Security Labs
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F2RPDCkjbUVUmLV8DmlFhU3%2Fbf04ce9dbddbc95de92205c728b2ffdd%2FCrowdstrike_Security_Alert_-July_19_2024.png&w=3840&q=75)
CrowdStrike Software Update Triggers Global Outage
A software update from cybersecurity vendor CrowdStrike prompted a global computer outage impacting Microsoft Windows operating systems.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F5Qgub2nW9RTvxMmGEP7NIE%2Fcec58d4ad8ef9e6446b433c19eaae7dd%2Flarge-Security_Alert_Polyfill.io_Security-Labs.png&w=3840&q=75)
Remove Polyfill.io to Prevent Malicious Attacks
Researchers published new information about the open-source code Polyfill leading to malicious attacks. Learn more about prevention.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F5wHDfACJaihbx5nGusAE2q%2F30012857bb63b92785d5580c1412da5e%2FSecurity-Labs-SEOPoisoning.jpg&w=3840&q=75)
SEO Poisoning Attacks Demand More Scrutiny from Search Engine Users
Threat actors are capitalizing on the trust we put in search engines by hiding malicious websites in plain sight using a tactic known as SEO poisoning.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F4TnBj3IW4IORoIe9xWEaR7%2F9be323701fd2559cfc662a510495ccbd%2FSecurity-Labs-SIM-Swapping_Extortion.jpg&w=3840&q=75)
Threat Actor Claims 100% Success With SIM-Swapping Extortion
SIM-swapping extortion attacks are on the rise due to self-service password resets, which help threat actors bypass interaction with their victims.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F24cYVhiQ9MfoTiPrJ2QWQW%2Fe256ca488d0d6afa31fa652c458a5412%2FBlog_Not_All_Endpoint_Security_Solutions_Are_Created_Equal.jpg&w=3840&q=75)
Not All Endpoint Security Solutions Are Created Equal
As more businesses adopt endpoint security solutions, a clear disconnect has emerged between how they’re marketed and how they truly function.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F5lmENWwbTvuqUo0LMqq57k%2F15af7f3eda7254a294faa8d38d9a4d12%2FBlog_XZ_Vulnerability___Patching_Cadence.jpg&w=3840&q=75)
XZ Near Miss Sheds Light on Vulnerability, Patching Issues
The recent XZ Utils backdoor uncovered the potential risks associated with vulnerabilities in open-source systems.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2FafwxWzlT1WZdS6wJwqPcB%2F7c18fc0bcc96d43f353f0d9735421db0%2FSecurity_Alert_Palo_Alto_Networks_April_15.png&w=3840&q=75)
Palo Alto Networks: Patch Available for PAN-OS Zero-day
A patch is now available for a command injection zero-day vulnerability impacting Palo Alto Networks PAN-OS. Learn what actions you need to take.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F60AxWV6Y0etLTLatdVBKYz%2Faa4c2a43501e579c29dd05cb4cbfadcd%2FLockBit_ConnectWise_ScreenConnect.png&w=3840&q=75)
LockBit Ransomware Used in Exploitation of ConnectWise ScreenConnect
Coalition Incident Response has discovered a link between the LockBit ransomware gang and the ConnectWise ScreenConnect vulnerabilities.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F6Jtn9quHut38ZFfWK53l3W%2Fba33f5f186006e31e9e052c0c22a420b%2FMFA_Bypass_Blog_Security-Labs.jpg&w=3840&q=75)
MFA Bypass Attacks: Weak MFA Implementation Welcomes Intrusion
Threat actors are increasingly targeting multi-factor authentication (MFA). Learn the most effective types of MFA and how to avoid MFA bypass attacks.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F18LBE92ZZHGYQuI9FrZNjk%2Fd885d389d333afcc0429fb968bae9dfd%2FBlog_CTI__1_.png&w=3840&q=75)
Cyber Threat Index 2024: Scans, Honeypots, and CVEs
The Coalition Cyber Threat Index uses our data derived from internet scans, honeypots, and vulnerabilities to provide in-depth cyber insights for 2024.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F34DsPig9zWLd4BvYzhs5WJ%2F1da103e0b18eac9b657e4f09765fc205%2FFortinet_Security_Alert_-_Feb_12_Security-Labs.png&w=3840&q=75)
FortiOS SSL VPN Vulnerability Actively Exploited in the Wild
Fortinet disclosed a critical remote code execution (RCE) vulnerability impacting FortiOS SSL VPN. Learn what actions you need to take.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F1mgP1Liu4sXuXY8lB1Hg50%2Fe9509784593b3f6b666c703b8960625e%2FSONICWALL_NGFW_Security_Alert_Security-Labs.png&w=3840&q=75)
SonicWall Firewall Devices Vulnerable to DoS Attacks
SonicWall NGFW series 6 and 7 devices are vulnerable to two critical CVEs that can lead to denial-of-service attacks. Learn what steps businesses should take.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F3thnbLPfhIsoVPH5uFuQIe%2Fbb97a89f49b374f34aec31a57f3fb223%2FIvanti_Security_Alert_Security-Labs__1_.png&w=3840&q=75)
Ivanti VPN Zero-Day Avoided with Device Isolation
Two zero-day vulnerabilities are impacting Ivanti VPN devices. Learn how proactive outreach to Coalition policyholders is helping mitigate the threat.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F1Kz6S4X8ifz4VGcRWovsMG%2Fad479f2801b2b956e8253feb4d1691a6%2FSecurity-Labs-QR.png&w=3840&q=75)
QR Codes Increasingly Used in Phishing Attacks
Threat actors are using QR codes in phishing attacks to gain access to business networks. Learn the risks and how to evaluate a QR code for legitimacy.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F7uYHZ1Qprix4fXY6eaK6Gn%2Fdf20dd5be2832da2dc432a93a8e94b76%2FBlog_From_Blockchain_to_the_Dark_Web.jpg&w=3840&q=75)