Mayhem Case Studies

Expert insights and tips on application security, API security, and other DevSecOps topics.

View All
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Case Study: How a Mobile Gaming Company Maximized Security Coverage with Mayhem

Case Study: How a Mobile Gaming Company Maximized Security Coverage with Mayhem

This case study highlights how a leading mobile gaming company secured their applications and APIs, including both third-party and proprietary code, using Mayhem.
Think Like a Hacker: Webinar Transcript and Video

Think Like a Hacker: Webinar Transcript and Video

In this webinar, you will gain valuable insights into thinking like a hacker. These methods will empower you to protect your organization and digital assets.
Case Study: Enhancing Automotive Safety with Mayhem

Case Study: Enhancing Automotive Safety with Mayhem

Learn how an automotive company specializing in automation and safety technology leveraged Mayhem to automate code testing and optimize their resources.
The Hacker Mind Podcast: Hacking Healthcare Systems

The Hacker Mind Podcast: Hacking Healthcare Systems

Karl Sigler, from Trustwave SpiderLabs, talks about the threat landscape for medical devices and the healthcare industry in general.
Common Mayhem CWE Finds: Reachable Assertion

Common Mayhem CWE Finds: Reachable Assertion

In this blog post series, we're diving into Mayhem's top common weaknesses enumeration (CWE) finds. This post discusses the reachable assertion.
Hacker’s Guide to Summer 2023: Volume 1

Hacker’s Guide to Summer 2023: Volume 1

Hacker Summer Camp is only weeks away! In this blog post, we'll cover what it is, how you can prepare, what you should pack, top things to do in Vegas, and more.
Mayhem Makers: Sheldon Warkentin, Senior Software Architect  

Mayhem Makers: Sheldon Warkentin, Senior Software Architect  

“Mayhem Makers” is a Q&A series dedicated to our growing company. For this month’s profile, we talked with Sheldon Warkentin, Senior Software Architect.
Testing gRPC Endpoints: How to Test API Endpoints for Vulnerabilities

Testing gRPC Endpoints: How to Test API Endpoints for Vulnerabilities

This blog post discusses how to find security vulnerabilities in API endpoints and tips for remediation, with step-by-step guidance on testing gRPC endpoints.
The Hacker Mind Podcast: Hacking .Mil And Other TLD Domains (Ethically)

The Hacker Mind Podcast: Hacking .Mil And Other TLD Domains (Ethically)

One could hack into a military, a foreign government, or even global commercial web services domain using flaws in the underlying architecture. Fredrik Nordberg Almroth, co-founder of Detectify, talks about how he did just that.

Fancy some inbox Mayhem?

Subscribe to our monthly newsletter for expert insights and news on DevSecOps topics, plus Mayhem tips and tutorials.

By subscribing, you're agreeing to our website terms and privacy policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.