Mayhem Blog

Eliminate Hours of AppSec Triage with Mayhem’s Dynamic SBOM Generation and SCA Validation

Eliminate Hours of AppSec Triage with Mayhem’s Dynamic SBOM Generation and SCA Validation

Integrating Mayhem With Simulink: How to Test Simulink Model Using Mayhem

Integrating Mayhem With Simulink: How to Test Simulink Model Using Mayhem

In this blog post, we'll explore how Mayhem can be seamlessly integrated with MATLAB's Simulink to create more secure applications.
Lunch and Learn: The Art of Being Secure by Design

Lunch and Learn: The Art of Being Secure by Design

In this "lunch and learn" style webinar, presenter Lakshmia Ferba guides you through the realm of secure by design principles.
Uncovering a Hidden Shellcode Vulnerability

Uncovering a Hidden Shellcode Vulnerability

While experimenting with shellcode from a seemingly functional source, I discovered a hidden vulnerability. It took me a while to spot the problem. Can you?
Mayhem 2.6 is Now Available

Mayhem 2.6 is Now Available

Learn about some of the key new features of Mayhem 2.6, including faster coverage, intelligent CVSS, improved on-prem support, and more.
How Mayhem Has Found Over 100,000 Defects in Code

How Mayhem Has Found Over 100,000 Defects in Code

Mayhem has found over 100,000 defects in code. In this blog post, we’ll discuss different techniques Mayhem uses to test code like a hacker and find defects at scale.
Debugging Matlab Code with Mayhem

Debugging Matlab Code with Mayhem

Use Mayhem to ensure your Matlab functions are reliable and secure, especially when deploying them on resource-constrained devices like microcontrollers or FPGAs.
Jailbreaking Teslas at Black Hat USA 2023

Jailbreaking Teslas at Black Hat USA 2023

At Black Hat USA 2023, a team of German researchers announced a vulnerability that allows anyone to jailbreak premium features that Tesla charges its customers extra to use.
Case Study: How a Mobile Gaming Company Maximized Security Coverage with Mayhem

Case Study: How a Mobile Gaming Company Maximized Security Coverage with Mayhem

This case study highlights how a leading mobile gaming company secured their applications and APIs, including both third-party and proprietary code, using Mayhem.

Add a Little Mayhem to Your Inbox

Subscribe to our weekly newsletter for expert insights and news on DevSecOps topics, plus Mayhem tips and tutorials.

By subscribing, you're agreeing to our website terms and privacy policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.