Mayhem Case Studies

Expert insights and tips on application security, API security, and other DevSecOps topics.

View All
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
The Hacker Mind: Shellshock

The Hacker Mind: Shellshock

Shortly after OpenSSL’s Heartbleed, Shellshock was discovered lurking in two-decades old Bash code. How could open source software be vulnerable for so long? This episode looks at how open source projects have for the most part gone untested over time.
Why You Need Test and Evaluation (T&E)

Why You Need Test and Evaluation (T&E)

In part three of the series, I will discuss the role of test and evaluation in your organization.
To All The Tools I’ve Loved Before: The Commitment Phobe (Open Source Fuzzers)
No items found.

To All The Tools I’ve Loved Before: The Commitment Phobe (Open Source Fuzzers)

Valentine’s Day has unfortunately come to a close. What follows love? Heartbreak. That’s right, it's time to dust off your best stationary and bust out the ice cream because we’re writing a series of break up letters.
The Risks In Using Third-Party Code

The Risks In Using Third-Party Code

Vulnerabilities can be inherited through your software supply chain, and it’s more common than we may like to admit.
To All The Tools I’ve Loved Before: The Selfish One (IAST)
No items found.

To All The Tools I’ve Loved Before: The Selfish One (IAST)

Valentine’s Day has unfortunately come to a close. What follows love? Heartbreak. That’s right, it's time to dust off your best stationary and bust out the ice cream because we’re writing a series of break up letters.
The Hacker Mind Podcast: The Gentle Art of Lockpicking

The Hacker Mind Podcast: The Gentle Art of Lockpicking

What is the allure of lockpicking at hacker conferences? In this episode Deviant Ollam explains why these mechanical puzzles remain popular with hackers. Ollam, who was an early member of Toool, The Open Organization of Lockpickers, discusses his career as a physical pen tester and also provides some basic lockpicking tips.
Securing Your Software Supply Chain

Securing Your Software Supply Chain

Part one of a three-part series. Applications contain hundreds of code components. Applications are constructed similarly to automobiles: parts are sourced from multiple vendors to produce software that is then used by the consumer.
To All The Tools I’ve Loved Before: The Liar (SAST)
No items found.

To All The Tools I’ve Loved Before: The Liar (SAST)

Valentine’s Day has unfortunately come to a close. What follows love? Heartbreak. That’s right, it's time to dust off your best stationary and bust out the ice cream because we’re writing a series of break up letters.
Back to the Fuzz: Fuzzing for Command Injections

Back to the Fuzz: Fuzzing for Command Injections

Some may remember NCSA HTTPd, a predecessor to Apache. However, what they might not know (but won't be surprised by!) is that it had plenty of bugs. Let's dive in and reproduce a classic command injection with fuzzing!

Fancy some inbox Mayhem?

Subscribe to our monthly newsletter for expert insights and news on DevSecOps topics, plus Mayhem tips and tutorials.

By subscribing, you're agreeing to our website terms and privacy policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.