Sonar Blog

Home

Sonar's latest blog posts

Featured Post

Building Confidence and Trust in AI-Generated Code

To tackle the accountability and ownership challenge accompanying AI-generated code, we are introducing Sonar AI Code Assurance

Read More
AI generated code is detected in project
Image for Apache Dubbo Consumer Risks: The Road Not Taken
Blog post

Apache Dubbo Consumer Risks: The Road Not Taken

Explore the lesser-known Apache Dubbo risks that weren’t well documented until now, and delve into the importance of clean code ensuring clarity, maintainability, and comprehensibility.

Read article >

Image for Ensuring the right usage of Java 21 new features
Blog Post

Ensuring the right usage of Java 21 new features

Last September 2023 Java 21 was released as the latest LTS (Long Time Support). But taking advantage of the changes and new features, which we are not used to including in our code, can be a tough task. Also, it can lead to improper use or poor uptake, bugs, or basically not taking full advantage of new improvements.

Read blog post >

Get new blogs delivered directly to your inbox!

Stay up-to-date with the latest Sonar content. Subscribe now to receive the latest blog articles.

I do not wish to receive promotional emails about upcoming SonarQube updates, new releases, news and events.

By submitting this form, you agree to the storing and processing of your personal data as described in the Privacy Policy and Cookie Policy. You can withdraw your consent by unsubscribing at any time.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Image for Technical debt’s impact on development speed and code quality
Blog post

Technical debt’s impact on development speed and code quality

By acknowledging the impact of technical debt and embracing proactive solutions like Sonar, development teams can mitigate its effects and build software that is resilient, reliable, and scalable.

Read article >

Image for Digital Operational Resilience Act (DORA) Compliance for Financial Entities
Blog post

Digital Operational Resilience Act (DORA) Compliance for Financial Entities

Leveraging Sonar solutions to ensure code security by design

Read article >

Image for Micro Services, Major Headaches: Detecting Vulnerabilities in Erxes' Microservices
Blog post

Micro Services, Major Headaches: Detecting Vulnerabilities in Erxes' Microservices

Our vulnerability researchers discovered critical vulnerabilities in Erxes with the help of SonarQube Cloud. Learn about the details and how to triage such issues in your own code!

Read article >

Image for __dirname is back in Node.js with ES modules
Blog post

__dirname is back in Node.js with ES modules

Node.js is reducing friction when using ES modules by making it easier to get the current module directory name

Read blog post >

Image for #CleanCodeTips: Unlock Your Coding Potential
Blog post

#CleanCodeTips: Unlock Your Coding Potential

As software development evolves, keeping up with best practices, the latest trends, and ensuring your code remains top-notch can feel like sailing uncharted waters. Sonar has the Clean Code tips for you!

Read article >

Image for Reply to calc: The Attack Chain to Compromise Mailspring
Blog post

Reply to calc: The Attack Chain to Compromise Mailspring

Learn how an attacker can combine multiple security vulnerabilities to achieve arbitrary code execution on a victim that tries to reply or forward a malicious mail in Mailspring.

Read article >

SonarQube and PCI DSS 4.0
Blog post

Are You Ready For PCI DSS 4.0?

PCI DSS 3.2.1 is being retired on March 31, 2024. Are you ready for the new standard, PCI DSS 4.0?

Read article >

Image for Increase readability with Java's Pattern Matching
Blog Post

Increase readability with Java's Pattern Matching

Increase readability, reduce cognitive complexity, and avoid bugs that are hard to spot with Java's Pattern Matching.

Read blog post >

Image for OpenNMS Vulnerabilities: Securing Code against Attackers’ Unexpected Ways
Blog post

OpenNMS Vulnerabilities: Securing Code against Attackers’ Unexpected Ways

Learn which unexpected ways attackers may take to exploit code vulnerabilities and how to secure against them.

Read article >