Mayhem Case Studies

Expert insights and tips on application security, API security, and other DevSecOps topics.

View All
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Your AST Guide for the Disenchanted: Part 5

Your AST Guide for the Disenchanted: Part 5

In today’s post, we’ll focus on how fuzz testing can help you address those unknown vulnerabilities.
The Hacker Mind Podcast: Hacking the Chrome Sandbox

The Hacker Mind Podcast: Hacking the Chrome Sandbox

No matter how strong we build our browsers that does not prevent hackers from trying to break new things. In this episode, a security researcher explains how he successfully escaped the Chrome sandbox, and how bug bounties are perhaps a good thing resulting in better security for us all.
Your AST Guide for the Disenchanted: Part 4

Your AST Guide for the Disenchanted: Part 4

In today’s post, we’ll focus on how software composition analysis can help you address those known vulnerabilities.
The Hacker Mind Podcast: Hacking With Light And Sound

The Hacker Mind Podcast: Hacking With Light And Sound

If you think hacking only involves the use of a keyboard, then you’re probably missing out. What about using light? What about sound? The Hacker Mind talks with University of Michigan's Dr. Kevin Fu.
Your AST Guide for the Disenchanted: Part 3

Your AST Guide for the Disenchanted: Part 3

In our previous post, we discussed that the key ingredient to a true DevSecOps process is accurate testing. In this post, we’ll share how to implement an accurate application security testing program that effectively manages risk, while protecting developer productivity.
The Hacker Mind Podcast: Why Are Blue Team Hackers More L33T?

The Hacker Mind Podcast: Why Are Blue Team Hackers More L33T?

This The Hacker Mind podcast defines red teams, blue teams, even purple teams, and discusses how hiring professional hackers is now a business necessity.
Your AST Guide for the Disenchanted: Part 2

Your AST Guide for the Disenchanted: Part 2

Can machines make cybersecurity decisions autonomously? Accurate testing allows vulnerability detection to be done at machine speed, scale, and automation.
Your AST Guide for the Disenchanted: Part 1

Your AST Guide for the Disenchanted: Part 1

In this blog series, we’ll chronicle the top challenges of incorporating application security testing in DevOps workflows. We’ll also unpack how organizations are addressing these challenges.
CVE-2020-15359: VDALabs Uses Mayhem To Find MP3Gain Stack Overflow

CVE-2020-15359: VDALabs Uses Mayhem To Find MP3Gain Stack Overflow

Researchers from VDALabs use ForAllSecure's Mayhem to find a stack overflow in MP3Gain, a vulnerability that could allow bad actors to overwrite code.

Fancy some inbox Mayhem?

Subscribe to our monthly newsletter for expert insights and news on DevSecOps topics, plus Mayhem tips and tutorials.

By subscribing, you're agreeing to our website terms and privacy policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.