Sonar Blog

Home

Blog

Sonar's latest blog posts

Featured Post

What Code Issues Caused the CrowdStrike Outage?

This blog post takes a look at the potential code issues behind the recent global CrowdStrike outage.

Read More
https://assets-eu-01.kc-usercontent.com:443/275a16f7-9b36-0172-ed6f-fce50dc34f53/7b69d1cd-74f7-4610-a793-6bd3e35737fa/crowdstrike_blog_featured_2x.webp
https://assets-eu-01.kc-usercontent.com:443/275a16f7-9b36-0172-ed6f-fce50dc34f53/2f9f9f8c-2c32-4b09-9f3a-544fc9dafbaf/java_sast_benchmark_why_you_shouldnt_trust_them_blindly_blog_index.webp
Blog post

Java SAST Benchmarks: why you shouldn't trust them blindly

Java SAST Benchmarks: why you shouldn't trust them blindly

Read blog post >

https://assets-eu-01.kc-usercontent.com:443/275a16f7-9b36-0172-ed6f-fce50dc34f53/7031f784-ed58-4cbb-9054-5a352e680357/interview_with_java_devs_blog_index.webp
Blog post

Interview with Sonar Java Enthusiasts

Interview with Sonar Java Enthusiasts

Read blog post >

Get new blogs delivered directly to your inbox!

Stay up-to-date with the latest Sonar content. Subscribe now to receive the latest blog articles.

By submitting this form, you agree to the storing and processing of your personal data as described in the Privacy Policy and Cookie Policy. You can withdraw your consent by unsubscribing at any time.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

https://assets-eu-01.kc-usercontent.com:443/275a16f7-9b36-0172-ed6f-fce50dc34f53/7fdaf01f-8f86-4022-981e-a4b578ab24a2/ismg_interview_blog_index.webp
Blog Post

ISMG Interview - Securing Applications, Accelerating DevOps with Clean Code

Sonar founder and co-CEO, Olivier Gaudin, sits down with ISMG's Tom Field at Black Hat USA 2023 to discuss how development can be improved to avoid security issues.

Read blog post >

https://assets-eu-01.kc-usercontent.com:443/275a16f7-9b36-0172-ed6f-fce50dc34f53/78644db9-2502-475a-ae0b-ee50203bd1bf/cpp_podcast_key_take_aways_blog_index.webp
Blog post

Why I’m passionate about Static Analysis and how I helped make it better

Why I’m passionate about Static Analysis and how I helped make it better

Read blog post >

https://assets-eu-01.kc-usercontent.com:443/275a16f7-9b36-0172-ed6f-fce50dc34f53/22b2d211-1dae-47d2-a6a1-a733028c3381/redos_attacks_in_javascript_blog_index.webp
Blog post

A comprehensive guide to the dangers of Regular Expressions in JavaScript

A deep investigation into regular expression denial of service (ReDoS) vulnerabilities in JavaScript

Read blog post >

https://assets-eu-01.kc-usercontent.com:443/275a16f7-9b36-0172-ed6f-fce50dc34f53/77ca6fd8-b2f6-48fb-b993-34ffcfd141a5/openrefine_zip_slip_blog_index.webp
Blog post

Unzipping Dangers: OpenRefine Zip Slip Vulnerability

Extracting archives can be very dangerous. Read more about a critical Zip Slip vulnerability SonarCloud detected in the open-source application OpenRefine.

Read article >

Sonar's Scoring on the Top 3 Java SAST Benchmarks
Blog post

Sonar's Scoring on the Top 3 Java SAST Benchmarks

Enhancing SAST Detection: Sonar's Scoring on the Top 3 Java SAST Benchmarks

Read blog post >

https://assets-eu-01.kc-usercontent.com:443/275a16f7-9b36-0172-ed6f-fce50dc34f53/c98d8cef-13c5-41ae-99a2-5d1dffaa51c9/teamcity_vulnerability_blog_index.webp
Blog post

Source Code at Risk: Critical Code Vulnerability in CI/CD Platform TeamCity

Our Vulnerability Research team discovered a critical vulnerability in the popular CI/CD server TeamCity, which attackers could use to steal source code and poison build artifacts.

Read article >

https://assets-eu-01.kc-usercontent.com:443/275a16f7-9b36-0172-ed6f-fce50dc34f53/bc352588-9c6f-4da9-ad87-305da97379c5/open_source_summit_summary_blog_index.webp
Blog Post

Open Source Summit 2023

Open Source Summit 2023

Read blog post >

https://assets-eu-01.kc-usercontent.com:443/275a16f7-9b36-0172-ed6f-fce50dc34f53/966004b2-df51-4096-b4e1-676024cbd862/cognitive-complexity-guide_hero-index.webp
Blog post

5 Clean Code Tips for Reducing Cognitive Complexity

Understanding how Cognitive Complexity works will help guide you on where to focus your time. This blog dives into how this Sonar-exclusive metric was formulated to accurately measure the relative understandability of methods.

Read article >

https://assets-eu-01.kc-usercontent.com:443/275a16f7-9b36-0172-ed6f-fce50dc34f53/e36b96c9-2703-4d5c-9fe2-bc821c5eaaee/stealing_with_style_tutanota_blog_index_v2.webp
Blog post

Remote Code Execution in Tutanota Desktop due to Code Flaw

Our Research team discovered critical code vulnerabilities in Proton Mail, Skiff, and Tutanota. This post covers an XSS vulnerability in Tutanota Desktop and how it can be prevented.

Read article >