Mayhem Blog

Expert insights and tips on application security, API security, and other DevSecOps topics.

View All
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Common Mayhem CWE Finds: Reachable Assertion

Common Mayhem CWE Finds: Reachable Assertion

In this blog post series, we're diving into Mayhem's top common weaknesses enumeration (CWE) finds. This post discusses the reachable assertion.
Hacker’s Guide to Summer 2023: Volume 1

Hacker’s Guide to Summer 2023: Volume 1

Hacker Summer Camp is only weeks away! In this blog post, we'll cover what it is, how you can prepare, what you should pack, top things to do in Vegas, and more.
Mayhem Makers: Sheldon Warkentin, Senior Software Architect  

Mayhem Makers: Sheldon Warkentin, Senior Software Architect  

“Mayhem Makers” is a Q&A series dedicated to our growing company. For this month’s profile, we talked with Sheldon Warkentin, Senior Software Architect.
Testing gRPC Endpoints: How to Test API Endpoints for Vulnerabilities

Testing gRPC Endpoints: How to Test API Endpoints for Vulnerabilities

This blog post discusses how to find security vulnerabilities in API endpoints and tips for remediation, with step-by-step guidance on testing gRPC endpoints.
The Hacker Mind Podcast: Hacking .Mil And Other TLD Domains (Ethically)

The Hacker Mind Podcast: Hacking .Mil And Other TLD Domains (Ethically)

One could hack into a military, a foreign government, or even global commercial web services domain using flaws in the underlying architecture. Fredrik Nordberg Almroth, co-founder of Detectify, talks about how he did just that.
How to Run a New API Project With Mayhem in 5 Easy Steps

How to Run a New API Project With Mayhem in 5 Easy Steps

In this blog post, we will walk you through the process of running an API project using Mayhem.
How to Run a New Code Project With Mayhem in 5 Easy Steps

How to Run a New Code Project With Mayhem in 5 Easy Steps

In this blog post, we will walk you through the process of launching a new code project using Mayhem.
Get Started Using Mayhem in 5 Minutes or Less

Get Started Using Mayhem in 5 Minutes or Less

In this blog post, we will show you how to get started using Mayhem in five minutes or less.
Best Practices for Secure Programming in Rust

Best Practices for Secure Programming in Rust

Rust's memory safety and type system help prevent entire classes of vulnerabilities, but that doesn't mean Rust's code is impervious to security issues. Learn some best practices and recommendations for secure application development in Rust.

Add a Little Mayhem to Your Inbox

Subscribe to our weekly newsletter for expert insights and news on DevSecOps topics, plus Mayhem tips and tutorials.

By subscribing, you're agreeing to our website terms and privacy policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.