Back to Coalition Blog

Threat Actor Claims 100% Success With SIM-Swapping ExtortionSIM-swapping extortion attacks are on the rise due to self-service password resets, which help threat actors bypass interaction with their victims.
Shelley MaJune 17, 2024


It's a Trap — Honeypots Help Defenders Gather Threat IntelA cybersecurity tool, honeypots serve as digital decoys to lure and trick hackers. Here's how organizations can use honeypots to gather details about attackers.
Shelley MaJuly 05, 2022


3 methods of cyber deception: Bait the attacker to turn the tables on ransomwareBy now, ransomware doesn’t need much of an introduction. Are we utterly powerless in the face of ransomware? Discover cyber deception methods with Incident Response Lead Shelley Ma.
Shelley MaJuly 01, 2021


Discovering digital forensics: How I went from microscopes to Microsoft (they’re not that different)Shelley Ma, Incident Response Lead at Coalition, thought she would study forensic biology — until she met digital forensics. Let her walk you through a digital crime scene.
Shelley MaMarch 30, 2021
