Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      June 7, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      June 7, 2025

      How To Prevent WordPress SQL Injection Attacks

      June 7, 2025

      AI is currently in its teenage years, battling raging hormones

      June 6, 2025

      Dune: Awakening is already making big waves before it’s even fully released

      June 7, 2025

      MSI Claw owners need to grab this Intel Arc GPU driver update to fix an irritating audio bug on their Windows 11 handhelds

      June 7, 2025

      PC Gaming Show returns June 8 — here’s when and how to watch the show

      June 7, 2025

      You can now buy two Nintendo Switch 2 consoles for the price of one ROG Ally X

      June 7, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      mkocansey/bladewind

      June 7, 2025
      Recent

      mkocansey/bladewind

      June 7, 2025

      Handling PostgreSQL Migrations in Node.js

      June 6, 2025

      How to Add Product Badges in Optimizely Configured Commerce Spire

      June 6, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Dune: Awakening is already making big waves before it’s even fully released

      June 7, 2025
      Recent

      Dune: Awakening is already making big waves before it’s even fully released

      June 7, 2025

      MSI Claw owners need to grab this Intel Arc GPU driver update to fix an irritating audio bug on their Windows 11 handhelds

      June 7, 2025

      PC Gaming Show returns June 8 — here’s when and how to watch the show

      June 7, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Tech & Work»Hopper Emerges from Stealth to Redefine Open-Source Security

    Hopper Emerges from Stealth to Redefine Open-Source Security

    April 22, 2025

    Hopper officially launched out of stealth to reinvent how organizations manage open-source software (OSS)  risk.

    Modern software relies on open-source. As OSS scaled, accelerated by AI, legacy security tools failed to keep pace, introducing undesired cost, complexity, and drag on developer productivity. Gartner cites false positives, alert fatigue, and the lack of exploitability context such as function-level reachability as key barriers to effective application security.

    Today’s Software Composition Analysis (SCA) platforms overwhelm teams with noise, miss critical risks, and frustrate developers. Hopper delivers a modern alternative to SCA, with function-level reachability, automated asset discovery, hidden vulnerability detection, and support for complex web frameworks — all without agents or CI changes.

    Hopper is already used by Fortune 500s and fast-growing tech companies, empowering security and engineering teams to replace legacy SCA tools and secure their code with a more precise, developer-aligned solution. Before switching, Hopper customers report spending up to 8 percent of total development time addressing alerts. By improving remediation SLAs, reducing MTTR, and boosting developer productivity, Hopper becomes a cost reduction tool for the enterprise.

    “We didn’t start Hopper because the world needed another SCA tool,” said Roy Gottlieb, Co-founder and CEO. “We started it because existing solutions overwhelm teams and slow down development. Hopper is built to cut through the clutter, surface real risks, and make open-source security fast, accurate, and developer-friendly.”

    Gottlieb is a seasoned investor and operator, a veteran of Unit 81, and recipient of the Israel Defense Prize. His co-founder, Oron Gutman, is a veteran vulnerability researcher and two-time Israel Defense Prize winner, with 14 years of experience including section lead of Unit 8200.

    Why Function-Level Reachability Matters

    Most vulnerability databases (NVD, OSV.dev, and GitHub) don’t reveal where a vulnerability lives in the code. CVE standards intentionally omit function-level detail to avoid exploitation, but that tradeoff comes at a cost.

    Log4J, for example,  contains 60,000+ lines of code and 7,000 functions, but only the lookup function in JndiManager class was exploitable. Hopper closes that gap with a proprietary knowledge base mapping vulnerable functions across the OSS ecosystem.

    “Hopper doesn’t just tell you that a vulnerability exists. It shows you the line of code, the function, the evidence, and why it matters. That’s what finally gets developers to act,” said a Fortune 100 CISO, speaking under NDA.

    Built for Modern Security and Engineering Teams

    Where legacy SCAs inventory manifest files, Hopper simulates how applications are built and executed, providing deep visibility without agents or CI/CD integration, delivering:

    • Function-level reachability across direct, transitive, and internal dependencies

    • Full SBOM and VEX export, aligned with compliance workflows

    • Agentless deployment, via read-only Git access

    • Contextual remediation evidence, linked directly to source

    • Automatic asset discovery, including internal and shadow dependencies

    Backed by Industry Builders

    Hopper raised $7.6 million in seed funding, co-led by Meron Capital and New Era, with participation from the Sequoia Scout Fund, M-Fund, and leaders behind exits to Intel, Oracle, Google, HPE, Symantec, ZoomInfo, AWS, and more.

    Hopper is now available to organizations ready to stop chasing noise and start fixing real risk. Learn more at hopper.security

    The post Hopper Emerges from Stealth to Redefine Open-Source Security appeared first on SD Times.

    Source: Read More 

    news
    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCritical Security Vulnerability Found in WordPress Plugin InstaWP Connect
    Next Article Verifying Exception Reporting in Laravel with assertReported

    Related Posts

    Tech & Work

    The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

    June 7, 2025
    Tech & Work

    How To Fix Largest Contentful Paint Issues With Subpart Analysis

    June 7, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    How to Host a Static Website on AWS S3 and CloudFront

    Development

    A Coding Guide to Different Function Calling Methods to Create Real-Time, Tool-Enabled Conversational AI Agents

    Machine Learning

    rawilk/laravel-settings

    Development

    How Python Magic Methods Work: A Practical Guide

    Development

    Highlights

    Development

    How to Exploit the EternalBlue Vulnerability on Windows – A Step-by-Step Guide

    March 16, 2025

    If you’ve followed cybersecurity news over the past few years, you’ve likely come across EternalBlue.…

    Kurrent launches open source MCP Server

    June 3, 2025

    Fine-Tuning LLaMA 70B Using Hugging Face Accelerate & DeepSpeed on Multiple Nodes 

    March 31, 2025

    How to Install LXD on Ubuntu 24.04 LTS

    January 13, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.