b> Most companies (94%) are using certified lists to govern ML artifact usage, however over one-third (37%) of those rely on manual efforts to curate and maintain their lists of approved ML models. This overreliance on manual validation creates uncertainty around the accuracy and consistency of ML model security.\n<\/li>\n<li><b>Limited Security Scanning Leaving Blind Spots: <\/b>Alarmingly, only 43% of IT professionals say their organization applies security scans at both the code and binary levels, leaving many organizations vulnerable to <a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fjfrog.com%2Fblog%2Fthe-software-extinction-event-that-wasnt%2F%3Futm_source%3Dsscstounion%26utm_medium%3Dbusinesswire%26utm_campaign%3D2025%26utm_content%3Dpr&amp;esheet=54231490&amp;newsitemid=20250401200753&amp;lan=en-US&amp;anchor=security+threats+only&amp;index=7&amp;md5=e9eed2639bf3375002f14a4e2e430df2\">security threats only <\/a><a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fjfrog.com%2Fblog%2Fthe-software-extinction-event-that-wasnt%2F&amp;esheet=54231490&amp;newsitemid=20250401200753&amp;lan=en-US&amp;anchor=detectable+at+the+binary+level&amp;index=8&amp;md5=c4e3086479ddc94887b519c9ab68b813\">detectable at the binary level<\/a>. This is down from 56% last year &#8211; a sign that teams still have huge blind spots when it comes to identifying and preventing software risk as early as possible.\n<\/li>\n<li><b>Critical Vulnerabilities Continue to Rise and be Mis-scored: <\/b>In 2024, security researchers disclosed over 33K new CVEs, a 27% increase from 2023, surpassing the 24.5% growth rate of new software packages. This trend raises concerns as the growing number of CVEs increases complexity and pressure on developers and security teams, potentially hindering innovation. Meanwhile, JFrog Security found that only 12% of high-profile CVEs rated &#8220;critical&#8221; (CVSS 9.0-10.0) by government organizations justify the critical severity level they were assigned because they are likely to be exploited by attackers.<sup>1<\/sup> This pattern is troubling due to a centralized and unchanged scoring methodology over time, which heightens the risk of false positives in assessments and contributes to developers experiencing &#8220;vulnerability fatigue.&#8221;\n<\/li>\n<\/ul>\n<p>\n\u201cWe uncovered a clear pattern by CVE scoring organizations to inflate scores and cause an unnecessary level of panic in the industry, sending developers scrambling on remediation efforts that often results in wasted cognitive and professional time,\u201d said Shachar Menashe, Vice President of Security Research. \u201cWhen DevSecOps teams are forced to remediate vulnerabilities that aren\u2019t ultimately harmful, their everyday workflows are disrupted, which can lead to developer burnout and costly mistakes.\u201d\n<\/p>\n<p>\nThe <a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fjfrog.com%2Fsoftware-supply-chain-state-of-union%2F%3Futm_source%3Dsscstounion%26utm_medium%3Dbusinesswire%26utm_campaign%3D2025%26utm_content%3Dpr&amp;esheet=54231490&amp;newsitemid=20250401200753&amp;lan=en-US&amp;anchor=JFrog+Software+Supply+Chain+State+of+the+Union+2025&amp;index=9&amp;md5=85f08b3420d8808ef8913ce3ba5e0dc8\">JFrog Software Supply Chain State of the Union 2025<\/a> report also outlines concerns around lack of code provenance visibility across the software supply chain, developers downloading open source software packages directly from public registries without filtering for vulnerabilities, the detriments of \u201csecurity tool sprawl\u201d, and more. To explore the full findings of this year\u2019s report visit <a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fjfrog.com%2Fsoftware-supply-chain-state-of-union%2F&amp;esheet=54231490&amp;newsitemid=20250401200753&amp;lan=en-US&amp;anchor=https%3A%2F%2Fjfrog.com%2Fsoftware-supply-chain-state-of-union%2F&amp;index=10&amp;md5=e1853cecf730f47894f070f5a1ee034b\">https:\/\/jfrog.com\/software-supply-chain-state-of-union\/<\/a> or <a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fjfrog.com%2Fblog%2Fstate-of-software-supply-chain-security-2025%2F%3Futm_source%3Dsscstounion%26utm_medium%3Dbusinesswire%26utm_campaign%3D2025%26utm_content%3Dpr&amp;esheet=54231490&amp;newsitemid=20250401200753&amp;lan=en-US&amp;anchor=read+this+blog&amp;index=11&amp;md5=8a77970531d8b2bdbe1a3668ca72fde8\">read this blog<\/a>.\n<\/p>\n<p>\nYou can also register to join JFrog security and developer experts on Thursday, April 24, 2025 at 9 AM PT for a webinar, \u201c<a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fleap.jfrog.com%2F2025-state-of-the-union-lp.html%3Futm_source%3Dsscstounion%26utm_medium%3Dbusinesswire%26utm_campaign%3D2025%26utm_content%3Dpr&amp;esheet=54231490&amp;newsitemid=20250401200753&amp;lan=en-US&amp;anchor=JFrog%26%238217%3Bs+Software+Supply+Chain+Report+2025%3A+Trends%2C+Threats+%26amp%3B+Actions&amp;index=12&amp;md5=590697835a7a1296d4dedc61a188f7ba\">JFrog\u2019s Software Supply Chain Report 2025: Trends, Threats &amp; Actions<\/a>,\u201d detailing the challenges and complexities of managing and securing the software supply chain.\n<\/p>\n<p><b>Like this Story? Share this on X (a.k.a. Twitter):<\/b> @JFrog shares research findings in their Software Supply Chain State of the Union 2025 report. Discover the emerging #DevSecOps trends, risks &amp; best practices to securing enterprise #SoftwareSupplyChain. Learn more: <a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fjfrog.co%2F43vkg3Y&amp;esheet=54231490&amp;newsitemid=20250401200753&amp;lan=en-US&amp;anchor=https%3A%2F%2Fjfrog.co%2F43vkg3Y&amp;index=13&amp;md5=d4b7491907c191cd166e1ac750270643\">https:\/\/jfrog.co\/43vkg3Y<\/a> #SoftwareSupplyChain #DevOps #DevSecOps #cybersecurity #containers #CVE\n<\/p>\n<p><b>About JFrog<\/b><\/p>\n<p>\nJFrog Ltd. (Nasdaq: FROG) is on a mission to power the world with liquid software. We are replacing endless software updates with a single system of record that seamlessly delivers secure applications from developer to device. The JFrog Software Supply Chain Platform helps organizations build, manage, and distribute software quickly and securely, making applications available, traceable, and tamper-proof. Its integrated security features also help identify, protect, and remediate against threats and vulnerabilities. The Platform also brings ML models in line with all other software development processes, providing a single source of truth for all software components across Engineering, MLOps, DevOps, and DevSecOps teams so they can build and release AI applications faster, with minimal risk and less cost. JFrog\u2019s hybrid, universal, multi-cloud platform is available as both self-hosted and SaaS services across major cloud service providers. Millions of users and 7K+ customers worldwide, including a majority of the Fortune 100, depend on JFrog solutions to securely embrace digital transformation. Once you leap forward, you won\u2019t go back! Learn more at <a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fjfrog.com%2F%3Futm_source%3DMLFlow%2520%26utm_medium%3Dbusinesswire%26utm_campaign%3Dproduct%26utm_content%3Dpr&amp;esheet=54231490&amp;newsitemid=20250401200753&amp;lan=en-US&amp;anchor=jfrog.com&amp;index=14&amp;md5=731b01985f42062b5c0f18ce6502fa44\">jfrog.com<\/a> and follow us on X: <a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=http%3A%2F%2Fwww.twitter.com%2Fjfrog&amp;esheet=54231490&amp;newsitemid=20250401200753&amp;lan=en-US&amp;anchor=%40jfrog.&amp;index=15&amp;md5=b1bafbbba355fff88c963a5b432eae58\">@jfrog.<\/a><\/p>\n<table cellspacing=\"0\" class=\"bwtablemarginb bwblockalignl\">\n<tr>\n<td class=\"bwvertalignt bwpadl0\" rowspan=\"1\" colspan=\"1\">\n<p class=\"bwcellpmargin\">\n____________________\n<\/p>\n<\/td>\n<\/tr>\n<\/table>\n<p><sup>1<\/sup><i>The JFrog Severity Rating methodology considers the likelihood of vulnerability exploitability, unlike CVSS ratings, which focus only on exploitation severity, often overestimating risks.<\/i><\/p>\n<p><img decoding=\"async\" alt=\"\" src=\"https:\/\/cts.businesswire.com\/ct\/CT?id=bwnews&amp;sty=20250401200753r2&amp;sid=flmnd&amp;distro=nx&amp;lang=en\" style=\"width:0;height:0\" \/><span class=\"bwct31415\" \/><\/p>\n<p id=\"mmgallerylink\"><span id=\"mmgallerylink-phrase\">View source version on businesswire.com: <\/span><span id=\"mmgallerylink-link\"><a href=\"https:\/\/www.businesswire.com\/news\/home\/20250401200753\/en\/\" rel=\"nofollow\">https:\/\/www.businesswire.com\/news\/home\/20250401200753\/en\/<\/a><\/span><\/p>\n<p><b>Media Contact:<br \/>\n<\/b><br \/>Siobhan Lyons, Sr. Manager, Global Communications, <a rel=\"nofollow\" href=\"mailto:siobhanL@jfrog.com\">siobhanL@jfrog.com<\/a><\/p>\n<p><b>Investor Contact:<br \/>\n<\/b><br \/>Jeff Schreiner, VP of Investor Relations, <a rel=\"nofollow\" href=\"mailto:jeffS@jfrog.com\">jeffS@jfrog.com<\/a><\/p>\n<p><b>KEYWORDS:<\/b> Europe United States United Kingdom North America California<\/p>\n<p><b>INDUSTRY KEYWORDS:<\/b> Software Supply Chain Management Networks Professional Services Business Data Management Apps\/Applications Technology Artificial Intelligence Security Data Analytics Retail Other Technology<\/p>\n<p><b>MEDIA:<\/b><\/p>\n<table cellpadding=\"3\" cellspacing=\"3\">\n<tr>\n<td><font face=\"Arial\" size=\"2\"><b>Photo<\/b><\/font><\/td>\n<\/tr>\n<tr>\n<td><img decoding=\"async\" src=\"https:\/\/mms.businesswire.com\/media\/20250401200753\/en\/2426717\/3\/SSCSU_2025_1280x960.jpg\" alt=\"Photo\" \/><\/td>\n<\/tr>\n<tr>\n<td><font face=\"Arial\" size=\"2\">The Software Supply Chain State of the Union 2025 Report Reveals \u201cQuad-fecta\u201d of Security Exploits, Mis-scored CVEs, Poor ML Model Governance, &amp; more are Jeopardizing Trust in Newly Created Software<\/font><\/td>\n<\/tr>\n<tr>\n<td><font face=\"Arial\" size=\"2\"><b>Logo<\/b><\/font><\/td>\n<\/tr>\n<tr>\n<td><img decoding=\"async\" src=\"https:\/\/mms.businesswire.com\/media\/20250401200753\/en\/2343408\/3\/JFrog.jpg\" alt=\"Logo\" \/><\/td>\n<\/tr>\n<tr>\n<td><font face=\"Arial\" size=\"2\"><\/font><\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>JFrog Enables Trusted AI &#8211; Uncovers Critical Security Threats Emerging from AI\u2019s Expansion in the Software Supply Chain The Software Supply Chain State of the Union 2025 Report Reveals \u201cQuad-fecta\u201d of Security Exploits, Mis-scored CVEs, Poor ML Model Governance, &amp; more are Jeopardizing Trust in Newly Created Software SUNNYVALE, Calif. &amp; LONDON&#8211;(BUSINESS WIRE)&#8211;(KubeCon + CloudNativeCon Europe) \u2014 JFrog Ltd (Nasdaq: FROG), the Liquid Software company and creators of the JFrog Software Supply Chain Platform, today released the Software Supply Chain State of the Union 2025 report, which highlights emerging software security threats, evolving DevOps risks and best practices, and potentially explosive security concerns in the AI era. This press release features multimedia. View the full release here: https:\/\/www.businesswire.com\/news\/home\/20250401200753\/en\/ The Software &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.marketnewsdesk.com\/index.php\/jfrog-enables-trusted-ai-uncovers-critical-security-threats-emerging-from-ais-expansion-in-the-software-supply-chain-2\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;JFrog Enables Trusted AI &#8211; Uncovers Critical Security Threats Emerging from AI\u2019s Expansion in the Software Supply Chain&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-832567","post","type-post","status-publish","format-standard","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>JFrog Enables Trusted AI - Uncovers Critical Security Threats Emerging from AI\u2019s Expansion in the Software Supply Chain - Market Newsdesk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.marketnewsdesk.com\/index.php\/jfrog-enables-trusted-ai-uncovers-critical-security-threats-emerging-from-ais-expansion-in-the-software-supply-chain-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"JFrog Enables Trusted AI - Uncovers Critical Security Threats Emerging from AI\u2019s Expansion in the Software Supply Chain - Market Newsdesk\" \/>\n<meta property=\"og:description\" content=\"JFrog Enables Trusted AI &#8211; Uncovers Critical Security Threats Emerging from AI\u2019s Expansion in the Software Supply Chain The Software Supply Chain State of the Union 2025 Report Reveals \u201cQuad-fecta\u201d of Security Exploits, Mis-scored CVEs, Poor ML Model Governance, &amp; more are Jeopardizing Trust in Newly Created Software SUNNYVALE, Calif. &amp; LONDON&#8211;(BUSINESS WIRE)&#8211;(KubeCon + CloudNativeCon Europe) \u2014 JFrog Ltd (Nasdaq: FROG), the Liquid Software company and creators of the JFrog Software Supply Chain Platform, today released the Software Supply Chain State of the Union 2025 report, which highlights emerging software security threats, evolving DevOps risks and best practices, and potentially explosive security concerns in the AI era. This press release features multimedia. View the full release here: https:\/\/www.businesswire.com\/news\/home\/20250401200753\/en\/ The Software &hellip; Continue reading &quot;JFrog Enables Trusted AI &#8211; Uncovers Critical Security Threats Emerging from AI\u2019s Expansion in the Software Supply Chain&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.marketnewsdesk.com\/index.php\/jfrog-enables-trusted-ai-uncovers-critical-security-threats-emerging-from-ais-expansion-in-the-software-supply-chain-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Market Newsdesk\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-01T17:44:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mms.businesswire.com\/media\/20250401200753\/en\/2426717\/4\/SSCSU_2025_1280x960.jpg\" \/>\n<meta name=\"author\" content=\"Newsdesk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Newsdesk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/jfrog-enables-trusted-ai-uncovers-critical-security-threats-emerging-from-ais-expansion-in-the-software-supply-chain-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/jfrog-enables-trusted-ai-uncovers-critical-security-threats-emerging-from-ais-expansion-in-the-software-supply-chain-2\\\/\"},\"author\":{\"name\":\"Newsdesk\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#\\\/schema\\\/person\\\/482f27a394d4fda80ecb5499e519d979\"},\"headline\":\"JFrog Enables Trusted AI &#8211; Uncovers Critical Security Threats Emerging from AI\u2019s Expansion in the Software Supply Chain\",\"datePublished\":\"2025-04-01T17:44:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/jfrog-enables-trusted-ai-uncovers-critical-security-threats-emerging-from-ais-expansion-in-the-software-supply-chain-2\\\/\"},\"wordCount\":1235,\"image\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/jfrog-enables-trusted-ai-uncovers-critical-security-threats-emerging-from-ais-expansion-in-the-software-supply-chain-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mms.businesswire.com\\\/media\\\/20250401200753\\\/en\\\/2426717\\\/4\\\/SSCSU_2025_1280x960.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/jfrog-enables-trusted-ai-uncovers-critical-security-threats-emerging-from-ais-expansion-in-the-software-supply-chain-2\\\/\",\"url\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/jfrog-enables-trusted-ai-uncovers-critical-security-threats-emerging-from-ais-expansion-in-the-software-supply-chain-2\\\/\",\"name\":\"JFrog Enables Trusted AI - Uncovers Critical Security Threats Emerging from AI\u2019s Expansion in the Software Supply Chain - Market Newsdesk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/jfrog-enables-trusted-ai-uncovers-critical-security-threats-emerging-from-ais-expansion-in-the-software-supply-chain-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/jfrog-enables-trusted-ai-uncovers-critical-security-threats-emerging-from-ais-expansion-in-the-software-supply-chain-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mms.businesswire.com\\\/media\\\/20250401200753\\\/en\\\/2426717\\\/4\\\/SSCSU_2025_1280x960.jpg\",\"datePublished\":\"2025-04-01T17:44:01+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#\\\/schema\\\/person\\\/482f27a394d4fda80ecb5499e519d979\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/jfrog-enables-trusted-ai-uncovers-critical-security-threats-emerging-from-ais-expansion-in-the-software-supply-chain-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/jfrog-enables-trusted-ai-uncovers-critical-security-threats-emerging-from-ais-expansion-in-the-software-supply-chain-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/jfrog-enables-trusted-ai-uncovers-critical-security-threats-emerging-from-ais-expansion-in-the-software-supply-chain-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mms.businesswire.com\\\/media\\\/20250401200753\\\/en\\\/2426717\\\/4\\\/SSCSU_2025_1280x960.jpg\",\"contentUrl\":\"https:\\\/\\\/mms.businesswire.com\\\/media\\\/20250401200753\\\/en\\\/2426717\\\/4\\\/SSCSU_2025_1280x960.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/jfrog-enables-trusted-ai-uncovers-critical-security-threats-emerging-from-ais-expansion-in-the-software-supply-chain-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"JFrog Enables Trusted AI &#8211; Uncovers Critical Security Threats Emerging from AI\u2019s Expansion in the Software Supply Chain\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#website\",\"url\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/\",\"name\":\"Market Newsdesk\",\"description\":\"Latest Business News in Real Time\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#\\\/schema\\\/person\\\/482f27a394d4fda80ecb5499e519d979\",\"name\":\"Newsdesk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g\",\"caption\":\"Newsdesk\"},\"url\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/author\\\/newsdesk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"JFrog Enables Trusted AI - Uncovers Critical Security Threats Emerging from AI\u2019s Expansion in the Software Supply Chain - Market Newsdesk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.marketnewsdesk.com\/index.php\/jfrog-enables-trusted-ai-uncovers-critical-security-threats-emerging-from-ais-expansion-in-the-software-supply-chain-2\/","og_locale":"en_US","og_type":"article","og_title":"JFrog Enables Trusted AI - Uncovers Critical Security Threats Emerging from AI\u2019s Expansion in the Software Supply Chain - Market Newsdesk","og_description":"JFrog Enables Trusted AI &#8211; Uncovers Critical Security Threats Emerging from AI\u2019s Expansion in the Software Supply Chain The Software Supply Chain State of the Union 2025 Report Reveals \u201cQuad-fecta\u201d of Security Exploits, Mis-scored CVEs, Poor ML Model Governance, &amp; more are Jeopardizing Trust in Newly Created Software SUNNYVALE, Calif. &amp; LONDON&#8211;(BUSINESS WIRE)&#8211;(KubeCon + CloudNativeCon Europe) \u2014 JFrog Ltd (Nasdaq: FROG), the Liquid Software company and creators of the JFrog Software Supply Chain Platform, today released the Software Supply Chain State of the Union 2025 report, which highlights emerging software security threats, evolving DevOps risks and best practices, and potentially explosive security concerns in the AI era. This press release features multimedia. View the full release here: https:\/\/www.businesswire.com\/news\/home\/20250401200753\/en\/ The Software &hellip; Continue reading \"JFrog Enables Trusted AI &#8211; Uncovers Critical Security Threats Emerging from AI\u2019s Expansion in the Software Supply Chain\"","og_url":"https:\/\/www.marketnewsdesk.com\/index.php\/jfrog-enables-trusted-ai-uncovers-critical-security-threats-emerging-from-ais-expansion-in-the-software-supply-chain-2\/","og_site_name":"Market Newsdesk","article_published_time":"2025-04-01T17:44:01+00:00","og_image":[{"url":"https:\/\/mms.businesswire.com\/media\/20250401200753\/en\/2426717\/4\/SSCSU_2025_1280x960.jpg","type":"","width":"","height":""}],"author":"Newsdesk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Newsdesk","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/jfrog-enables-trusted-ai-uncovers-critical-security-threats-emerging-from-ais-expansion-in-the-software-supply-chain-2\/#article","isPartOf":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/jfrog-enables-trusted-ai-uncovers-critical-security-threats-emerging-from-ais-expansion-in-the-software-supply-chain-2\/"},"author":{"name":"Newsdesk","@id":"https:\/\/www.marketnewsdesk.com\/#\/schema\/person\/482f27a394d4fda80ecb5499e519d979"},"headline":"JFrog Enables Trusted AI &#8211; Uncovers Critical Security Threats Emerging from AI\u2019s Expansion in the Software Supply Chain","datePublished":"2025-04-01T17:44:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/jfrog-enables-trusted-ai-uncovers-critical-security-threats-emerging-from-ais-expansion-in-the-software-supply-chain-2\/"},"wordCount":1235,"image":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/jfrog-enables-trusted-ai-uncovers-critical-security-threats-emerging-from-ais-expansion-in-the-software-supply-chain-2\/#primaryimage"},"thumbnailUrl":"https:\/\/mms.businesswire.com\/media\/20250401200753\/en\/2426717\/4\/SSCSU_2025_1280x960.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/jfrog-enables-trusted-ai-uncovers-critical-security-threats-emerging-from-ais-expansion-in-the-software-supply-chain-2\/","url":"https:\/\/www.marketnewsdesk.com\/index.php\/jfrog-enables-trusted-ai-uncovers-critical-security-threats-emerging-from-ais-expansion-in-the-software-supply-chain-2\/","name":"JFrog Enables Trusted AI - Uncovers Critical Security Threats Emerging from AI\u2019s Expansion in the Software Supply Chain - Market Newsdesk","isPartOf":{"@id":"https:\/\/www.marketnewsdesk.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/jfrog-enables-trusted-ai-uncovers-critical-security-threats-emerging-from-ais-expansion-in-the-software-supply-chain-2\/#primaryimage"},"image":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/jfrog-enables-trusted-ai-uncovers-critical-security-threats-emerging-from-ais-expansion-in-the-software-supply-chain-2\/#primaryimage"},"thumbnailUrl":"https:\/\/mms.businesswire.com\/media\/20250401200753\/en\/2426717\/4\/SSCSU_2025_1280x960.jpg","datePublished":"2025-04-01T17:44:01+00:00","author":{"@id":"https:\/\/www.marketnewsdesk.com\/#\/schema\/person\/482f27a394d4fda80ecb5499e519d979"},"breadcrumb":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/jfrog-enables-trusted-ai-uncovers-critical-security-threats-emerging-from-ais-expansion-in-the-software-supply-chain-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.marketnewsdesk.com\/index.php\/jfrog-enables-trusted-ai-uncovers-critical-security-threats-emerging-from-ais-expansion-in-the-software-supply-chain-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/jfrog-enables-trusted-ai-uncovers-critical-security-threats-emerging-from-ais-expansion-in-the-software-supply-chain-2\/#primaryimage","url":"https:\/\/mms.businesswire.com\/media\/20250401200753\/en\/2426717\/4\/SSCSU_2025_1280x960.jpg","contentUrl":"https:\/\/mms.businesswire.com\/media\/20250401200753\/en\/2426717\/4\/SSCSU_2025_1280x960.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/jfrog-enables-trusted-ai-uncovers-critical-security-threats-emerging-from-ais-expansion-in-the-software-supply-chain-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.marketnewsdesk.com\/"},{"@type":"ListItem","position":2,"name":"JFrog Enables Trusted AI &#8211; Uncovers Critical Security Threats Emerging from AI\u2019s Expansion in the Software Supply Chain"}]},{"@type":"WebSite","@id":"https:\/\/www.marketnewsdesk.com\/#website","url":"https:\/\/www.marketnewsdesk.com\/","name":"Market Newsdesk","description":"Latest Business News in Real Time","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.marketnewsdesk.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.marketnewsdesk.com\/#\/schema\/person\/482f27a394d4fda80ecb5499e519d979","name":"Newsdesk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g","caption":"Newsdesk"},"url":"https:\/\/www.marketnewsdesk.com\/index.php\/author\/newsdesk\/"}]}},"_links":{"self":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/posts\/832567","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/comments?post=832567"}],"version-history":[{"count":0,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/posts\/832567\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/media?parent=832567"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/categories?post=832567"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/tags?post=832567"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}