Mayhem Blog

Integrating Mayhem With Simulink: How to Test Simulink Model Using Mayhem

Integrating Mayhem With Simulink: How to Test Simulink Model Using Mayhem

In this blog post, we'll explore how Mayhem can be seamlessly integrated with MATLAB's Simulink to create more secure applications.
New in 2.6: Intelligent CVSS Scoring for Unknown Vulnerabilities

New in 2.6: Intelligent CVSS Scoring for Unknown Vulnerabilities

In this blog post, I’ll go over what CVSS is and how Mayhem leverages it to prioritize your results.
How Mayhem Has Found Over 100,000 Defects in Code

How Mayhem Has Found Over 100,000 Defects in Code

Mayhem has found over 100,000 defects in code. In this blog post, we’ll discuss different techniques Mayhem uses to test code like a hacker and find defects at scale.
Debugging Matlab Code with Mayhem

Debugging Matlab Code with Mayhem

Use Mayhem to ensure your Matlab functions are reliable and secure, especially when deploying them on resource-constrained devices like microcontrollers or FPGAs.
Get Started Using Mayhem in 5 Minutes or Less

Get Started Using Mayhem in 5 Minutes or Less

In this blog post, we will show you how to get started using Mayhem in five minutes or less.
How to Use Mayhem With Github Actions to Easily Secure Your Applications

How to Use Mayhem With Github Actions to Easily Secure Your Applications

Our Mayhem GitHub Action makes it easier than ever to secure your applications using Mayhem in a GitHub CI/CD pipeline.
Where Mayhem's Automated Security Testing Fits Best into Your DevOps Pipeline

Where Mayhem's Automated Security Testing Fits Best into Your DevOps Pipeline

This post explains how Mayhem fits into the development lifecycle, continually analyzing the main branch of your repo and generating regression tests for developers to run against feature branches.
How Mayhem Fits Into the Federal Guidance for Securing the Software Supply Chain

How Mayhem Fits Into the Federal Guidance for Securing the Software Supply Chain

In this blog post, we’ll take a deeper look at the NIST guidance for software development. In particular, we’ll look at PW 8.2 in NIST 800-218.
How to Use an HTTP Archive (HAR) With Mayhem

How to Use an HTTP Archive (HAR) With Mayhem

Learn how to fuzz an API without a specification by recording transactions with the API as an HTTP Archive (.har file).

Add a Little Mayhem to Your Inbox

Subscribe to our weekly newsletter for expert insights and news on DevSecOps topics, plus Mayhem tips and tutorials.

By subscribing, you're agreeing to our website terms and privacy policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.