Blog
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
0 results matching
tag

ADR: The Change AppSec Needs
To better understand the need for ADR, it’s important to reflect on how applications have transformed. Just a few years ago, applications were developed by a single, tightly knit team, hosted either on-prem or in the cloud, and shielded by perimeter defenses like firewalls and WAFs.

Unmasking The Hidden Third Parties
As autumn settles in and the nights grow longer, Spooky Season is a reminder to look beyond the visible and confront what's hidden. The real scares aren't from goblins or ghosts but from unseen integrations quietly embedded into your application infrastructure. This Halloween, it’s time to shine a light on the hidden entities accessing your data without you even knowing.
%20Strategy.png)
3 Game Changers for your Application Detection and Response (ADR) Strategy
Application Security has become one of the fastest-growing, increasingly challenging security sectors within modern business. What was once almost an afterthought, a simple task of securing the software development process with some manual testing and patching, has evolved into a critical component of security postures in every type of organization and industry.
%20with%20Miggo.png)
Unlocking the power of your Application Performance Monitoring (APM) with Miggo
Today's multi-service and multi-cloud applications have long evaded real-time visibility due to their complexity and distribution. Miggo is changing that with deep, real-time visibility into what takes place between your multiservice components. By enhancing the value of the data already collected from your observability tools, we’re offering comprehensive detection capabilities to support a robust response to application security flaws.

ALBeast Security Advisory by Miggo Research
Miggo Research identified a critical configuration-based vulnerability, dubbed ALBeast, affecting applications that utilize AWS Application Load Balancer (ALB) for authentication. This flaw can facilitate authentication and authorization bypass in applications exposed to the internet that relies on ALB’s authentication mechanisms.

The Top 5 Sessions You Shouldn’t Miss at Black Hat 2024
2023 was a challenging year for AppSec professionals, with a distinct increase in high-profile attacks targeting applications, including Ivanti Gateway, GoAnywhere, MOVEit and Microsoft Sharepoint. The ever-vulnerable applications layer remains one of the industry’s most pressing pain points, and at Miggo we’re determined to resolve it with our Application Detection and Response (ADR) solution.

Responding to Third-Party Breaches: Snowflake customers Breach
Third-party service breaches are on the rise as our reliance on outsourced services with inconsistent security measures intensifies. As our attack surface resultingly grows, attackers are able to choose from a wide selection of vectors to gain entry from (Okta breach, MOVEit breach).

Detection and Response for Applications
Today marks a special milestone for Miggo as we officially emerge from stealth and meet the world. None of this would have been possible without our incredible partners who believed in us before we even took our first step–thank you so much to YL Ventures, Cyber Club London (CCL), Runtime Ventures and our inspiring group of angels. Most importantly, I’d like to thank the amazing team that is Miggo.