Mayhem Blog

Key Lessons for Auto Manufacturers from the 2021 Tesla Hack

Key Lessons for Auto Manufacturers from the 2021 Tesla Hack

In this blog post, we’ll talk about the methodologies and techniques involved in exploiting vehicle systems, using the 2021 Tesla exploit as an example. 
Bringing DevSecOps to V-Shaped Development

Bringing DevSecOps to V-Shaped Development

In this blog post, we'll explore how automotive organizations can seamlessly incorporate DevSecOps into the V-shaped development model.
What is an SBOM? Exploring SBOM Origins and Use in Software Security

What is an SBOM? Exploring SBOM Origins and Use in Software Security

In this blog post, we'll break down what an SBOM is, where they came from, and how recent legislation has outlined their use in software supply chain security.
Case Study: How Mayhem Revolutionized U.S. Department of Defense Weapon Systems Security

Case Study: How Mayhem Revolutionized U.S. Department of Defense Weapon Systems Security

Learn how the DoD hand-picked Mayhem as the best solution to autonomously test their critical weapon systems applications for vulnerabilities.
Eliminate Hours of AppSec Triage with Mayhem’s Dynamic SBOM Generation and SCA Validation

Eliminate Hours of AppSec Triage with Mayhem’s Dynamic SBOM Generation and SCA Validation

Today we’re excited to announce the newest set of features in Mayhem: dynamic SBOM generation and SCA validation.
Integrating Mayhem With Simulink: How to Test Simulink Model Using Mayhem

Integrating Mayhem With Simulink: How to Test Simulink Model Using Mayhem

In this blog post, we'll explore how Mayhem can be seamlessly integrated with MATLAB's Simulink to create more secure applications.
New in 2.6: Intelligent CVSS Scoring for Unknown Vulnerabilities

New in 2.6: Intelligent CVSS Scoring for Unknown Vulnerabilities

In this blog post, I’ll go over what CVSS is and how Mayhem leverages it to prioritize your results.
Lunch and Learn: The Art of Being Secure by Design

Lunch and Learn: The Art of Being Secure by Design

In this "lunch and learn" style webinar, presenter Lakshmia Ferba guides you through the realm of secure by design principles.
Uncovering a Hidden Shellcode Vulnerability

Uncovering a Hidden Shellcode Vulnerability

While experimenting with shellcode from a seemingly functional source, I discovered a hidden vulnerability. It took me a while to spot the problem. Can you?

Fancy some inbox Mayhem?

Subscribe to our monthly newsletter for expert insights and news on DevSecOps topics, plus Mayhem tips and tutorials.

By subscribing, you're agreeing to our website terms and privacy policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.