Mayhem Blog

Expert insights and tips on application security, API security, and other DevSecOps topics.

View All
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Mayhem 2.6 is Now Available

Mayhem 2.6 is Now Available

Learn about some of the key new features of Mayhem 2.6, including faster coverage, intelligent CVSS, improved on-prem support, and more.
“MMM Wins The Superbowl Of Hacking!” But Just Who is MMM?

“MMM Wins The Superbowl Of Hacking!” But Just Who is MMM?

I know the secret story behind a group of some of the most skilled hackers in the world. Let me tell you how they came to be.
The Hacker Mind Podcast: Defending Costa Rica From Conti Ransomware

The Hacker Mind Podcast: Defending Costa Rica From Conti Ransomware

Central and Latin America appear to be a new playground for bad actors testing new malware. But Central and Latin America are learning how to fight back.‍
How Mayhem Has Found Over 100,000 Defects in Code

How Mayhem Has Found Over 100,000 Defects in Code

Mayhem has found over 100,000 defects in code. In this blog post, we’ll discuss different techniques Mayhem uses to test code like a hacker and find defects at scale.
Debugging Matlab Code with Mayhem

Debugging Matlab Code with Mayhem

Use Mayhem to ensure your Matlab functions are reliable and secure, especially when deploying them on resource-constrained devices like microcontrollers or FPGAs.
Jailbreaking Teslas at Black Hat USA 2023

Jailbreaking Teslas at Black Hat USA 2023

At Black Hat USA 2023, a team of German researchers announced a vulnerability that allows anyone to jailbreak premium features that Tesla charges its customers extra to use.
The Hacker Mind Podcast: Security Chaos Engineering with Kelly Shortridge

The Hacker Mind Podcast: Security Chaos Engineering with Kelly Shortridge

Speaking at Black Hat 2023, Kelly Shortridge is bringing cybersecurity out of the dark ages by infusing security by design to create secure patterns and practices. It’s a subject of her new book on Security Chaos Computing, and it’s a topic that’s long overdue to be discussed in the field.
Case Study: How a Mobile Gaming Company Maximized Security Coverage with Mayhem

Case Study: How a Mobile Gaming Company Maximized Security Coverage with Mayhem

This case study highlights how a leading mobile gaming company secured their applications and APIs, including both third-party and proprietary code, using Mayhem.
Think Like a Hacker: Webinar Transcript and Video

Think Like a Hacker: Webinar Transcript and Video

In this webinar, you will gain valuable insights into thinking like a hacker. These methods will empower you to protect your organization and digital assets.

Fancy some inbox Mayhem?

Subscribe to our monthly newsletter for expert insights and news on DevSecOps topics, plus Mayhem tips and tutorials.

By subscribing, you're agreeing to our website terms and privacy policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.