Sonar Blog

Home

BLOG

Sonar's latest blog posts

Featured Post

Building Confidence and Trust in AI-Generated Code

To tackle the accountability and ownership challenge accompanying AI-generated code, we are introducing Sonar AI Code Assurance

Read More
https://assets-eu-01.kc-usercontent.com:443/093b835c-5333-0132-0526-5bdca2623961/0bd6c0bc-c921-485b-8570-8de7e1384983/AI%20Code%20Assurance_square-index%402x.png
https://assets-eu-01.kc-usercontent.com:443/093b835c-5333-0132-0526-5bdca2623961/705b838c-d9ff-4043-bfbc-f16b478b86c8/dora_compliance_blog_index.webp
Blog post

Digital Operational Resilience Act (DORA) Compliance for Financial Entities

Leveraging Sonar solutions to ensure code security by design

Read article >

https://assets-eu-01.kc-usercontent.com:443/093b835c-5333-0132-0526-5bdca2623961/58960610-017f-4c9a-ad03-0fd8c166cd7b/vulnerabilities_in_erxes_blog_index.webp
Blog post

Micro Services, Major Headaches: Detecting Vulnerabilities in Erxes' Microservices

Our vulnerability researchers discovered critical vulnerabilities in Erxes with the help of SonarCloud. Learn about the details and how to triage such issues in your own code!

Read article >

Get new blogs delivered directly to your inbox!

Stay up-to-date with the latest Sonar content. Subscribe now to receive the latest blog articles.

By submitting this form, you agree to the storing and processing of your personal data as described in the Privacy Policy and Cookie Policy. You can withdraw your consent by unsubscribing at any time.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

https://assets-eu-01.kc-usercontent.com:443/093b835c-5333-0132-0526-5bdca2623961/194832d8-073b-458c-b7b3-116063be9efb/dirname_in_es_modules_blog_index.webp
Blog post

__dirname is back in Node.js with ES modules

Node.js is reducing friction when using ES modules by making it easier to get the current module directory name

Read blog post >

https://assets-eu-01.kc-usercontent.com:443/093b835c-5333-0132-0526-5bdca2623961/09066b98-a5f5-41aa-9c0a-98ac0e42cbf8/clean_code_tips_blog_index.webp
Blog post

#CleanCodeTips: Unlock Your Coding Potential

As software development evolves, keeping up with best practices, the latest trends, and ensuring your code remains top-notch can feel like sailing uncharted waters. Sonar has the Clean Code tips for you!

Read article >

https://assets-eu-01.kc-usercontent.com:443/093b835c-5333-0132-0526-5bdca2623961/75e7d0c4-4811-4a1f-853b-ab1c4b907e17/r_c_e_vulnerability_mailspring_blog_index.webp
Blog post

Reply to calc: The Attack Chain to Compromise Mailspring

Learn how an attacker can combine multiple security vulnerabilities to achieve arbitrary code execution on a victim that tries to reply or forward a malicious mail in Mailspring.

Read article >

SonarQube and PCI DSS 4.0
Blog post

Are You Ready For PCI DSS 4.0?

PCI DSS 3.2.1 is being retired on March 31, 2024. Are you ready for the new standard, PCI DSS 4.0?

Read article >

https://assets-eu-01.kc-usercontent.com:443/093b835c-5333-0132-0526-5bdca2623961/9c571123-24c2-4b5a-881e-d78b383e3254/pattern_matching_in_java_blog_index%20%282%29.webp
Blog Post

Increase readability with Java's Pattern Matching

Increase readability, reduce cognitive complexity, and avoid bugs that are hard to spot with Java's Pattern Matching.

Read blog post >

https://assets-eu-01.kc-usercontent.com:443/093b835c-5333-0132-0526-5bdca2623961/e9c9976c-6a7a-4723-9a4a-d1ace3f30ea8/opennms_vulnerabilities_blog_index.webp
Blog post

OpenNMS Vulnerabilities: Securing Code against Attackers’ Unexpected Ways

Learn which unexpected ways attackers may take to exploit code vulnerabilities and how to secure against them.

Read article >

https://assets-eu-01.kc-usercontent.com:443/093b835c-5333-0132-0526-5bdca2623961/4ef3a97b-688d-40e2-b56e-f9e262a742a9/white_house_memory_safe_blog_index.webp
Blog post

White House emphasizes need for proactive coding practices to counter cyber attacks

The ONCD recent report puts a spotlight on one of the most foundational issues that result in insecure software. Sonar applauds the administration’s call for addressing software vulnerabilities at the programming language and source code levels.

Read blog post >

https://assets-eu-01.kc-usercontent.com:443/093b835c-5333-0132-0526-5bdca2623961/78ccb47b-5861-4529-8ae5-9cac626d51aa/sonar_updates_iso_certificate_blog_index.webp
Blog post

Sonar Reaffirms Strength of its Information Security Management Systems by Earning The Latest ISO Certification, ISO27001:2022

As part of our continuously advancing and improving security practice, we are pleased to announce that Sonar and its products are now certified to the latest version of the ISO72001 standard.

Read article >

https://assets-eu-01.kc-usercontent.com:443/093b835c-5333-0132-0526-5bdca2623961/839b29ec-3657-4416-aef2-e87ab4dc596f/prooblem_awareness_blog_index.webp
Blog post

How timely delivery comes from transparent outsourced software development communication

Ineffective communication impacts everything in software development. To ensure your next project meets expectations, transparent communication is essential for driving timely delivery when working with internal and external development teams.

Read article >