Mayhem Case Studies

Expert insights and tips on application security, API security, and other DevSecOps topics.

View All
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Fuzzing Maven-Built C++ Code With Mayhem

Fuzzing Maven-Built C++ Code With Mayhem

I was recently asked to help a customer with a code base that uses Maven. In this blog post, I’ll show you my process for addressing it and how you can too.
Improve Cybersecurity in Medical Devices and Navigate FDA Guidance with Mayhem

Improve Cybersecurity in Medical Devices and Navigate FDA Guidance with Mayhem

This blog post delves into the FDA Medical Device Cybersecurity guidance, what it is, and steps manufacturers can take to comply and increase device security.
Understanding and Navigating ISO 21434 Compliance With Mayhem

Understanding and Navigating ISO 21434 Compliance With Mayhem

In this blog post, we’ll talk about ISO 21434, a critical cybersecurity standard designed to address automotive security challenges.
Key Lessons for Auto Manufacturers from the 2021 Tesla Hack

Key Lessons for Auto Manufacturers from the 2021 Tesla Hack

In this blog post, we’ll talk about the methodologies and techniques involved in exploiting vehicle systems, using the 2021 Tesla exploit as an example. 
Bringing DevSecOps to V-Shaped Development

Bringing DevSecOps to V-Shaped Development

In this blog post, we'll explore how automotive organizations can seamlessly incorporate DevSecOps into the V-shaped development model.
The Hacker Mind Podcast: The Rise Of Bots (Why You Didn't Get Taylor Swift Tickets)

The Hacker Mind Podcast: The Rise Of Bots (Why You Didn't Get Taylor Swift Tickets)

Antoine Vastel from DataDome explains how detecting bots is an arms race: the better we get at detecting them, the more the bots evolve to evade detection.
Mayhem Makers: Ross Rogers, Staff Software Engineer

Mayhem Makers: Ross Rogers, Staff Software Engineer

“Mayhem Makers” is a Q&A series dedicated to our growing company. For this month’s profile, we talked with Ross Rogers, Staff Software Engineer at Mayhem.
What is an SBOM? Exploring SBOM Origins and Use in Software Security

What is an SBOM? Exploring SBOM Origins and Use in Software Security

In this blog post, we'll break down what an SBOM is, where they came from, and how recent legislation has outlined their use in software supply chain security.
The Hacker Mind Podcast: When Old Medical Devices Keep Pre-Shared Keys

The Hacker Mind Podcast: When Old Medical Devices Keep Pre-Shared Keys

You'd think there's an end-of-life procedure to erase personal health and network configuration information from medical devices. Deral Heiland says otherwise.

Add a Little Mayhem to Your Inbox

Subscribe to our weekly newsletter for expert insights and news on DevSecOps topics, plus Mayhem tips and tutorials.

By subscribing, you're agreeing to our website terms and privacy policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.