Tag: security.

Common CWE Finds: Reachable Assertion.

In this blog post series, we’re diving into Mayhem’s top common weaknesses enumeration (CWE) finds. A Common Weakness Enumeration, or CWE for short, is a list of software and hardware patterns that can lead to vulnerabilities and other weaknesses. One such CWE that is both fairly common and possibly unexpected is the reachable...

Trust, but Verify.

In 1983, Ken Thompson and Dennis Ritchie were awarded the ACM A.M. Turing Award “for their development of generic operating systems theory and specifically for the implementation of the UNIX operating system.” In his acceptance speech, aptly titled “Reflections on Trusting Trust,” Thompson presented a now infamous hypothetical design for...

The Ins-and-Outs of Package Management.

It’s hard to remember a time before package managers. A time when software arrived on a set of floppy disks in the mail or a compact disc in the back of a catalog. A time when finding software online meant visiting a half-dozen shady websites that may or may not...