Ransomware
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F276RMh52vEEBfRj1WDwH6l%2F512511c420b4dd874e1ae78c8edb927a%2FBlog-Newsletter-Header-June.jpg&w=3840&q=75)
Familiar Threat Actor Attack Tactics Find New Life
Changes in technology are prompting threat actors to revive old attack methods that may seem ordinary on the surface but still lead to cyber insurance claims.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F77QdxFFbn4ycHPbRs6q4B3%2F4e2096e0e3e0c10aae056ada94f532e9%2FCoalition_Emisoft-Podcast-Recap.jpg&w=3840&q=75)
Bolstering Resilience to Avoid Disruption: The Evolving Role of Cyber Insurance
Sezaneh Seymour, Coalition’s VP and Head of Regulatory Risk and Policy, discusses an evolving cyber risk landscape on The Cyber Insider podcast.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F3oZDMYtaYgOy8Ls9spxJKS%2F157ac91118698b60744b488e33108185%2FBlog-ChangeHealthcareAttackFallout.jpg&w=3840&q=75)
Change Healthcare Attack Fallout: How Coalition is Responding
The attack on Change Healthcare is a reminder of our shared dependency on technology and the ever-present cyber threats facing modern businesses.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F5VUQZLtUA5VRHlG1JM0A3N%2F44549d6f951bbc6d223c24f382ea615c%2FBlog_Ransomware-Myths.png&w=3840&q=75)
Ransomware Myths Busted: How Cyber Insurance Impacts Payments
The decision to pay a ransomware demand is complex. Misconceptions about the role of cyber insurance in these incidents can exacerbate the problem.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F60AxWV6Y0etLTLatdVBKYz%2Faa4c2a43501e579c29dd05cb4cbfadcd%2FLockBit_ConnectWise_ScreenConnect.png&w=3840&q=75)
LockBit Ransomware Used in Exploitation of ConnectWise ScreenConnect
Coalition Incident Response has discovered a link between the LockBit ransomware gang and the ConnectWise ScreenConnect vulnerabilities.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F28oI7DIG04euRoYt3j0ZlP%2Fc3cf70f3e5d10533b2cc8e5cfaf73b45%2FBlog_MDR-MFA.png&w=3840&q=75)
Why MDR is the Next MFA for Cyber Insurance
Cyber insurance providers are increasingly encouraging businesses to implement MDR — if not incentivizing it — just as they did with MFA.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F7uYHZ1Qprix4fXY6eaK6Gn%2Fdf20dd5be2832da2dc432a93a8e94b76%2FBlog_From_Blockchain_to_the_Dark_Web.jpg&w=3840&q=75)
From Blockchain to the Dark Web: Cybersecurity Buzzword Myths Debunked
New tech is worthy of promotion, but when buzzwords and FOMO define purchasing decisions, your cybersecurity program is likely to be a patchwork affair of half-useful tools.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2FYLKwZ7oz8nrJwGLLDdi5g%2F334bf1518be2ccbd24ce2e458e8a5c95%2FBlog_SecLabs-Ransomware_Negotiation.jpg&w=3840&q=75)
Everything You Always Wanted to Know About Ransomware Negotiation (But Were Afraid to Ask)
Have you ever wondered how ransomware negotiations and payments happen? An Incident Responder breaks down everything from crypto to AI and more.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F7qjCeq83CG7xly03qY5iZO%2F396b8b45e2332e5dcd0513f90bb38bb4%2FBlog_Pay-on-behalf.png&w=3840&q=75)
Pay on Behalf: Why Coalition Coverage Handles Upfront Costs for Policyholders
Cyber events can be costly, and most businesses can’t afford a massive loss. So who’s responsible for payment while an insurance claim is in progress?
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2FmAuRrr2a8hKdYYrSwFPZm%2F27f6c2747a487f7f5b21c49f969ae63f%2FSecurity_Alert_-_SysAid_-_11.9.2023.png&w=3840&q=75)
SysAid Zero-Day Exploited to Deploy Ransomware
A vulnerability targeting SysAid On-Prem allows threat actors to deploy ransomware. Learn how Coalition Security Labs is responding.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F6QaEji3yS77kqgyM1az188%2F8cc9d7723f8e0a8b27bfbfa890137bc3%2FBlog_Claims-Trend.png&w=3840&q=75)
How Broker Roles Evolve Alongside Claims Trends
Businesses are getting hit harder and more often with cyber attacks — and they’re increasingly turning to their trusted brokers for guidance.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F14g86B9FBMyTju1OZRZwGB%2F56ee02c808b04d9058d9797d28a6dca5%2FCoalition_Blog_ClaimsReport-Mid2023.jpg&w=3840&q=75)
Embracing Collaboration Amid Spike in Cyber Claims
Cyber claims are up, mainly due to increased ransomware. Learn what businesses can do and other key findings from the 2023 Cyber Claims Report Mid-year Update.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F7pCw07KhbKD43Ps5JBbtNQ%2F107aeec92290981110342af754d36b87%2FCoalition_Blog_SecLabs_Rapid_Response_Alert_August_29.png&w=3840&q=75)
Security Alert: Phishing Link Leads to Ransomware Download
Attackers can use phishing to steal money and information or deploy ransomware. Learn about a recent phishing campaign and the dangers it poses.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F2dUZ0ZkTqisNOrDGlcvxt9%2F6c2f1c37c0c1eba76c4c4ca7d2f45a0d%2FCoalition_LinkedIn_Article_Manufacturer_Ransomware_Claim.jpg&w=3840&q=75)
Maintaining Credible Data Backups to Minimize Downtime
A manufacturer’s ransomware claim at Coalition emphasizes the importance of maintaining reliable data backups for incident recovery.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F5lAPE3OhzL1FDvVT2XzF74%2F81adf954802e6e6082d23682c424c8cb%2FBlog_MOVEit_Mayhem.png&w=3840&q=75)