Back to Coalition Blog

Living Off the Land: How Hackers Exploit Victims’ Own Tools to Execute AttacksThreat actors are using your operating system’s built-in tools to execute attacks and remain undetected. How can your business fight back?
Devin CanavanAugust 06, 2025


How Email Logs Tell the Story Behind an Inbox CompromiseIf an email account is compromised, you’re going to want to know the story of what happened. Email logs can help.
Devin CanavanDecember 19, 2024
