Mayhem Blog

What Is An Improper Input Validation Error?

What Is An Improper Input Validation Error?

CWE-20 - Improper Imput Validation in a web application can allow an attacker to supply malicious user input that is then executed by the vulnerable web application. Improper input validation can be used to bypass security mechanisms, such as authentication and authorization controls.
What Is A Reachable Assertion Error?

What Is A Reachable Assertion Error?

In computer science, reachability is the ability to find a path from one node in a graph to another. A reachable assertion is an assertion that specifies a condition that must be satisfied for a particular path to be considered reachable.
What Is A Missing Release Of Memory After Effective Lifetime Error?

What Is A Missing Release Of Memory After Effective Lifetime Error?

CWE 401- Missing Release Of Memory After Effective Lifetime can occur when a program does not release memory after it is finished using it.
UNECE Vehicle Regulations: UN R155 & UN R156

UNECE Vehicle Regulations: UN R155 & UN R156

In mid-2021, the UNCE released new vehicle cybersecurity regulations in an effort to keep up with the rapid reliance of digitization within the automotive industry.
ISO 26262: The ISO Standard for Functional Safety

ISO 26262: The ISO Standard for Functional Safety

ISO 26262 is a standard for functional safety and automotive safety integrity level (ASIL) and an important measure for automakers and suppliers to stay on top of. In this post, you'll receive an overview of ISO 26262, steps you can take to comply with the standard, as well as the benefits of 26262.
ISO SAE 21434: Cybersecurity of Road Vehicles

ISO SAE 21434: Cybersecurity of Road Vehicles

This post will cover what ISO 21434 is, who it directly affects, and how interested parties can comply.
Getting Started with Vulnerability Scanning

Getting Started with Vulnerability Scanning

Unsure of where to start when it comes to vulnerability scanning? This article will introduce you to the basics and show you how vulnerability scanning can help improve your organization's security posture.
The Role of Functional Testing in Application Security

The Role of Functional Testing in Application Security

Learn about the importance functional testing plays in application security and how it can help ensure that newly introduced functionality does not introduce new vulnerabilities.
The Roles of SAST and DAST and Fuzzing in Application Security

The Roles of SAST and DAST and Fuzzing in Application Security

This blog post provides a general overview of the roles and importance of Dynamic Application Security Testing (DAST) and Static Application Security Testing (SAST) in Application Security Testing (AST), as well as how fuzzing fits into this picture.

How about some Mayhem in your inbox?

Subscribe to our monthly newsletter for expert insights and news on DevSecOps topics, plus Mayhem tips and tutorials.

By subscribing, you're agreeing to our website terms and privacy policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Add Mayhem to Your DevSecOps for Free.

Engineer with VR goggles