Ransomware demands surged 47% last year. See how businesses fought back.
Skip To Main Content
Cyber Incident? Get Help
Blog homeCyber InsuranceSecurityExecutive RisksBroker EducationLife at Coalition
Topic

Ransomware

Cyber Insurance

Blog

5 Essential Insights From Our 2026 Cyber Claims Report

Discover how Active Insurance is helping businesses overcome the Cyber Protection Paradox with insights from Coalition’s 2026 Cyber Claims Report.
Robert JonesMarch 05, 2026
Security

Blog

AI Agents Are Amplifying Hard-to-Detect Attacks

Living off the land attacks are getting even harder to combat as attackers turn to AI to move faster and avoid detection.
Shelley MaJanuary 15, 2026
Security

Blog

Citrix NetScaler RCE Vulnerability Exploited in Zero-Day Attacks

Coalition notified policyholders about a critical remote code execution vulnerability in Citrix’s NetScaler products that is already being exploited in the wild.
Joe ToomeyAugust 28, 2025
Security

Blog

Living Off the Land: How Hackers Exploit Victims’ Own Tools to Execute Attacks

Threat actors are using your operating system’s built-in tools to execute attacks and remain undetected. How can your business fight back?
Devin CanavanAugust 06, 2025
Security

Blog

What Happens When Threat Actors Go Rogue?

Coalition Incident Response has recently seen cases of rogue threat actors finding creative ways to profit. Here’s how businesses can fight back.
Jason VitaleJune 04, 2025
Cyber Insurance

Blog

Insights from Coalition's 2025 Cyber Claims Report

Despite a changing risk landscape, Coalition observed year-over-year stability in 2024, reaffirming the fact that prevention must be prioritized over reaction.
Robert JonesMay 08, 2025
Security

Blog

Why Every SMB Should Shrink Its Attack Surface

Shrinking your attack surface can eliminate vulnerabilities and exposures that contribute to your business' overall cyber risk profile.
Alok OjhaMay 01, 2025
Security

Blog

Ransomware Revealed: Top 4 Technologies Exploited by Threat Actors

Most attackers exploit technologies that are highly common among small and businesses and use the same tactics to get inside a network and deploy ransomware.
Ramya RagavanApril 22, 2025
Security

Blog

Why We Built the Risky Tech Ranking

The Risky Tech Ranking is designed to help businesses make better-informed purchasing decisions and drive more accountability among technology providers.
Tiago HenriquesApril 08, 2025
Security

Blog

Cyber Threat Index 2025: Deciphering the Ransomware Playbook

The Cyber Threat Index 2025 offers insights and data from Coalition’s insurance claims, scanning engine, global honeypot network, and vulnerability analysis.
Daniel WoodsMarch 11, 2025
Security

Blog

7 Security Actions for SMBs to Prioritize in 2025

Knowing which security actions to prioritize is the first step toward small and midsize businesses becoming more cyber resilient. 
Kaly ConnollyJanuary 30, 2025
Security

Blog

Expect Everyday Cybercrime to Increase in 2025

Small and midsize businesses must be prepared for everyday cybercrime to increase in 2025, particularly attacks targeting email accounts and endpoints.
Ryan GregoryDecember 18, 2024
Cyber Insurance

Blog

Cyber Trend Watch: 6 Key Takeaways from 2024 Claims Data

The only real constant in cyber risk is change. To help you keep up, we’ve compiled key takeaways from our 2024 Cyber Claims Report: Mid-year Update.
Robert JonesOctober 10, 2024
Security

Blog

The Mission of a Strategic Cyber Pro

A strategic cyber pro must achieve an appropriate risk posture, plan ahead to minimize damage, and find creative ways to drive business value.
Jamie McGrorySeptember 20, 2024
Security

Blog

How MDR Elevates the Role of In-house Security and IT Teams

A managed detection and response (MDR) service is like having your own security operations center but at a more manageable cost.
Jamie McGrorySeptember 10, 2024