Cyber Threats

Blog
Deepfakes Are Making Cyber Scams More Difficult to Detect
While deepfakes introduce a need for increased scrutiny, businesses can combat the rise of AI-enhanced technology with always-on security awareness.

Blog
Living Off the Land: How Hackers Exploit Victims’ Own Tools to Execute Attacks
Threat actors are using your operating system’s built-in tools to execute attacks and remain undetected. How can your business fight back?

Blog
Australia’s Ransomware Reporting Laws to Clarify True Costs and Impact
New ransomware reporting rules in Australia could set a precedent for how transparency and shared responsibility are prioritised across the cyber ecosystem.

Blog
Security Alert: Microsoft SharePoint Zero-Day Vulnerability Under Attack
Coalition notified policyholders about a critical zero-day vulnerability in Microsoft’s SharePoint, urging immediate patching and removal from the internet.

Blog
AI Advancements Are Reshaping Cyber Insurance Coverage
AI-related cyber incidents necessitate the evolution of policy language to meet today’s risks. How do you know if you're adequately protected?

Blog
Scattered Spider: Hacker Collective Ensnaring Industry-Specific Targets
The Scattered Spider threat actor group is known for systematically targeting IT help desks and vendors at large organizations within specific industries.

Blog
How MSPs and Cyber Insurance Providers Can Unite to Fortify the Future
Partnering with cyber insurance providers can help MSPs create new revenue opportunities, simplify service offerings, and deepen client relationships.

Blog
Not All Endpoint Security Solutions Are Created Equal
As more businesses adopt endpoint security solutions, a clear disconnect has emerged between how they’re marketed and how they truly function.

Blog
Study Finds Small Businesses Underestimate Cyber Risk Reality
Coalition’s new Small Business Cybersecurity Study uncovers small business leaders’ experiences with and perceptions of cyber risk.

Blog
What Happens When Threat Actors Go Rogue?
Coalition Incident Response has recently seen cases of rogue threat actors finding creative ways to profit. Here’s how businesses can fight back.

Blog
6 Cost-Related Questions Every Business Should Ask About Cyber Risk
Get answers on security budgeting, average cyber attack costs, and which solutions deliver the best ROI with the Coalition Security Cost Savings Calculator.

Blog
Limiting Employee Access Can Reduce Your Cyber Exposure
Role-based access control can strengthen your security posture by reducing employee error and malicious insiders while addressing compliance requirements.

Blog
Fortinet SSL VPN Decision Presents New Risks
Fortinet’s decision to end support for its SSL VPN technology is creating new challenges for businesses that depend on the remote access technology.

Blog
What We Learned About AI From Futurist Zack Kass
What does a world of “unmetered intelligence” look like? Futurist Zack Kass tells us about the good, the bad, and the ugly of the AI revolution.
