Data & Insights
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F4VEjBcSTdqNGr3fGvTxRGV%2F4ce7670b231cbe867f85cbc92501b407%2FBlog_Active-Data-Graph__2_.jpg&w=3840&q=75)
Powered by the Active Data Graph
Coalition’s Active Data Graph unearths the cyber threats that are most likely to result in losses and distills that data into actionable insights.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F3Ua7tZNScgsHL9MpXCd5rY%2F78d8f41f63ee58f83df0f15c899f3879%2FCoalition_Blog_2024-Claims.jpg&w=3840&q=75)
The State of Active Insurance: 2024 Cyber Claims Report
Discover the latest trends in ransomware, funds transfer fraud, risky technology, and the state of Active Insurance in Coalition’s 2024 Cyber Claims Report.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F3Bra2ENCNKJXa7pEfMhqqh%2F783981a306fce81c65bf34859510a582%2FBlog_april-newsletter__1_.png&w=3840&q=75)
The Double-Edged Sword of Using Boundary Devices
Boundary devices can help mitigate cyber threats and enable secure remote access. However, these technologies are often directly targeted in cyber attacks.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F60AxWV6Y0etLTLatdVBKYz%2Faa4c2a43501e579c29dd05cb4cbfadcd%2FLockBit_ConnectWise_ScreenConnect.png&w=3840&q=75)
LockBit Ransomware Used in Exploitation of ConnectWise ScreenConnect
Coalition Incident Response has discovered a link between the LockBit ransomware gang and the ConnectWise ScreenConnect vulnerabilities.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F18LBE92ZZHGYQuI9FrZNjk%2Fd885d389d333afcc0429fb968bae9dfd%2FBlog_CTI__1_.png&w=3840&q=75)
Cyber Threat Index 2024: Scans, Honeypots, and CVEs
The Coalition Cyber Threat Index uses our data derived from internet scans, honeypots, and vulnerabilities to provide in-depth cyber insights for 2024.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F4Oqvk0kXfc5XDm8ZZ10ej6%2F605e060f97d64959ea740f508ae4d0b7%2FBlog_SecLabs-CVE-2023__1_.jpg&w=3840&q=75)
From Widespread Damage to Failure to Launch: The Celebrity CVEs of 2023
The number of CVEs has been steadily rising for years. Coalition reflects on the CVEs from 2023 that were the most (and least) impactful.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F6QaEji3yS77kqgyM1az188%2F8cc9d7723f8e0a8b27bfbfa890137bc3%2FBlog_Claims-Trend.png&w=3840&q=75)
How Broker Roles Evolve Alongside Claims Trends
Businesses are getting hit harder and more often with cyber attacks — and they’re increasingly turning to their trusted brokers for guidance.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F14g86B9FBMyTju1OZRZwGB%2F56ee02c808b04d9058d9797d28a6dca5%2FCoalition_Blog_ClaimsReport-Mid2023.jpg&w=3840&q=75)
Embracing Collaboration Amid Spike in Cyber Claims
Cyber claims are up, mainly due to increased ransomware. Learn what businesses can do and other key findings from the 2023 Cyber Claims Report Mid-year Update.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F5sG9lPlFCv5lfAn1HvaAxM%2F270dd1199328fd48cd1d9d8d628d186a%2FCoalition_Blog-PreservingDataPrivacyInDigitalAge.jpg&w=3840&q=75)
Preserving Data Privacy in a Digital Age
Organizations that fail to prioritize data privacy can put themselves at risk not only of the direct impacts of a cyber attack but also liability to others.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F4i4wfgcLPhQ5EQ5ofOIsuv%2Fac953761d13362945dde27711f90da86%2FCoalition_Blog-SecurityLabs_ESS__1_.jpg&w=3840&q=75)
Announcing Coalition Exploit Scoring System (ESS)
Coalition Exploit Scoring System (ESS) helps defenders cut through the noise of vulnerability management. Learn how our dynamic scores work and try the tool.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F2I20yEl8Po2CMB8SxqVPkX%2F54b057d61d25e1e8b5c3c985eed640ab%2FCoalition_Blog-Cyber_Risk_Aggregation_Model__1_.png&w=3840&q=75)
The Art (and Peril) of Modeling Catastrophic Cyber Risk
Coalition dives deeper into cyber catastrophe models and explains what makes our approach to cyber risk aggregation unique.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F2mvVaFGgWdCOUJu37UIlnk%2F62a5ed4c4d8ed523fe99dfc55dfc6f59%2FCoalition_Blog-SecurityLabs_ResearchRedux__1_.jpg&w=3840&q=75)
Research Redux: Examining the Cost of Cybercrime
Research Redux explores academic insights on measuring and mitigating cyber risk, reviewing the cost of cyber crime and its evolving trends.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F5s9SyJBaHAdLZlDBdJCBSp%2F3e29b7348cb8a2c21ab6a9643103588c%2FCoalition_Blog-FTFClawbackClaim.jpg&w=3840&q=75)
How Coalition Recovered $5.5M After Funds Transfer Fraud
After a Coalition policyholder mistakenly wired money to a fraudulent account, our claims team jumped into action and recovered 85% of the initial loss.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F4pNd7GveoHEcJejnUMrEOq%2F193d4d7c93255422c8b9eadb1523f561%2FCoalition_Blog_AnnouncingControl.jpg&w=3840&q=75)
Announcing Control 2.0: Coalition’s Cyber Risk Management Platform
Coalition Control 2.0 is now live for all users, featuring enhanced attack surface monitoring capabilities and improvements to the user interface.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F67FlZUQRATDiybZinUPCZf%2F0b6cde6fbab00e41b9cfdaeea0ac96a6%2FCoalition_Blog-SecurityLabs__1_.jpg&w=3840&q=75)