Ransomware demands surged 47% last year. See how businesses fought back.
Skip To Main Content
Cyber Incident? Get Help
Blog homeCyber InsuranceSecurityExecutive RisksBroker EducationLife at Coalition
Category

Security

Security

Blog

How Geopolitical
Tension Can Spotlight
Latent Cyber Risks

Coalition security researchers observed distinct changes in cyber scanning behavior originating from Iranian IP addresses that coincided with military activities in the Middle East.
Scott WalshMarch 13, 2026
Security

Blog

How Infostealers May Have Opened the Door to the Stryker Wipe

Coalition security researchers examine the recent cyber attack on Stryker and how infostealers can be a most dangerous fuse in business environments.
Joe ToomeyMarch 12, 2026
Security

Blog

Security Alert: Critical Data Exposure in Salesforce Experience Cloud

Coalition has notified policyholders about a widespread campaign targeting misconfigured guest user permissions in Salesforce Experience Cloud sites.
Scott WalshMarch 11, 2026
Security

Blog

How Wirespeed Eliminates Guesswork in Detecting Attack Simulations

Wirespeed’s SafeBreach integration enables the positive identification of breach and attack simulations without any additional alert noise.
Tim MalcomVetterMarch 06, 2026
Security

Blog

Risky Tech Ranking: Q4 2025 Updates

See how Coalition’s Risky Tech Ranking evolved in Q4 2025 with updates on the number of vendors scored, contributing vulnerabilities, Vendor Scores, and more.
Lucio Fernandez-ArjonaFebruary 26, 2026
Security

Blog

The Patchwork Dilemma: Why the Cycle of Reactive Security Must End

Break the cycle of vendor-introduced risk by demanding better tech accountability and transitioning to modern architectures built for cyber resilience.
Joe ToomeyFebruary 11, 2026
Security

Blog

The Incident Responder Wishlist

The experts at Coalition Incident Response (CIR) share their list of strategic shifts that any business can make to enhance its overall security posture.
Gregory AndersenFebruary 06, 2026
Security

Blog

AI Agents Are Amplifying Hard-to-Detect Attacks

Living off the land attacks are getting even harder to combat as attackers turn to AI to move faster and avoid detection.
Shelley MaJanuary 15, 2026
Security

Blog

Defenders Need Superior Software and Algorithms to Win in 2026

With AI-accelerated cyber attackers, security decisions now need to be made in seconds, not minutes. How can defenders keep up?
Tim MalcomVetterDecember 22, 2025
Security

Blog

When a 10.0 CVSS Hits: Inside the React2Shell Mobilization

How Coalition mobilized to protect policyholders in response to a potentially massive cyber risk aggregation event in React2Shell.
Tiago HenriquesDecember 11, 2025
Security

Blog

Patch Immediately: Critical Vulnerability Dubbed 'React2Shell'

Coalition notified policyholders about a new critical vulnerability impacting React and Next.js applications that allows RCE without authentication.
Joe ToomeyDecember 05, 2025
Security

Blog

Shades of Gray: The Risk of Doing Business with Hackers

Gray hat hackers may appear altruistic, but attitudes can turn quickly when money is involved. How should businesses decide who to trust?
Jessica StainerNovember 24, 2025
Security

Blog

Risky Tech Ranking: Q3 2025 Updates

See how Coalition’s Risky Tech Ranking evolved in Q3 2025 with updates on the number of vendors scored, contributing vulnerabilities, Vendor Scores, and more.
Lucio Fernandez-ArjonaNovember 07, 2025
Security

Blog

Why We Acquired Wirespeed

How Coalition's acquisition of Wirespeed, an industry-leading cybersecurity platform, will enhance its suite of cyber risk management tools.
Sisi LiuNovember 06, 2025
Security

Blog

Predicting Real-World Exploitation with Coalition ESS

The Coalition Exploit Scoring System provides predictive insights that enhance vulnerability management without replacing human judgment or threat intelligence.
Tiago HenriquesOctober 20, 2025