Sonar's latest blog posts
The Coding Personalities of Leading LLMs
Make smarter AI adoption decisions with Sonar's latest report in The State of Code series. Explore the habits, blind spots, and archetypes of the top five LLMs to uncover the critical risks each brings to your codebase.


Cyber Resilience Act: Geschwindigkeit und Sicherheit mit KI-Codierung steuern
Die moderne Softwareentwicklung steht im Spannungsfeld zweier mächtiger Kräfte. Einerseits beschleunigen generative Codierungstools auf Basis künstlicher Intelligenz (KI) die Entwicklungsgeschwindigkeit auf Kosten strenger Sicherheitsüberprüfungen.
Artikel lesen >

Java 23: Embrace the new era of code comments
We’ve covered Java 22, and are now getting into Java 23, which introduces several new language features. We’ll focus on enhancing documentation, and how to leverage the new features with simple examples.
Read article >
Get new blogs delivered directly to your inbox!
Stay up-to-date with the latest Sonar content. Subscribe now to receive the latest blog articles.

What's the top bug in your language? Find out in The State of Code: Languages report
The State of Code report analyzes 7.9B lines of code, revealing top security risks like log injection and XSS and how to fix them.
Read article >

How Sonar Helps Achieve a Strong SOC 2 Type II Report
An SOC 2 Type II report is a critical attestation for service organizations, demonstrating their commitment to securely managing customer data over time. Learn how SonarQube can streamline your SOC 2 compliance journey!
Read article >

Protecting your AI code: How SonarQube defends against the "Rules File Backdoor"
This case highlights an issue where configuration files were manipulated through hidden Unicode characters, which is a vector now commonly referred to as the "Rules File Backdoor".
Read article >

Java 22: Leverage unnamed variables and patterns
Java 22 introduces several new language features but there’s one particularly important. This article shows you how to leverage the Unnamed variables and patterns with simple examples.
Read article >

Wie SonarQube die DORA-Konformität für Finanzinstitute ermöglicht
Die Finanzdienstleistungsbranche befindet sich an einem kritischen Punkt. Da der Digital Operational Resilience Act (DORA) nun in der gesamten Europäischen Union in vollem Umfang in Kraft ist, müssen Finanzinstitute robuste Cybersicherheit und operative Belastbarkeit nachweisen.
Artikel lesen >

Tame technical debt with insights from The State of Code: Maintainability report
Tame technical debt with insights from The State of Code: Maintainability report
Read article >

Securing Kotlin Apps With SonarQube: Real-World Examples
Explore how real-world vulnerabilities look in the Kotlin code of Android apps and see how SonarQube helps detect them.
Read article >

The biggest security risks unveiled in The State of Code: Security report
The State of Code report analyzes 7.9B lines of code, revealing top security risks like log injection and XSS and how to fix them.
Read article >

Caught in the FortiNet: How Attackers Can Exploit FortiClient to Compromise Organizations (3/3)
In the last blog of this series, we will focus back on FortiClient and learn how the inner workings of this application work, and what crucial mistake happened that led to us uncovering a local privilege escalation vulnerability.
Read article >