Mayhem Blog

Exploring The Best SBOM/SCA Tools: Docker Scout

Exploring The Best SBOM/SCA Tools: Docker Scout

In this post, we'll explore Docker Scout's strengths and weaknesses as an SBOM/SCA tool and compare vulnerability results before and after runtime analysis.
SBOM Format Comparison: Which SCA/SBOM Format Is Best?

SBOM Format Comparison: Which SCA/SBOM Format Is Best?

Compare SBOM and SCA formats to find the best fit for your needs. Learn key differences and how to streamline vulnerability management.
Why Automotive Developers Shouldn't Overlook Application Fuzzing

Why Automotive Developers Shouldn't Overlook Application Fuzzing

This blog post will explore why application fuzzing is important and how it can complement protocol fuzzing in automotive development.
How to Test Embedded Systems Security Easily with Mayhem

How to Test Embedded Systems Security Easily with Mayhem

In this blog post, we will demonstrate how Mayhem can be used to easily set up fuzzing campaigns in embedded systems, using IoTGoat’s dnsmasq as an example.
Lessons from Today’s CrowdStrike Outage: How to Navigate Software Release Challenges

Lessons from Today’s CrowdStrike Outage: How to Navigate Software Release Challenges

Let’s talk about the challenges of delivering global scale software and the things engineering teams can do to improve reliability.
Finding FireWire (IEEE 1394) Vulnerabilities: CVE-2023-3159 and CVE-2024-27401

Finding FireWire (IEEE 1394) Vulnerabilities: CVE-2023-3159 and CVE-2024-27401

Testing low-level code such as IEEE 1394 (FireWire) can be a challenge. The solution lies in extracting kernel functions and testing them like unit tests.
CVE-2024-28578: Test Third-Party Image Libraries With Mayhem

CVE-2024-28578: Test Third-Party Image Libraries With Mayhem

Learn how to test third-party image libraries with Mayhem, using CVE-2024-28578 - an exploitable vulnerability in the FreeImage library - as an example.
Building a Time Machine: Testing Debian Packages Across Time

Building a Time Machine: Testing Debian Packages Across Time

In this blog post, we’re going to attempt to use Debian and its packages to build a mini time machine and investigate the vulnerability of packages across time.
CAN Bus vs. Ethernet

CAN Bus vs. Ethernet

In this blog, we’ll do a quick comparison of CAN vs. Ethernet and go over some of the strengths and weaknesses of both in the context of automotive systems.

How about some Mayhem in your inbox?

Subscribe to our monthly newsletter for expert insights and news on DevSecOps topics, plus Mayhem tips and tutorials.

By subscribing, you're agreeing to our website terms and privacy policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Add Mayhem to Your DevSecOps for Free.

Engineer with VR goggles