Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Node.js vs. Python for Backend: 7 Reasons C-Level Leaders Choose Node.js Talent

      July 21, 2025

      Handling JavaScript Event Listeners With Parameters

      July 21, 2025

      ChatGPT now has an agent mode

      July 21, 2025

      Scrum Alliance and Kanban University partner to offer new course that teaches both methodologies

      July 21, 2025

      Is ChatGPT down? You’re not alone. Here’s what OpenAI is saying

      July 21, 2025

      I found a tablet that could replace my iPad and Kindle – and it’s worth every penny

      July 21, 2025

      The best CRM software with email marketing in 2025: Expert tested and reviewed

      July 21, 2025

      This multi-port car charger can power 4 gadgets at once – and it’s surprisingly cheap

      July 21, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Execute Ping Commands and Get Back Structured Data in PHP

      July 21, 2025
      Recent

      Execute Ping Commands and Get Back Structured Data in PHP

      July 21, 2025

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 21, 2025

      Zero Trust & Cybersecurity Mesh: Your Org’s Survival Guide

      July 21, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      I Made Kitty Terminal Even More Awesome by Using These 15 Customization Tips and Tweaks

      July 21, 2025
      Recent

      I Made Kitty Terminal Even More Awesome by Using These 15 Customization Tips and Tweaks

      July 21, 2025

      Microsoft confirms active cyberattacks on SharePoint servers

      July 21, 2025

      How to Manually Check & Install Windows 11 Updates (Best Guide)

      July 21, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Tech & Work»Hopper Emerges from Stealth to Redefine Open-Source Security

    Hopper Emerges from Stealth to Redefine Open-Source Security

    April 22, 2025

    Hopper officially launched out of stealth to reinvent how organizations manage open-source software (OSS)  risk.

    Modern software relies on open-source. As OSS scaled, accelerated by AI, legacy security tools failed to keep pace, introducing undesired cost, complexity, and drag on developer productivity. Gartner cites false positives, alert fatigue, and the lack of exploitability context such as function-level reachability as key barriers to effective application security.

    Today’s Software Composition Analysis (SCA) platforms overwhelm teams with noise, miss critical risks, and frustrate developers. Hopper delivers a modern alternative to SCA, with function-level reachability, automated asset discovery, hidden vulnerability detection, and support for complex web frameworks — all without agents or CI changes.

    Hopper is already used by Fortune 500s and fast-growing tech companies, empowering security and engineering teams to replace legacy SCA tools and secure their code with a more precise, developer-aligned solution. Before switching, Hopper customers report spending up to 8 percent of total development time addressing alerts. By improving remediation SLAs, reducing MTTR, and boosting developer productivity, Hopper becomes a cost reduction tool for the enterprise.

    “We didn’t start Hopper because the world needed another SCA tool,” said Roy Gottlieb, Co-founder and CEO. “We started it because existing solutions overwhelm teams and slow down development. Hopper is built to cut through the clutter, surface real risks, and make open-source security fast, accurate, and developer-friendly.”

    Gottlieb is a seasoned investor and operator, a veteran of Unit 81, and recipient of the Israel Defense Prize. His co-founder, Oron Gutman, is a veteran vulnerability researcher and two-time Israel Defense Prize winner, with 14 years of experience including section lead of Unit 8200.

    Why Function-Level Reachability Matters

    Most vulnerability databases (NVD, OSV.dev, and GitHub) don’t reveal where a vulnerability lives in the code. CVE standards intentionally omit function-level detail to avoid exploitation, but that tradeoff comes at a cost.

    Log4J, for example,  contains 60,000+ lines of code and 7,000 functions, but only the lookup function in JndiManager class was exploitable. Hopper closes that gap with a proprietary knowledge base mapping vulnerable functions across the OSS ecosystem.

    “Hopper doesn’t just tell you that a vulnerability exists. It shows you the line of code, the function, the evidence, and why it matters. That’s what finally gets developers to act,” said a Fortune 100 CISO, speaking under NDA.

    Built for Modern Security and Engineering Teams

    Where legacy SCAs inventory manifest files, Hopper simulates how applications are built and executed, providing deep visibility without agents or CI/CD integration, delivering:

    • Function-level reachability across direct, transitive, and internal dependencies

    • Full SBOM and VEX export, aligned with compliance workflows

    • Agentless deployment, via read-only Git access

    • Contextual remediation evidence, linked directly to source

    • Automatic asset discovery, including internal and shadow dependencies

    Backed by Industry Builders

    Hopper raised $7.6 million in seed funding, co-led by Meron Capital and New Era, with participation from the Sequoia Scout Fund, M-Fund, and leaders behind exits to Intel, Oracle, Google, HPE, Symantec, ZoomInfo, AWS, and more.

    Hopper is now available to organizations ready to stop chasing noise and start fixing real risk. Learn more at hopper.security

    The post Hopper Emerges from Stealth to Redefine Open-Source Security appeared first on SD Times.

    Source: Read More 

    news
    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCritical Security Vulnerability Found in WordPress Plugin InstaWP Connect
    Next Article Verifying Exception Reporting in Laravel with assertReported

    Related Posts

    Tech & Work

    Node.js vs. Python for Backend: 7 Reasons C-Level Leaders Choose Node.js Talent

    July 21, 2025
    Tech & Work

    Handling JavaScript Event Listeners With Parameters

    July 21, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2024-24916 – Adobe Installer DLL Loading Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Representative Line: What the FFFFFFFF

    News & Updates

    Microsoft Copilot gets ChatGPT-like viral image generator

    Operating Systems

    CVE-2025-5170 – LliSoft MTA Maita Training System SQL Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    What Is A Next.js Boilerplate and Why Should You Use It?

    April 24, 2025

    Post Content Source: Read More 

    Free DOOM: The Dark Ages Premium Edition? NVIDIA is making it happen.

    April 30, 2025

    CVE-2024-52290 – LF Edge eKuiper Cross-Site Scripting (XSS)

    May 14, 2025

    CVE-2025-44864 – Tenda W20E Command Injection Vulnerability

    May 1, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.