Mayhem Blog

Expert insights and tips on application security, API security, and other DevSecOps topics.

View All
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
To All The Tools I’ve Loved Before: The Commitment Phobe (Open Source Fuzzers)
No items found.

To All The Tools I’ve Loved Before: The Commitment Phobe (Open Source Fuzzers)

Valentine’s Day has unfortunately come to a close. What follows love? Heartbreak. That’s right, it's time to dust off your best stationary and bust out the ice cream because we’re writing a series of break up letters.
The Risks In Using Third-Party Code

The Risks In Using Third-Party Code

Vulnerabilities can be inherited through your software supply chain, and it’s more common than we may like to admit.
To All The Tools I’ve Loved Before: The Selfish One (IAST)
No items found.

To All The Tools I’ve Loved Before: The Selfish One (IAST)

Valentine’s Day has unfortunately come to a close. What follows love? Heartbreak. That’s right, it's time to dust off your best stationary and bust out the ice cream because we’re writing a series of break up letters.
The Hacker Mind Podcast: The Gentle Art of Lockpicking

The Hacker Mind Podcast: The Gentle Art of Lockpicking

What is the allure of lockpicking at hacker conferences? In this episode Deviant Ollam explains why these mechanical puzzles remain popular with hackers. Ollam, who was an early member of Toool, The Open Organization of Lockpickers, discusses his career as a physical pen tester and also provides some basic lockpicking tips.
Securing Your Software Supply Chain

Securing Your Software Supply Chain

Part one of a three-part series. Applications contain hundreds of code components. Applications are constructed similarly to automobiles: parts are sourced from multiple vendors to produce software that is then used by the consumer.
To All The Tools I’ve Loved Before: The Liar (SAST)
No items found.

To All The Tools I’ve Loved Before: The Liar (SAST)

Valentine’s Day has unfortunately come to a close. What follows love? Heartbreak. That’s right, it's time to dust off your best stationary and bust out the ice cream because we’re writing a series of break up letters.
Back to the Fuzz: Fuzzing for Command Injections

Back to the Fuzz: Fuzzing for Command Injections

Some may remember NCSA HTTPd, a predecessor to Apache. However, what they might not know (but won't be surprised by!) is that it had plenty of bugs. Let's dive in and reproduce a classic command injection with fuzzing!
Useful Properties To Check With Fuzz Testing

Useful Properties To Check With Fuzz Testing

The is part three of a three part series on Property-based Fuzz Testing. This article lists a number of useful properties that are commonly used to validate the correctness and safety of code. If you are not sure how to apply property-based fuzzing to your code, this list should give you some inspiration.
The Hacker Mind Podcast: So You Want To Be A Pentester

The Hacker Mind Podcast: So You Want To Be A Pentester

To help more people to become penetration testers, Kim Crawley and Phillip L. Wylie wrote The PenTester BluePrint: Starting A Career As An Ethical Hacker. In this episode of The Hacker Mind, Kim talks about the practical steps anyone can take to gain the skills and confidence necessary to become a penetration tester.

Fancy some inbox Mayhem?

Subscribe to our monthly newsletter for expert insights and news on DevSecOps topics, plus Mayhem tips and tutorials.

By subscribing, you're agreeing to our website terms and privacy policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.