Blog
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
0 results matching
tag

Introducing a New Way to Track AWS Documentation Changes
Keeping track of security-related documentation changes within an AWS document isn’t always obvious, or easy to do. However, teams must stay informed to ensure they’re maintaining their organization’s security standards. While AWS provides robust logging capabilities, certain security-relevant alterations can go unnoticed. That’s why we’re excited to introduce our AWS Security Docs Change Engine, a single place for teams to stay in the loop on any and all documentation changes.

Next.js Middleware Authorization Bypass Exploit: CVE-2025-29927
On March 21st, 2025, Next.js disclosed a 9.1 critical vulnerability (CVE) that would allow attackers to bypass middleware-based authorization checks. This issue was originally discovered and investigated by Rachid Allam (zhero) who authored a detailed research paper to outline the specifics.

Meet Miggo’s Director of Partnerships
We’re excited to announce that Noa Gur Arieh has joined Miggo as our Director of Partnerships. Noa joins Miggo from McKinsey, where she led multiple strategy engagements for leading financial institutions in Israel, the UK, and Europe, as well as multiple NGO partnerships focused on improving the economic productivity.

Miggo Uncovers Critical Auth Bypass in UK Government System | CVE-2025-25182
Government Communications Headquarters (GCHQ), the UK's intelligence and security agency, has confirmed Miggo’s discovery of a 9.4 critical vulnerability, CVE-2025-25182, in its maintained project, Stroom. CVE-2025-25182 enables attackers to bypass authentication and authorization in any Stroom application.

Accelerating Threat Response with Miggo
The number of application breaches continues to rise as organizations adopt more applications with growing business impact. In this increasingly complex reality, traditional tools fall short against AI-powered attacks that are faster and dynamically evolving, creating an expanding attack surface

Modern AppSec Requires a Modern Approach
As organizations increasingly adopt microservices and serverless architectures, understanding and securing their environments becomes more complex. Teams need a way to connect the dots from when an application is launched to when it’s being attacked. A modern application observability technique called “tracing” is the key to surfacing these missing insights.
%20Tools%20of%202024.png)
Top Application Detection and Response (ADR) Tools of 2025
Application Detection and Response (ADR) solutions are changing the game of application security. They not only give teams long needed visibility into applications but enable proactive threat detection and response by focusing on application behavior deviations in real time and at runtime.