Phishing
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F6xDwdpWtWLoLMJLn62uxh9%2F81dc37d0dbe24247c728fbcc935050ab%2FCoalition_Blog-Phishing-Scams.png&w=3840&q=75)
Blog
Phishing Scams Will Be Harder to Spot in 2025
Artificial intelligence helps attackers execute sophisticated phishing scams that are personalized, grammatically flawless, and contextually relevant.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F36nQGWya33RU5VnVmELxFO%2Fbed0ba347c1e17baaa15003d0ff2f493%2FBlog_Security-Training.jpg&w=3840&q=75)
Blog
Introducing Coalition Security Awareness Training
Coalition Security Awareness Training makes it easy for small businesses to educate employees on cybersecurity, monitor performance, and track compliance.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F77QdxFFbn4ycHPbRs6q4B3%2F4e2096e0e3e0c10aae056ada94f532e9%2FCoalition_Emisoft-Podcast-Recap.jpg&w=3840&q=75)
Blog
Bolstering Resilience to Avoid Disruption: The Evolving Role of Cyber Insurance
Sezaneh Seymour, Coalition’s VP and Head of Regulatory Risk and Policy, discusses an evolving cyber risk landscape on The Cyber Insider podcast.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F7DJ9OCR1ge6Zpw8d5JDUnO%2F9903b86927e98b6aaa725211e75378b3%2FBlog_Cyber-Tax-Fraud.png&w=3840&q=75)
Blog
Common Cyber Tax Fraud Schemes (and How to Help Mitigate Them)
During tax season, businesses tend to unknowingly lower their defenses to attackers — and almost all cyber tax fraud starts with a phishing email.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F1Kz6S4X8ifz4VGcRWovsMG%2Fad479f2801b2b956e8253feb4d1691a6%2FSecurity-Labs-QR.png&w=3840&q=75)
Blog
QR Codes Increasingly Used in Phishing Attacks
Threat actors are using QR codes in phishing attacks to gain access to business networks. Learn the risks and how to evaluate a QR code for legitimacy.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F7uYHZ1Qprix4fXY6eaK6Gn%2Fdf20dd5be2832da2dc432a93a8e94b76%2FBlog_From_Blockchain_to_the_Dark_Web.jpg&w=3840&q=75)
Blog
From Blockchain to the Dark Web: Cybersecurity Buzzword Myths Debunked
New tech is worthy of promotion, but when buzzwords and FOMO define purchasing decisions, your cybersecurity program is likely to be a patchwork affair of half-useful tools.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F3ms415qvjqHD1QoipZZQ32%2F844dfdeed46371f1cb5b47063dddcb3f%2FBlog_AI.png&w=3840&q=75)
Blog
The Tremendous Opportunity (and Threat) of Artificial Intelligence
When considering the benefits of artificial intelligence, striking the right balance is essential in Coalition's commitment to protecting the unprotected.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F7pCw07KhbKD43Ps5JBbtNQ%2F107aeec92290981110342af754d36b87%2FCoalition_Blog_SecLabs_Rapid_Response_Alert_August_29.png&w=3840&q=75)
Blog
Security Alert: Phishing Link Leads to Ransomware Download
Attackers can use phishing to steal money and information or deploy ransomware. Learn about a recent phishing campaign and the dangers it poses.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F1pBE5bWfQLYrHRJrl7tNGe%2Fa03b30186e36d7cd5cdc1e65b707a200%2FCoalition_Blog_SecLabs_Rapid_Response_Alert_June_5.png&w=3840&q=75)
Blog
Security Alert: MFA Spamming Attacks Increase Cyber Claims
MFA fatigue, overwhelming users with constant authentication requests, can lead to cyber insurance claims. Learn what mitigations are available.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F5s9SyJBaHAdLZlDBdJCBSp%2F3e29b7348cb8a2c21ab6a9643103588c%2FCoalition_Blog-FTFClawbackClaim.jpg&w=3840&q=75)
Blog
How Coalition Recovered $5.5M After Funds Transfer Fraud
After a Coalition policyholder mistakenly wired money to a fraudulent account, our claims team jumped into action and recovered 85% of the initial loss.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F4EJvbU2bNf2BL7VhXACESa%2F72a291bef8b09e292476fb7c1b63246f%2FCoalition_Blog_2023-Claims-Report__1_.jpg&w=3840&q=75)
Blog
Threat Actors Aren’t Targeting Your Business — You’re Just Making the Cash Grab Easy
Coalition’s Head of Claims explains why funds transfer fraud is now the top attack method, along with other key findings from the 2023 Cyber Claims Report.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F7CmrfweKUtMQJztBgKdxE8%2F6af5673076b4b1e9ededb5ae646be2eb%2FCoalition_Blog-AIPhishing.jpg&w=3840&q=75)