Mayhem Blog

The Fuzzing Files: The Anatomy of a Heartbleed

The Fuzzing Files: The Anatomy of a Heartbleed

In 2014, two independent teams used fuzz testing to discover the Heartbleed vulnerability which affected systems providing banking, online retail, and other secure transactions.
Life As A Professional Hacker

Life As A Professional Hacker

Last month Guido Vranken hosted a successful Reddit AMA , sharing insight on his experience as a professional vulnerability researcher.
Challenging ROI Myths Of Static Application Security Testing (SAST)

Challenging ROI Myths Of Static Application Security Testing (SAST)

Mel Llaguno raises six challenges to Static Application Security Testing (SAST) analysis, raising questions on the efficacy of SAST for organizations focused on immediate benefits.
Why Fuzzing Is Your Friend For DevSecOps

Why Fuzzing Is Your Friend For DevSecOps

Learn about the quality assurance technique that uncovers coding errors and security loopholes during software vulnerability testing and assurance processes.
Top 3 Technical Barriers To Fuzzing

Top 3 Technical Barriers To Fuzzing

Fuzz testing is an effective technique for uncovering serious defects in software. From the Heartbleed vulnerability in 2014 to the infamous Jeep Cherokee hacking in 2015, fuzz testing is the technique that has made many high-profile discoveries possible. Consistently, fuzzing is proven to be a powerful tool for ensuring the ...
Uncovering Memory Defects In Cereal (CVE 2020-11104 & CVE-2020-11105)

Uncovering Memory Defects In Cereal (CVE 2020-11104 & CVE-2020-11105)

ForAllSecure researcher, Guido Vranken, uncovers critical memory issue in cereal, a common component within automotive software.
Uncovering Vulnerabilities In Cryptographic Libraries: Mayhem, MatrixSSL, And WolfSSL (CVE-2019-13470)

Uncovering Vulnerabilities In Cryptographic Libraries: Mayhem, MatrixSSL, And WolfSSL (CVE-2019-13470)

ForAllSecure Engineer, Tyler Nighswander, uncovers vulnerabilities in two popular cryptographic libraries, MatrixSSL and WolfSSL, utilizing Mayhem, a next-generation fuzzer.
Demystifying A Docker Image

Demystifying A Docker Image

Six months ago ForAllSecure started analyzing Docker images. What does this mean? Imagine we have a user who wants us to fuzz their application. How do they give it to us? Do they tar it up? Do they give us access to an environment where it’s running?
Decipher Security Podcast With ForAllSecure CEO David Brumley

Decipher Security Podcast With ForAllSecure CEO David Brumley

On April 24, ForAllSecure CEO David Brumley joins Decipher Security host, Dennis Fisher, to talk about the importance of software security as well as the need for better cooperation between developers and security teams.

Fancy some inbox Mayhem?

Subscribe to our monthly newsletter for expert insights and news on DevSecOps topics, plus Mayhem tips and tutorials.

By subscribing, you're agreeing to our website terms and privacy policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.