Mayhem Case Studies

Expert insights and tips on application security, API security, and other DevSecOps topics.

View All
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
How to Use an HTTP Archive (HAR) With Mayhem

How to Use an HTTP Archive (HAR) With Mayhem

Learn how to fuzz an API without a specification by recording transactions with the API as an HTTP Archive (.har file).
The Hacker Mind Podcast: Never Mess With A Hacker

The Hacker Mind Podcast: Never Mess With A Hacker

Air travel tips from The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data by Kevin Mitnick and Robert Vamosi.
How SAST and Mayhem Work Together for Comprehensive Application Security Testing

How SAST and Mayhem Work Together for Comprehensive Application Security Testing

Learn how SAST and Mayhem can work together to identify both known-unknown and unknown-unknown risks.
Why Vulnerability Scanning Alone Is Not Enough to Keep Your Software Secure

Why Vulnerability Scanning Alone Is Not Enough to Keep Your Software Secure

With vulnerability scanning, you are only addressing the known vulnerabilities and missing the bigger picture, which are the unknown vulnerabilities.
How to Write Your Own Mayhem for API Plugin

How to Write Your Own Mayhem for API Plugin

Mayhem for API supports the writing of your own plugins to guide Mayhem for API into making legitimate requests to your API.
Mayhem Makers: Ivan Gotovchits, Analysis Engineer

Mayhem Makers: Ivan Gotovchits, Analysis Engineer

“Mayhem Makers” is a Q&A series dedicated to our growing company. For this month’s profile, we talked with Ivan Gotovchits, Analysis Engineer.
Why “Complete Coverage” SAST Tools Fall Short for Developers

Why “Complete Coverage” SAST Tools Fall Short for Developers

Using SAST alone can cause significant frustration for developers and fall short for security for two fundamental reasons.
The Hacker Mind: Hacking Latency In Live Music Online

The Hacker Mind: Hacking Latency In Live Music Online

If you call someone on the other side of the world, perhaps you notice the latency in responses. For voice that’s okay, but for live music that’s disastrous.
3 Reasons Developers Should Shift Left for API Security

3 Reasons Developers Should Shift Left for API Security

Shifting left for API security allows developers to produce better code, catch API issues earlier in the development cycle, and get their work done faster.

Fancy some inbox Mayhem?

Subscribe to our monthly newsletter for expert insights and news on DevSecOps topics, plus Mayhem tips and tutorials.

By subscribing, you're agreeing to our website terms and privacy policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.