Sonar Blog

Home

BLOG

Sonar's latest blog posts

Featured Post

Building Confidence and Trust in AI-Generated Code

To tackle the accountability and ownership challenge accompanying AI-generated code, we are introducing Sonar AI Code Assurance

Read More
https://assets-eu-01.kc-usercontent.com:443/69414945-f022-01b0-62c9-fdd1323f5fe5/0bd6c0bc-c921-485b-8570-8de7e1384983/AI%20Code%20Assurance_square-index%402x.png
https://assets-eu-01.kc-usercontent.com:443/69414945-f022-01b0-62c9-fdd1323f5fe5/7dd61237-88ff-4c96-aa5b-7755f58e36eb/open_letter_blog_index.webp
Blog post

An Open Letter to Sonar[Qube] Users

Sonar’s new President of Field Operations introduces herself and reiterates the company's continued commitment to enabling organizations to succeed.

Read blog post >

https://assets-eu-01.kc-usercontent.com:443/69414945-f022-01b0-62c9-fdd1323f5fe5/509db3a7-da2d-4fe4-8c4f-9caadf18d00f/mxss_blog_index.webp
Blog post

mXSS: The Vulnerability Hiding in Your Code

XSS is a well-known bug class, but a lesser-known yet effective variant called mXSS has emerged over the last couple of years. In this blog, we will cover the fundamentals of this XSS variant and examine how you can protect against it.

Read article >

Get new blogs delivered directly to your inbox!

Stay up-to-date with the latest Sonar content. Subscribe now to receive the latest blog articles.

By submitting this form, you agree to the storing and processing of your personal data as described in the Privacy Policy and Cookie Policy. You can withdraw your consent by unsubscribing at any time.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

https://assets-eu-01.kc-usercontent.com:443/69414945-f022-01b0-62c9-fdd1323f5fe5/a25833eb-d9b7-47d8-9c18-d2c362dd604d/g2_2024_blog_index.webp
Blog post

Sonar Named Leader in G2 Spring Report

We are excited to share that the G2 Spring 2024 reports were recently released, and once again, Sonar has been named the LEADER in Static Code Analysis!

Read article >

Image of deeper SAST by Sonar
Blog post

Find Deeply Hidden Security Vulnerabilities with Deeper SAST by Sonar

This post delves into an actual Jenkins vulnerability to understand the intricacies of deeper SAST for detecting deeply hidden code vulnerabilities. It illustrates how deeper SAST works and explains its impact on keeping your code clean and free of these serious issues.

Read article >

https://assets-eu-01.kc-usercontent.com:443/69414945-f022-01b0-62c9-fdd1323f5fe5/4ad4479c-ecb6-4bad-8522-a6f058ab0ae5/parallel_code_security_blog_index.webp
Blog post

Parallel Code Security: The Challenge of Concurrency

Parallelism has been around for decades, but it is still a source of critical vulnerabilities nowadays. This blog post details a severe vulnerability in the remote desktop gateway Apache Guacamole, highlighting the security risks of parallelism.

Read article >

https://assets-eu-01.kc-usercontent.com:443/69414945-f022-01b0-62c9-fdd1323f5fe5/0d1d74a2-aeb7-4568-8a04-60c540df4079/code_interoperability_blog_index.webp
Blog post

Code Interoperability: The Hazards of Technological Variety

The rapid development of different technologies doesn’t come without risks. This blog post details a critical vulnerability in the remote desktop gateway Apache Guacamole, which showcases the challenges of code interoperability.

Read article >

https://assets-eu-01.kc-usercontent.com:443/69414945-f022-01b0-62c9-fdd1323f5fe5/ec424b18-92f6-4541-9300-b4cbecabe266/shift_left_blog_index.webp
Blog post

Leveraging SonarQube Server, SonarQube Cloud, and SonarQube for IDE for Effective Shift Left Practices

Speed and quality are no longer trade-offs in the modern software landscape - they're a tightly interwoven dance. That's where the "Shift Left" philosophy comes in, urging us to move critical checks and balances like code quality analysis earlier in the development lifecycle.

Read article >

https://assets-eu-01.kc-usercontent.com:443/69414945-f022-01b0-62c9-fdd1323f5fe5/13dde10a-3227-42f0-9260-7862f2122ebb/level_up_ci_cd_blog_index.webp
Blog post

Driving DevOps Transformation: Leveling Up CI/CD with Static Code Analysis

Unit and end-to-end testing are effective in ensuring features and functionality work properly, but what about code quality? How can we ensure that our code is reliable, maintainable, and secure? Enter static code analysis.

Read article >

https://assets-eu-01.kc-usercontent.com:443/69414945-f022-01b0-62c9-fdd1323f5fe5/7ed1e8ff-4ee0-4188-a576-26d070db2fe8/legacy_codebases_blog_index.webp
Blog post

Legacy Codebases are a DevOps Issue

Explore how DevOps principles and practices can transform the challenge of managing legacy code into an opportunity for improvement. This piece outlines actionable strategies for refactoring, the importance of automation, and adopting a 'Clean as You Code' approach to ensure sustainable code quality and efficiency.

Read article >

https://assets-eu-01.kc-usercontent.com:443/69414945-f022-01b0-62c9-fdd1323f5fe5/6776f57b-4dac-4b9d-8a52-e17cd6053939/sq_10_5_blog_index.webp
Blog post

SonarQube Server 10.5 Release Announcement

The 10.5 release of SonarQube Server includes support for Java 21, C++23, and TypeScript 5.4. Secrets detection analysis is faster and deeper SAST coverage has increased. Project onboarding is more simplified for monorepos, Maven, and GitHub Actions. Read on to find out about these and much more.

Read article >

https://assets-eu-01.kc-usercontent.com:443/69414945-f022-01b0-62c9-fdd1323f5fe5/8b48b3ee-c446-482c-8c95-ceb0e3221eb7/sourceforge_blog_index.webp
Blog post

Dangerous Import: SourceForge Patches Critical Code Vulnerability

Our Vulnerability Research team discovered a critical code vulnerability in SourceForge, which attackers could have used to poison deployed files and spread malware to millions of users.

Read article >

  • Legal documentation
  • Trust center
  • Follow SonarSource on Twitter
  • Follow SonarSource on Linkedin

© 2008-2024 SonarSource SA. All rights reserved. SONAR, SONARSOURCE, SONARQUBE, and CLEAN AS YOU CODE are trademarks of SonarSource SA.