Security Labs
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F6xDwdpWtWLoLMJLn62uxh9%2F81dc37d0dbe24247c728fbcc935050ab%2FCoalition_Blog-Phishing-Scams.png&w=3840&q=75)
Blog
Phishing Scams Will Be Harder to Spot in 2025
Artificial intelligence helps attackers execute sophisticated phishing scams that are personalized, grammatically flawless, and contextually relevant.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F6Ql83mWuqDkAVZsvMMaOqY%2F5c40f862eceef1f7504a699df5448cd3%2FCoalition_Blog-Inbox-Compromise.png&w=3840&q=75)
Blog
How Email Logs Tell the Story Behind an Inbox Compromise
If an email account is compromised, you’re going to want to know the story of what happened. Email logs can help.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F7j5LuP6UCo5dJF4ZqgRH3P%2F651bbbcc6492b3f9a55603c8893d41c5%2FCoalition_Blog-Everyday-Cybercrime.png&w=3840&q=75)
Blog
Expect Everyday Cybercrime to Increase in 2025
Small and midsize businesses must be prepared for everyday cybercrime to increase in 2025, particularly attacks targeting email accounts and endpoints.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F4cGp8CaBhpU5Hr1oelqLbT%2Faacf4cfdbd1d45f0e1fad77c3dd351db%2FBlog_Fast-moving-risks.png&w=3840&q=75)
Blog
As Zero Days Increase, SMBs Need More Help With Fast-Moving Risks
Coalition’s Zero-Day Alerts give small and midsize businesses a fast and reliable way to stay informed about zero-day vulnerabilities.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2FMQsWiaS2fS0fqDxk7WgpY%2Fe79eeeef1014d7dbb0a54cedece1bc73%2FCoalition_Blog-Security-SMBs.jpg&w=3840&q=75)
Blog
SMBs Need Cyber Experts Invested in Their Security
Cyber insurance providers have a vested interest in protecting policyholders with security products designed for small businesses.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F5TgGjxN6BTffuq4ODPlIAc%2Fb582262a4c48cf7640ea426ff4d4fefd%2FCoalition_Blog-Security-Copilot__1_.png&w=3840&q=75)
Blog
Introducing Coalition Security Copilot
Coalition Security Copilot gives policyholders an AI-driven assistant designed to provide personalized guidance for managing security risks.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F1glx2tSk38wuBT4ft5ZbBk%2F163fc2cd38904a69fbe221123a8d425b%2FCoalition_MDR_Blog_-5_Header__Option_A_.png&w=3840&q=75)
Blog
The Mission of a Strategic Cyber Pro
A strategic cyber pro must achieve an appropriate risk posture, plan ahead to minimize damage, and find creative ways to drive business value.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F1L83sFlkY7IfOpVqKqrklm%2F8839bb5d3336c3d8885c93d35e2aab51%2FCoalition_MDR_Blog_-4_Header__Option_B_.png&w=3840&q=75)
Blog
How MDR Elevates the Role of In-house Security and IT Teams
A managed detection and response (MDR) service is like having your own security operations center but at a more manageable cost.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F4hrU8vTlNt16p2v6LFFREh%2F3de000093cac5d2890e349b49739fc67%2FCoalition_MDR_Blog_-3_Header.png&w=3840&q=75)
Blog
From Understaffed Firefighters to Value-Adders: The Changing Role of SMB Cybersecurity Teams
Most SMBs could get more out of their cybersecurity function if the people handling security could get ahead of the daily grind of alerts.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F4tdjsUXCewKDYlqgnh2YhD%2F323db370c5bc65888d23854913b6d2ad%2FCoalition_MDR_Blog_-2_Header__Option_B_.png&w=3840&q=75)
Blog
Alert Fatigue: Tips for Reducing and Prioritizing Cyber Alerts at SMBs
Small businesses are often so inundated with security alerts that they get added to an ever-growing backlog or ignored entirely.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F2bdjEtyNbl2fkoOVKGsWLJ%2Ff48f554f22ebcc4bbec9f680bc26ac8c%2FBlog-Active_Policyholder_Participation.jpg&w=3840&q=75)
Blog
How Proactive Mitigation Helps SMBs Reduce Cyber Exposure
Businesses may be quick to patch vulnerabilities, but addressing all security alerts and proactively mitigating other cyber exposures is just as important.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F23Rrls3Gd4VHn0g7ycJo0h%2Fb1fa118e2ee7a2a60232cd72e427a95a%2FCoalition_MDR_Blog_-1_Header.png&w=3840&q=75)
Blog
Cybersecurity Burnout Is Crushing Your Effectiveness
When security professionals are drowning in alerts or not getting them at all, the truly harmful cyber threats can slip through the cracks.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F2RPDCkjbUVUmLV8DmlFhU3%2Fbf04ce9dbddbc95de92205c728b2ffdd%2FCrowdstrike_Security_Alert_-July_19_2024.png&w=3840&q=75)
Blog
CrowdStrike Software Update Triggers Global Outage
A software update from cybersecurity vendor CrowdStrike prompted a global computer outage impacting Microsoft Windows operating systems.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F5Qgub2nW9RTvxMmGEP7NIE%2Fcec58d4ad8ef9e6446b433c19eaae7dd%2Flarge-Security_Alert_Polyfill.io_Security-Labs.png&w=3840&q=75)
Blog
Remove Polyfill.io to Prevent Malicious Attacks
Researchers published new information about the open-source code Polyfill leading to malicious attacks. Learn more about prevention.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F5wHDfACJaihbx5nGusAE2q%2F30012857bb63b92785d5580c1412da5e%2FSecurity-Labs-SEOPoisoning.jpg&w=3840&q=75)