Mayhem Blog

Your AST Guide for the Disenchanted: Part 5

Your AST Guide for the Disenchanted: Part 5

In today’s post, we’ll focus on how fuzz testing can help you address those unknown vulnerabilities.
Your AST Guide for the Disenchanted: Part 4

Your AST Guide for the Disenchanted: Part 4

In today’s post, we’ll focus on how software composition analysis can help you address those known vulnerabilities.
Your AST Guide for the Disenchanted: Part 3

Your AST Guide for the Disenchanted: Part 3

In our previous post, we discussed that the key ingredient to a true DevSecOps process is accurate testing. In this post, we’ll share how to implement an accurate application security testing program that effectively manages risk, while protecting developer productivity.
Your AST Guide for the Disenchanted: Part 2

Your AST Guide for the Disenchanted: Part 2

Can machines make cybersecurity decisions autonomously? Accurate testing allows vulnerability detection to be done at machine speed, scale, and automation.
Your AST Guide for the Disenchanted: Part 1

Your AST Guide for the Disenchanted: Part 1

In this blog series, we’ll chronicle the top challenges of incorporating application security testing in DevOps workflows. We’ll also unpack how organizations are addressing these challenges.
CVE-2020-15359: VDALabs Uses Mayhem To Find MP3Gain Stack Overflow

CVE-2020-15359: VDALabs Uses Mayhem To Find MP3Gain Stack Overflow

Researchers from VDALabs use ForAllSecure's Mayhem to find a stack overflow in MP3Gain, a vulnerability that could allow bad actors to overwrite code.
CVE-2020-10029: Buffer overflow in GNU libc trigonometry functions?!?

CVE-2020-10029: Buffer overflow in GNU libc trigonometry functions?!?

CVE-2020-10029 Vulnerabilities in the glibc functions cosl, sinl, sincosl, and tanl are due to an underlying common function. They ar fixed in glibc 2.32.
Get Started With DevSecOps

Get Started With DevSecOps

In a TechRepublic Whiteboard video, host Bill Detwiler speaks to Dr. David Brumley, Carnegie Mellon University professor and CEO of ForAllSecure, about the ways organizations can benefit by using DevSecOps.
The Fuzzing Files: The Anatomy of a Heartbleed

The Fuzzing Files: The Anatomy of a Heartbleed

In 2014, two independent teams used fuzz testing to discover the Heartbleed vulnerability which affected systems providing banking, online retail, and other secure transactions.

How about some Mayhem in your inbox?

Subscribe to our monthly newsletter for expert insights and news on DevSecOps topics, plus Mayhem tips and tutorials.

By subscribing, you're agreeing to our website terms and privacy policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Add Mayhem to Your DevSecOps for Free.

Engineer with VR goggles