Mayhem Case Studies

Expert insights and tips on application security, API security, and other DevSecOps topics.

View All
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
The Hacker Mind Podcast: Tales From The Dark Web: Ransomware, Data Extortion, and Operational Technology

The Hacker Mind Podcast: Tales From The Dark Web: Ransomware, Data Extortion, and Operational Technology

Ransomware is now old news. Attackers are skipping the encryption and simply extorting the exfiltrated data, according to Thomas “Mannie” Wilken.
Mayhem Makers: Grace Farley, Demand Generation Manager

Mayhem Makers: Grace Farley, Demand Generation Manager

“Mayhem Makers” is a Q&A series dedicated to our growing company. For this month’s profile, we talked with Grace Farley, Demand Generation Manager.
Exploring Chicago During KubeCon 2023

Exploring Chicago During KubeCon 2023

This blog will guide you through the best activities, restaurants, and attractions to explore in your free time during KubeCon 2023.
The Hacker Mind Podcast: The Vulkan Files

The Hacker Mind Podcast: The Vulkan Files

Imagine a data dump of files similar to the Snowden Leaks in 2013, only this it’s not from the NSA but from NT Vulkan, a Russian contractor.
Lessons from the New Martians: Evolving Through Your Graduate School Years

Lessons from the New Martians: Evolving Through Your Graduate School Years

In 2003, I arrived in the CMU computer science department for my PhD along with 30 other students. I call it the class of the New Martians. Here's why.
Case Study: How Mayhem Revolutionized U.S. Department of Defense Weapon Systems Security

Case Study: How Mayhem Revolutionized U.S. Department of Defense Weapon Systems Security

Learn how the DoD hand-picked Mayhem as the best solution to autonomously test their critical weapon systems applications for vulnerabilities.
Eliminate Hours of AppSec Triage with Mayhem’s Dynamic SBOM Generation and SCA Validation

Eliminate Hours of AppSec Triage with Mayhem’s Dynamic SBOM Generation and SCA Validation

Today we’re excited to announce the newest set of features in Mayhem: dynamic SBOM generation and SCA validation.
The Hacker Mind: Hacking Visual Studio Code Extensions

The Hacker Mind: Hacking Visual Studio Code Extensions

Rather than use backdoor exploits, attackers are stealing credentials going through the front door - sometimes from the tools we trust.
The Hacker Mind Podcast: Ghost Token

The Hacker Mind Podcast: Ghost Token

What if an OAUTH access token wasn’t deleted? This could expose databases to bad actors.

How about some Mayhem in your inbox?

Subscribe to our monthly newsletter for expert insights and news on DevSecOps topics, plus Mayhem tips and tutorials.

By subscribing, you're agreeing to our website terms and privacy policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Add Mayhem to Your DevSecOps for Free.