Ransomware

Blog
Living Off the Land: How Hackers Exploit Victims’ Own Tools to Execute Attacks
Threat actors are using your operating system’s built-in tools to execute attacks and remain undetected. How can your business fight back?

Blog
Australia’s Ransomware Reporting Laws to Clarify True Costs and Impact
New ransomware reporting rules in Australia could set a precedent for how transparency and shared responsibility are prioritised across the cyber ecosystem.

Blog
Scattered Spider: Hacker Collective Ensnaring Industry-Specific Targets
The Scattered Spider threat actor group is known for systematically targeting IT help desks and vendors at large organizations within specific industries.

Blog
What Happens When Threat Actors Go Rogue?
Coalition Incident Response has recently seen cases of rogue threat actors finding creative ways to profit. Here’s how businesses can fight back.

Blog
Fortinet SSL VPN Decision Presents New Risks
Fortinet’s decision to end support for its SSL VPN technology is creating new challenges for businesses that depend on the remote access technology.

Blog
Insights from Coalition's 2025 Cyber Claims Report
Despite a changing risk landscape, Coalition observed year-over-year stability in 2024, reaffirming the fact that prevention must be prioritized over reaction.

Blog
Why Every SMB Should Shrink Its Attack Surface
Shrinking your attack surface can eliminate vulnerabilities and exposures that contribute to your business' overall cyber risk profile.

Blog
Ransomware Revealed: Top 4 Technologies Exploited by Threat Actors
Most attackers exploit technologies that are highly common among small and businesses and use the same tactics to get inside a network and deploy ransomware.

Blog
5 Key Takeaways from Activate 2025
Relive the excitement and announcements from Activate 2025 and see how Active Insurance is driving cyber insurance forward with innovation and expertise.

Blog
Why We Built the Risky Tech Ranking
The Risky Tech Ranking is designed to help businesses make better-informed purchasing decisions and drive more accountability among technology providers.

Blog
Cyber Threat Index 2025: Deciphering the Ransomware Playbook
The Cyber Threat Index 2025 offers insights and data from Coalition’s insurance claims, scanning engine, global honeypot network, and vulnerability analysis.

Blog
How MDR Helps Businesses Protect Against Top Cyber Threats
Managed detection and response is an invaluable way for small and midsize businesses to strengthen their cybersecurity posture without an in-house team.

Blog
7 Security Actions for SMBs to Prioritize in 2025
Knowing which security actions to prioritize is the first step toward small and midsize businesses becoming more cyber resilient.

Blog
Security Alert: rsync Vulnerability Allows for Remote Code Execution
Coalition proactively notified policyholders about vulnerabilities in the popular rsync (remote sync) file-synchronizing tool.
