Ransomware demands surged 47% last year. See how businesses fought back.
Skip To Main Content
Cyber Incident? Get Help
Blog homeCyber InsuranceSecurityExecutive RisksBroker EducationLife at Coalition
Topic

Data & Insights

Security

Blog

How Geopolitical
Tension Can Spotlight
Latent Cyber Risks

Coalition security researchers observed distinct changes in cyber scanning behavior originating from Iranian IP addresses that coincided with military activities in the Middle East.
Scott WalshMarch 13, 2026
Security

Blog

How Infostealers May Have Opened the Door to the Stryker Wipe

Coalition security researchers examine the recent cyber attack on Stryker and how infostealers can be a most dangerous fuse in business environments.
Joe ToomeyMarch 12, 2026
Cyber Insurance

Blog

5 Essential Insights From Our 2026 Cyber Claims Report

Discover how Active Insurance is helping businesses overcome the Cyber Protection Paradox with insights from Coalition’s 2026 Cyber Claims Report.
Robert JonesMarch 05, 2026
Security

Blog

Risky Tech Ranking: Q4 2025 Updates

See how Coalition’s Risky Tech Ranking evolved in Q4 2025 with updates on the number of vendors scored, contributing vulnerabilities, Vendor Scores, and more.
Lucio Fernandez-ArjonaFebruary 26, 2026
Cyber Insurance

Blog

Bridging the Cyber Insurance Gap Between Brokers and SMEs

Coalition UK research reveals a gap between specialist cyber insurance take-up by SME decision makers and broker impact on outcomes.
Tom DraperDecember 03, 2025
Cyber Insurance

Blog

Beyond Capacity: How Coalition Re is Building the Future of Cyber Stability

Coalition Re harnesses the full power of Coalition’s cyber intelligence to give reinsurance cedants an unprecedented view across the entire digital ecosystem.
Diana LiuNovember 26, 2025
Security

Blog

Risky Tech Ranking: Q3 2025 Updates

See how Coalition’s Risky Tech Ranking evolved in Q3 2025 with updates on the number of vendors scored, contributing vulnerabilities, Vendor Scores, and more.
Lucio Fernandez-ArjonaNovember 07, 2025
Cyber Insurance

Blog

Debunking 4 Myths Around Wrongful Collection

See what’s real (and what’s not) about web privacy. Our State of Web Privacy report uncovers the reality — backed by nearly 200 claims and analysis of 5,000 websites.
Daniel WoodsNovember 05, 2025
Cyber Insurance

Blog

The Old Privacy Laws That May Be Putting Your Business At Risk

Almost anything outdated can be reinvented with a modern twist. Decades-old privacy laws fuel modern litigation and turn compliance into a moving target.
Kaly ConnollyOctober 29, 2025
Security

Blog

Predicting Real-World Exploitation with Coalition ESS

The Coalition Exploit Scoring System provides predictive insights that enhance vulnerability management without replacing human judgment or threat intelligence.
Tiago HenriquesOctober 20, 2025
Security

Blog

Nation-State Breach of F5 Creates Widespread Exposure

Coalition notified policyholders about a newly disclosed breach, which prompted government warnings of an imminent threat to all businesses using F5 technology.
Joe ToomeyOctober 17, 2025
Security

Blog

Two New Cisco ASA Vulnerabilities Actively Exploited in the Wild

Coalition notified policyholders about two critical vulnerabilities in Cisco’s Secure Firewall Adaptive Security Appliance.
Ryan ChadwickSeptember 29, 2025
Security

Blog

Ransomware’s Ripple Effect: From Breach to Bottom Line

Explore how the ripples of a ransomware attack extend far beyond the initial compromise and what that means for businesses’ bottom line.
Chris HendricksSeptember 10, 2025
Security

Blog

Risky Tech Ranking: Q2 2025 Updates

See how Coalition’s Risky Tech Ranking evolved in Q2 2025 with updates on the number of vendors scored, contributing vulnerabilities, and more.
Lucio Fernandez-ArjonaSeptember 05, 2025
Security

Blog

Defense in Depth: Building a Multi-Layered Security Strategy

Determining which security controls will make the biggest impact can be challenging. Explore the 5 focus areas for building a defense-in-depth strategy.
Alok OjhaAugust 27, 2025