Blog

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
0 results matching
tag
Introducing Miggo’s Dangling DNS Detector: Detection and Prevention for Domain Takeovers

Introducing Miggo’s Dangling DNS Detector: Detection and Prevention for Domain Takeovers

Product
We're excited to announce Miggo’s Dangling DNS Detector, the automated way to detect DNS entries and prevent takeovers.
Read More
Introducing Miggo’s Application Attack Path Engine: Better Context to Power Active Runtime Defense

Introducing Miggo’s Application Attack Path Engine: Better Context to Power Active Runtime Defense

Product
Miggo’s Application Attack Path Engine Enables Security Teams with Better Context to Power Active Runtime Defense
Read More
Introducing a New Way to Track AWS Documentation Changes

Introducing a New Way to Track AWS Documentation Changes

Research
Track security changes in AWS docs with Miggo’s new Security Docs Change Engine - a single place to stay updated and maintain security standards.
Read More
Next.js Middleware Authorization Bypass Exploit: CVE-2025-29927

Next.js Middleware Authorization Bypass Exploit: CVE-2025-29927

Security
On March 21, 2025, Next.js disclosed a critical 9.1 CVE allowing middleware auth bypass, discovered and detailed by Rachid Allam (zhero).
Read More
Miggo Welcomes Noa Gur Arieh as Partnerships Director

Meet Miggo’s Director of Partnerships

Company
Miggo welcomes Noa Gur Arieh as Director of Partnerships. Noa joins from McKinsey, bringing experience with financial institutions and NGO partnership
Read More
Miggo Uncovers Critical Auth Bypass in UK Government System | CVE-2025-25182

Miggo Uncovers Critical Auth Bypass in UK Government System | CVE-2025-25182

Research
GCHQ confirms Miggo discovered a 9.4 critical CVE-2025-25182 in Stroom, allowing attackers to bypass authentication and authorization.
Read More
Accelerating Threat Response with Miggo

Accelerating Threat Response with Miggo

Product
App breaches rise as organizations adopt more apps. Traditional tools struggle against fast, AI-driven attacks on a growing attack surface.
Read More
How to Detect the MOVEit Breach with OpenTelemetry

How to Detect the MOVEit Breach with OpenTelemetry

Research
Exploring the MOVEit breach: diving into .NET, extending OpenTelemetry, and a story of perseverance.
Read More

Modern AppSec Requires a Modern Approach

Research
As organizations adopt microservices and serverless, teams need a way to connect the dots — tracing is the key to uncovering missing insights.
Read More
Top Application Detection and Response (ADR) Tools of 2025

Top Application Detection and Response (ADR) Tools of 2025

Product
Application Detection and Response (ADR) delivers real-time visibility and detects runtime behavior deviations to proactively defend applications.
Read More
ADR: The Change AppSec Needs

ADR: The Change AppSec Needs

Product
Apps have evolved: once built by one team, hosted on-prem/cloud, and protected by firewalls and WAFs - showing why ADR is needed.
Read More
Unmasking The Hidden Third Parties

Unmasking The Hidden Third Parties

Product
This Halloween, look beyond the obvious - your real threats aren’t ghosts, but hidden integrations quietly accessing your data without you knowing.
Read More