Cyber Threats

Blog
What Happens When Threat Actors Go Rogue?
Coalition Incident Response has recently seen cases of rogue threat actors finding creative ways to profit. Here’s how businesses can fight back.

Blog
6 Cost-Related Questions Every Business Should Ask About Cyber Risk
Get answers on security budgeting, average cyber attack costs, and which solutions deliver the best ROI with the Coalition Security Cost Savings Calculator.

Blog
Limiting Employee Access Can Reduce Your Cyber Exposure
Role-based access control can strengthen your security posture by reducing employee error and malicious insiders while addressing compliance requirements.

Blog
Fortinet SSL VPN Decision Presents New Risks
Fortinet’s decision to end support for its SSL VPN technology is creating new challenges for businesses that depend on the remote access technology.

Blog
What We Learned About AI From Futurist Zack Kass
What does a world of “unmetered intelligence” look like? Futurist Zack Kass tells us about the good, the bad, and the ugly of the AI revolution.

Blog
Why Every SMB Should Shrink Its Attack Surface
Shrinking your attack surface can eliminate vulnerabilities and exposures that contribute to your business' overall cyber risk profile.

Blog
Ransomware Revealed: Top 4 Technologies Exploited by Threat Actors
Most attackers exploit technologies that are highly common among small and businesses and use the same tactics to get inside a network and deploy ransomware.

Blog
Are Your Weak Passwords Welcoming a Cyber Attack?
Weak passwords can put your business at risk. Learn how to mitigate the threat of compromised credentials and safeguard your data, finances, and reputation.

Blog
Voices in the Cyber Crowd: Key Takeaways from NetDiligence Miami
Coalition recently caught up with cyber insurance industry leaders at NetDiligence’s Cyber Risk Summit in Miami.

Blog
Why We Built the Risky Tech Ranking
The Risky Tech Ranking is designed to help businesses make better-informed purchasing decisions and drive more accountability among technology providers.

Blog
Cyber Threat Index 2025: Deciphering the Ransomware Playbook
The Cyber Threat Index 2025 offers insights and data from Coalition’s insurance claims, scanning engine, global honeypot network, and vulnerability analysis.

Blog
Infostealers Are Silently Siphoning Businesses’ Sensitive Data
Attackers are increasingly using infostealers to loot private data en masse. Businesses can mitigate these risks with support from Coalition Security.

Blog
How MDR Helps Businesses Protect Against Top Cyber Threats
Managed detection and response is an invaluable way for small and midsize businesses to strengthen their cybersecurity posture without an in-house team.

Blog
Threat Actors Are Impersonating IT Teams to Deploy Ransomware
Coalition Incident Response has noted a trend where cybercriminals impersonate the help desk through Microsoft Teams to gain remote access and execute ransomware.
