Ransomware

Blog
5 Essential Insights From Our 2026 Cyber Claims Report
Discover how Active Insurance is helping businesses overcome the Cyber Protection Paradox with insights from Coalition’s 2026 Cyber Claims Report.

Blog
AI Agents Are Amplifying Hard-to-Detect Attacks
Living off the land attacks are getting even harder to combat as attackers turn to AI to move faster and avoid detection.

Blog
Citrix NetScaler RCE Vulnerability Exploited in Zero-Day Attacks
Coalition notified policyholders about a critical remote code execution vulnerability in Citrix’s NetScaler products that is already being exploited in the wild.

Blog
Living Off the Land: How Hackers Exploit Victims’ Own Tools to Execute Attacks
Threat actors are using your operating system’s built-in tools to execute attacks and remain undetected. How can your business fight back?

Blog
What Happens When Threat Actors Go Rogue?
Coalition Incident Response has recently seen cases of rogue threat actors finding creative ways to profit. Here’s how businesses can fight back.

Blog
Insights from Coalition's 2025 Cyber Claims Report
Despite a changing risk landscape, Coalition observed year-over-year stability in 2024, reaffirming the fact that prevention must be prioritized over reaction.

Blog
Why Every SMB Should Shrink Its Attack Surface
Shrinking your attack surface can eliminate vulnerabilities and exposures that contribute to your business' overall cyber risk profile.

Blog
Ransomware Revealed: Top 4 Technologies Exploited by Threat Actors
Most attackers exploit technologies that are highly common among small and businesses and use the same tactics to get inside a network and deploy ransomware.

Blog
Why We Built the Risky Tech Ranking
The Risky Tech Ranking is designed to help businesses make better-informed purchasing decisions and drive more accountability among technology providers.

Blog
Cyber Threat Index 2025: Deciphering the Ransomware Playbook
The Cyber Threat Index 2025 offers insights and data from Coalition’s insurance claims, scanning engine, global honeypot network, and vulnerability analysis.

Blog
7 Security Actions for SMBs to Prioritize in 2025
Knowing which security actions to prioritize is the first step toward small and midsize businesses becoming more cyber resilient.

Blog
Expect Everyday Cybercrime to Increase in 2025
Small and midsize businesses must be prepared for everyday cybercrime to increase in 2025, particularly attacks targeting email accounts and endpoints.

Blog
Cyber Trend Watch: 6 Key Takeaways from 2024 Claims Data
The only real constant in cyber risk is change. To help you keep up, we’ve compiled key takeaways from our 2024 Cyber Claims Report: Mid-year Update.

Blog
The Mission of a Strategic Cyber Pro
A strategic cyber pro must achieve an appropriate risk posture, plan ahead to minimize damage, and find creative ways to drive business value.












