Mayhem Blog

Expert insights and tips on application security, API security, and other DevSecOps topics.

View All
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
To All The Tools I’ve Loved Before: The Fling (SCA)
No items found.

To All The Tools I’ve Loved Before: The Fling (SCA)

Valentine’s Day has unfortunately come to a close. What follows love? Heartbreak. That’s right, it's time to dust off your best stationary and bust out the ice cream because we’re writing a series of appsec break up letters.
What is Property-Based Fuzzing?

What is Property-Based Fuzzing?

Fuzzing is the automated process of finding software bugs by feeding random data into a target program until one of those permutations reveals a flaw. Property-based testing is a form of fuzzing. Property-based testing feeds random data into an application (or function) and detects flaws. It is particularly powerful as it allows developers to define and check custom correctness and safety policies, i.e. properties they define in their test.
How to Address Software Reliability, Security, and Quality Requirements with Fuzz Testing

How to Address Software Reliability, Security, and Quality Requirements with Fuzz Testing

Confidentiality, integrity, and availability are considered the three core principles of security. Similar to a three-bar stool, security falls apart without any one of these components. Learn how fuzz testing helps with the CIA triad.
The Hacker Mind Podcast: The Right To Repair

The Hacker Mind Podcast: The Right To Repair

How do the current DMCA laws impact those who hack digital devices? And why doesn’t our basic right to repair our devices extend into the digital world? To answer these questions, Paul Roberts, Editor-in-Chief of the Security Ledger, founded secureparis.org, a group of infosec experts who are volunteering to fight for the right to repair.
What is Property-based Testing?

What is Property-based Testing?

Learn how to take your fuzzing targets beyond memory errors and crashes to finding correctness and even efficiency issues using Property-based fuzzing.
The Cost of Doing Nothing

The Cost of Doing Nothing

Some will argue they’ve been “just fine so far" with no security investments. This blog will argue there is a cost in doing nothing.
Six-Library Vulnerability in NGA

Six-Library Vulnerability in NGA

Imagine if all of the sudden satellites across the world stopped working. Services that we take for granted such as navigation, satellite imagery, weather, and even time-keeping would become unavailable seemingly without explanation. This software contained a code execution bug discovered by ForAllSecure's Mayhem.
The Hacker Mind Podcast:  Shall We Play A Game?

The Hacker Mind Podcast: Shall We Play A Game?

Capture the Flag is a game, a community, and a really cool hacker culture. But will we one day stream CTFs like we do World of Warcraft or League of Legends? Whether it’s designing, or just playing, John Hammond knows a lot about the gamification of infosec through CTFs.
Breaking Down the Product Benefits

Breaking Down the Product Benefits

This post outlines the intangible values each solution delivers as cited by customers. Product justifications often focus on qualitative data. However, we find quantitative data to be equally critical for ensuring a full 360 degree examination of a selected technology’s impact across an entire organization.

Fancy some inbox Mayhem?

Subscribe to our monthly newsletter for expert insights and news on DevSecOps topics, plus Mayhem tips and tutorials.

By subscribing, you're agreeing to our website terms and privacy policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.