Cyber Threats

Blog
5 Essential Insights From Our 2026 Cyber Claims Report
Discover how Active Insurance is helping businesses overcome the Cyber Protection Paradox with insights from Coalition’s 2026 Cyber Claims Report.

Blog
Risky Tech Ranking: Q4 2025 Updates
See how Coalition’s Risky Tech Ranking evolved in Q4 2025 with updates on the number of vendors scored, contributing vulnerabilities, Vendor Scores, and more.

Blog
The Patchwork Dilemma: Why the Cycle of Reactive Security Must End
Break the cycle of vendor-introduced risk by demanding better tech accountability and transitioning to modern architectures built for cyber resilience.

Blog
The Incident Responder Wishlist
The experts at Coalition Incident Response (CIR) share their list of strategic shifts that any business can make to enhance its overall security posture.

Blog
AI Agents Are Amplifying Hard-to-Detect Attacks
Living off the land attacks are getting even harder to combat as attackers turn to AI to move faster and avoid detection.

Blog
Defenders Need Superior Software and Algorithms to Win in 2026
With AI-accelerated cyber attackers, security decisions now need to be made in seconds, not minutes. How can defenders keep up?

Blog
Patch Immediately: Critical Vulnerability Dubbed 'React2Shell'
Coalition notified policyholders about a new critical vulnerability impacting React and Next.js applications that allows RCE without authentication.

Blog
Beyond Capacity: How Coalition Re is Building the Future of Cyber Stability
Coalition Re harnesses the full power of Coalition’s cyber intelligence to give reinsurance cedants an unprecedented view across the entire digital ecosystem.

Blog
Shades of Gray: The Risk of Doing Business with Hackers
Gray hat hackers may appear altruistic, but attitudes can turn quickly when money is involved. How should businesses decide who to trust?

Blog
Risky Tech Ranking: Q3 2025 Updates
See how Coalition’s Risky Tech Ranking evolved in Q3 2025 with updates on the number of vendors scored, contributing vulnerabilities, Vendor Scores, and more.

Blog
Why We Acquired Wirespeed
How Coalition's acquisition of Wirespeed, an industry-leading cybersecurity platform, will enhance its suite of cyber risk management tools.

Blog
Predicting Real-World Exploitation with Coalition ESS
The Coalition Exploit Scoring System provides predictive insights that enhance vulnerability management without replacing human judgment or threat intelligence.

Blog
Nation-State Breach of F5 Creates Widespread Exposure
Coalition notified policyholders about a newly disclosed breach, which prompted government warnings of an imminent threat to all businesses using F5 technology.

Blog
How SSO & MFA Work in Tandem to Strengthen Your Cyber Defenses
Single sign-on (SSO) and multi-factor authentication (MFA) are two vital security controls to protect against attackers gaining access to a business network.










