Sonatype (@sonatype) 's Twitter Profile
Sonatype

@sonatype

Develop software fearlessly.

ID: 117142912

linkhttps://www.sonatype.com calendar_today24-02-2010 17:32:39

15,15K Tweet

10,10K Takipçi

910 Takip Edilen

Sonatype (@sonatype) 's Twitter Profile Photo

🤖 The Rise of Shadow AI: Innovation or Chaos? AI is everywhere—but not all of it is sanctioned. Shadow AI, the unsanctioned use of AI tools in organizations, is reshaping workflows just like open source did years ago. It brings speed and innovation, but also security,

Sonatype (@sonatype) 's Twitter Profile Photo

According to Gartner®️, through 2026, 30% of #GenAI projects will be abandoned after proof of concept (POC), due to poor data quality, inadequate risk controls, escalating costs or unclear business value. At Sonatype, we know that successful AI projects start with a secure

According to Gartner®️, through 2026, 30% of #GenAI projects will be abandoned after proof of concept (POC), due to poor data quality, inadequate risk controls, escalating costs or unclear business value.
 
At Sonatype, we know that successful AI projects start with a secure
Sonatype (@sonatype) 's Twitter Profile Photo

#Malware vs. #Vulnerabilities: Do You Know the Difference? bit.ly/41w8mW3 Misunderstanding these threats can leave your #softwaresupplychain exposed. Malware is intentional and malicious—like poisoned food—while vulnerabilities are accidental weaknesses—like spoiled

#Malware vs. #Vulnerabilities: Do You Know the Difference? bit.ly/41w8mW3

Misunderstanding these threats can leave your #softwaresupplychain exposed. Malware is intentional and malicious—like poisoned food—while vulnerabilities are accidental weaknesses—like spoiled
Sonatype (@sonatype) 's Twitter Profile Photo

🚀 Big news! Sonatype is launching the industry’s first AI Software Composition Analysis (#SCA) — bringing end-to-end security, governance, and visibility to AI adoption. As AI accelerates, so do the risks—malware, compliance gaps, and unchecked usage. Sonatype helps you: ✅

🚀 Big news! Sonatype is launching the industry’s first AI Software Composition Analysis (#SCA) — bringing end-to-end security, governance, and visibility to AI adoption.

As AI accelerates, so do the risks—malware, compliance gaps, and unchecked usage. Sonatype helps you:
✅
Sonatype (@sonatype) 's Twitter Profile Photo

🏆 Sonatype Named to the Constellation ShortList for Application Security Testing! We’re proud that Sonatype has been recognized as a leader in Application Security Testing on the Constellation ShortList™ for Q1 2025! This recognition highlights our commitment to empowering

🏆 Sonatype Named to the Constellation ShortList for Application Security Testing! 

We’re proud that Sonatype has been recognized as a leader in Application Security Testing on the Constellation ShortList™ for Q1 2025! This recognition highlights our commitment to empowering
Sonatype (@sonatype) 's Twitter Profile Photo

Fake IP checker utilities like “node-request-ip” are spreading trojans and crypto stealers across Windows, Linux, and macOS. Sonatype detected and blocked these threats—but it’s a reminder that attackers are evolving. Read the full breakdown and stay ahead of emerging threats:

Sonatype (@sonatype) 's Twitter Profile Photo

Sonatype has discovered and responsibly disclosed four vulnerabilities in picklescan, a tool designed to detect unsafe Python pickle files in AI/ML models. These vulnerabilities, now fixed, could allow attackers to slip malicious models past its defenses. This discovery is a

Sonatype has discovered and responsibly disclosed four vulnerabilities in picklescan, a tool designed to detect unsafe Python pickle files in AI/ML models. These vulnerabilities, now fixed, could allow attackers to slip malicious models past its defenses. 

This discovery is a
Sonatype (@sonatype) 's Twitter Profile Photo

We’re proud to announce that Sonatype has been recognized by the 2025 Cybersecurity Excellence Awards! These wins highlight our commitment to securing the software supply chain by providing intelligent automation, advanced SBOM management, and proactive risk mitigation. Sonatype

We’re proud to announce that Sonatype has been recognized by the 2025 Cybersecurity Excellence Awards! These wins highlight our commitment to securing the software supply chain by providing intelligent automation, advanced SBOM management, and proactive risk mitigation.

Sonatype
Sonatype (@sonatype) 's Twitter Profile Photo

Malware attacks against government organizations are escalating—fast. 🚨 bit.ly/3FnFDdn In 2024 alone, over 300,000 malware attacks targeted federal agencies, making up 67.31% of all attempted attacks blocked by Sonatype. Traditional security measures are no longer

Malware attacks against government organizations are escalating—fast. 🚨 bit.ly/3FnFDdn

In 2024 alone, over 300,000 malware attacks targeted federal agencies, making up 67.31% of all attempted attacks blocked by Sonatype. Traditional security measures are no longer
Sonatype (@sonatype) 's Twitter Profile Photo

AI-driven supply chains need secure foundations. Gartner® highlights how AI-powered software solutions are the future of supply chain management, delivering efficiency, transparency, and resilience. bit.ly/435vlIJ Sonatype enables organizations to secure their software

AI-driven supply chains need secure foundations. Gartner® highlights how AI-powered software solutions are the future of supply chain management, delivering efficiency, transparency, and resilience. bit.ly/435vlIJ
 
Sonatype enables organizations to secure their software
Sonatype (@sonatype) 's Twitter Profile Photo

🚨 A data exfiltration campaign was discovered with 10 popular npm crypto packages hijacked — now repurposed to steal sensitive environment variables from unsuspecting developers. bit.ly/422frNa Some of these components have been trusted for nearly a decade and

Sonatype (@sonatype) 's Twitter Profile Photo

Open source malware isn’t slowing down. It’s getting smarter. Sonatype’s Open Source Malware Index Q1 2025 reveals a sharp rise in data exfiltration attacks targeting developers — and the stakes are only getting higher. 📈 17,954 new malicious packages identified 📤 56% of them

Open source malware isn’t slowing down. It’s getting smarter. Sonatype’s Open Source Malware Index Q1 2025 reveals a sharp rise in data exfiltration attacks targeting developers — and the stakes are only getting higher.

📈 17,954 new malicious packages identified
📤 56% of them
Sonatype (@sonatype) 's Twitter Profile Photo

A new Apache Tomcat vulnerability (CVE-2025-24813) was exploited within hours of disclosure, and the threat is real and growing. Learn why this flaw is so dangerous, and what teams must do to stay protected. bit.ly/42apLEl #ApacheTomcat #CyberSecurity

Sonatype (@sonatype) 's Twitter Profile Photo

🚨 Software attacks are on the rise — and regulators are responding. bit.ly/4iac7FT Our latest executive brief with The Futurum Group explains why 2025 is a defining year for software security, compliance, and board-level accountability. Learn what every executive

Sonatype (@sonatype) 's Twitter Profile Photo

Software supply chain security isn’t just an IT issue anymore — it’s a boardroom priority. With attacks on open source rising 156% in 2024 and new regulations taking effect, executives must lead with proactive strategies that balance innovation, risk, and compliance. Explore

Sonatype (@sonatype) 's Twitter Profile Photo

Are your AI models compliant and secure? Sonatype’s discovery of four picklescan bypasses is a wake-up call for any team using open source AI. Insecure models can silently introduce risk into your environment—long before they reach production. Read the whitepaper to strengthen

Are your AI models compliant and secure?

Sonatype’s discovery of four picklescan bypasses is a wake-up call for any team using open source AI. Insecure models can silently introduce risk into your environment—long before they reach production.

Read the whitepaper to strengthen
Sonatype (@sonatype) 's Twitter Profile Photo

Data and model poisoning attacks are on the rise — and they threaten the integrity of AI at its core. In part two of our OWASP LLM Top 10 blog series, we break down how Sonatype helps organizations detect and prevent poisoning attacks before they compromise your models. 🔍

Sonatype (@sonatype) 's Twitter Profile Photo

Streamline security without slowing innovation. Discover how one financial enterprise used Sonatype Lifecycle to scale security, boost efficiency, and reduce risk: 📈 3x faster onboarding 🔍 335% more scans 🛡️ 25% fewer critical risks Read the full story:

Streamline security without slowing innovation.
Discover how one financial enterprise used Sonatype Lifecycle to scale security, boost efficiency, and reduce risk:

📈 3x faster onboarding
🔍 335% more scans
🛡️ 25% fewer critical risks

Read the full story:
Sonatype (@sonatype) 's Twitter Profile Photo

Java changed everything — igniting the open source revolution and redefining modern software development. In this deep dive from The New Stack, Sonatype CTO and co-founder Brian Fox reflects on the early days of open source and the movement that followed, in conversation with

Sonatype (@sonatype) 's Twitter Profile Photo

Security and speed don’t have to compete. Discover how Sonatype enables teams to streamline software composition analysis (#SCA) with automated solutions that scale, reducing manual effort while enhancing their risk posture. 🔐 Read the blog: bit.ly/4kjvf6h #DevSecOps