sonatype Profile Banner
Sonatype Profile
Sonatype

@sonatype

Followers
11K
Following
9K
Media
8K
Statuses
16K

Develop software fearlessly.

Joined February 2010
Don't wanna be here? Send us removal request.
@sonatype
Sonatype
3 days
In finance, trust is everything, and that extends to your #softwaresupplychain. 🔐. Sonatype is trusted by over 70% of the Fortune 100, including leading global banks and insurers, to secure their open source components and reduce software risk at scale. Explore how Sonatype
Tweet media one
0
0
0
@sonatype
Sonatype
9 days
LLMs are powerful, but their outputs aren’t always safe. Improper output handling can lead to code injection, outages & compliance failures. Learn how Sonatype helps teams validate LLM responses before they reach production: #AIsecurity #OWASP #DevSecOps.
0
0
1
@sonatype
Sonatype
1 month
Security and speed don’t have to compete. Discover how Sonatype enables teams to streamline software composition analysis (#SCA) with automated solutions that scale, reducing manual effort while enhancing their risk posture. 🔐 Read the blog: #DevSecOps.
0
0
0
@sonatype
Sonatype
1 month
Java changed everything — igniting the open source revolution and redefining modern software development. In this deep dive from @thenewstack, Sonatype CTO and co-founder Brian Fox reflects on the early days of open source and the movement that followed, in conversation with.
0
1
2
@sonatype
Sonatype
1 month
Streamline security without slowing innovation. Discover how one financial enterprise used Sonatype Lifecycle to scale security, boost efficiency, and reduce risk:. 📈 3x faster onboarding.🔍 335% more scans.🛡️ 25% fewer critical risks. Read the full story:
Tweet media one
0
0
0
@sonatype
Sonatype
1 month
Data and model poisoning attacks are on the rise — and they threaten the integrity of AI at its core. In part two of our OWASP LLM Top 10 blog series, we break down how Sonatype helps organizations detect and prevent poisoning attacks before they compromise your models. 🔍.
0
0
0
@sonatype
Sonatype
2 months
Are your AI models compliant and secure?. Sonatype’s discovery of four picklescan bypasses is a wake-up call for any team using open source AI. Insecure models can silently introduce risk into your environment—long before they reach production. Read the whitepaper to strengthen
Tweet media one
0
1
1
@sonatype
Sonatype
2 months
Software supply chain security isn’t just an IT issue anymore — it’s a boardroom priority. With attacks on open source rising 156% in 2024 and new regulations taking effect, executives must lead with proactive strategies that balance innovation, risk, and compliance. Explore.
0
0
0
@sonatype
Sonatype
3 months
🚨 Software attacks are on the rise — and regulators are responding. Our latest executive brief with The Futurum Group explains why 2025 is a defining year for software security, compliance, and board-level accountability. Learn what every executive.
0
0
1
@sonatype
Sonatype
3 months
A new Apache Tomcat vulnerability (CVE-2025-24813) was exploited within hours of disclosure, and the threat is real and growing. Learn why this flaw is so dangerous, and what teams must do to stay protected. #ApacheTomcat #CyberSecurity.
0
0
1
@sonatype
Sonatype
3 months
Open source malware isn’t slowing down. It’s getting smarter. Sonatype’s Open Source Malware Index Q1 2025 reveals a sharp rise in data exfiltration attacks targeting developers — and the stakes are only getting higher. 📈 17,954 new malicious packages identified.📤 56% of them
Tweet media one
0
2
3
@sonatype
Sonatype
3 months
🚨 A data exfiltration campaign was discovered with 10 popular npm crypto packages hijacked — now repurposed to steal sensitive environment variables from unsuspecting developers. Some of these components have been trusted for nearly a decade and.
0
0
0
@sonatype
Sonatype
4 months
AI-driven supply chains need secure foundations. GartnerÂŽ highlights how AI-powered software solutions are the future of supply chain management, delivering efficiency, transparency, and resilience. Sonatype enables organizations to secure their software
Tweet media one
0
0
1
@sonatype
Sonatype
4 months
Malware attacks against government organizations are escalating—fast. 🚨 In 2024 alone, over 300,000 malware attacks targeted federal agencies, making up 67.31% of all attempted attacks blocked by Sonatype. Traditional security measures are no longer
Tweet media one
0
0
1
@sonatype
Sonatype
4 months
We’re proud to announce that Sonatype has been recognized by the 2025 Cybersecurity Excellence Awards! These wins highlight our commitment to securing the software supply chain by providing intelligent automation, advanced SBOM management, and proactive risk mitigation. Sonatype
Tweet media one
0
1
2
@sonatype
Sonatype
4 months
Sonatype has discovered and responsibly disclosed four vulnerabilities in picklescan, a tool designed to detect unsafe Python pickle files in AI/ML models. These vulnerabilities, now fixed, could allow attackers to slip malicious models past its defenses. This discovery is a
Tweet media one
0
0
2
@sonatype
Sonatype
4 months
Fake IP checker utilities like “node-request-ip” are spreading trojans and crypto stealers across Windows, Linux, and macOS. Sonatype detected and blocked these threats—but it’s a reminder that attackers are evolving. Read the full breakdown and stay ahead of emerging threats:.
0
0
1
@sonatype
Sonatype
4 months
🏆 Sonatype Named to the Constellation ShortList for Application Security Testing! . We’re proud that Sonatype has been recognized as a leader in Application Security Testing on the Constellation ShortList™ for Q1 2025! This recognition highlights our commitment to empowering
Tweet media one
0
0
1
@sonatype
Sonatype
4 months
🚀 Big news! Sonatype is launching the industry’s first AI Software Composition Analysis (#SCA) — bringing end-to-end security, governance, and visibility to AI adoption. As AI accelerates, so do the risks—malware, compliance gaps, and unchecked usage. Sonatype helps you:.✅
Tweet media one
0
0
1
@sonatype
Sonatype
4 months
#Malware vs. #Vulnerabilities: Do You Know the Difference? Misunderstanding these threats can leave your #softwaresupplychain exposed. Malware is intentional and malicious—like poisoned food—while vulnerabilities are accidental weaknesses—like spoiled
Tweet media one
0
0
1