Blog

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
0 results matching
tag

What Is Application Detection and Response? A Complete Guide

Product
Learn what Application Detection and Response (ADR) is, how it works, what threats it detects, and why businesses need ADR in 2025. Discover Miggo's unique approach.
Read More

Stop Chasing Ghosts: How Runtime Intelligence Reveals Real Attack Paths

Product
Stop treating every CVE as equal. Miggo’s Risk Score combines runtime context and threat intel to pinpoint CVEs that create real attack paths and prioritize what matters
Read More

Trace to Triage: AppSec Insights from BSides San Francisco

Conferences
In this article, we share insights from BSides SF 2025 on how profiling and tracing enhance AppSec by adding context, clarity, and speed to triage.
Read More

Redefining Application Security with Miggo’s Runtime Application DNA

Product
In this article, we share how we built the Miggo ADR Platform to solve key challenges and set a new standard for runtime application security.
Read More

Introducing Miggo’s Dangling DNS Detector: Detection and Prevention for Domain Takeovers

Product
We're excited to announce Miggo’s Dangling DNS Detector, the automated way to detect DNS entries and prevent takeovers.
Read More

Introducing Miggo’s Application Attack Path Engine: Better Context to Power Active Runtime Defense

Product
Miggo’s Application Attack Path Engine Enables Security Teams with Better Context to Power Active Runtime Defense
Read More

Introducing a New Way to Track AWS Documentation Changes

Research
Keeping track of security-related documentation changes within an AWS document isn’t always obvious, or easy to do. However, teams must stay informed to ensure they’re maintaining their organization’s security standards. While AWS provides robust logging capabilities, certain security-relevant alterations can go unnoticed. That’s why we’re excited to introduce our AWS Security Docs Change Engine, a single place for teams to stay in the loop on any and all documentation changes.
Read More

Next.js Middleware Authorization Bypass Exploit: CVE-2025-29927

Security
On March 21st, 2025, Next.js disclosed a 9.1 critical vulnerability (CVE) that would allow attackers to bypass middleware-based authorization checks. This issue was originally discovered and investigated by Rachid Allam (zhero) who authored a detailed research paper to outline the specifics.
Read More

Meet Miggo’s Director of Partnerships

Company
We’re excited to announce that Noa Gur Arieh has joined Miggo as our Director of Partnerships. Noa joins Miggo from McKinsey, where she led multiple strategy engagements for leading financial institutions in Israel, the UK, and Europe, as well as multiple NGO partnerships focused on improving the economic productivity.
Read More

Miggo Uncovers Critical Auth Bypass in UK Government System | CVE-2025-25182

Research
Government Communications Headquarters (GCHQ), the UK's intelligence and security agency, has confirmed Miggo’s discovery of a 9.4 critical vulnerability, CVE-2025-25182, in its maintained project, Stroom. CVE-2025-25182 enables attackers to bypass authentication and authorization in any Stroom application.
Read More

Accelerating Threat Response with Miggo

Product
The number of application breaches continues to rise as organizations adopt more applications with growing business impact. In this increasingly complex reality, traditional tools fall short against AI-powered attacks that are faster and dynamically evolving, creating an expanding attack surface
Read More

How to Detect the MOVEit Breach with OpenTelemetry

Research
This blog will explore the story of the MOVEit breach, diving deep into the .NET Framework and wrangling with its obscurities, extending OpenTelemetry (OTel), and ultimately…a story of perseverance. Sort of.
Read More