Cyber Threats

Blog
Predicting Real-World Exploitation with Coalition ESS
The Coalition Exploit Scoring System provides predictive insights that enhance vulnerability management without replacing human judgment or threat intelligence.

Blog
Nation-State Breach of F5 Creates Widespread Exposure
Coalition notified policyholders about a newly disclosed breach, which prompted government warnings of an imminent threat to all businesses using F5 technology.

Blog
How SSO & MFA Work in Tandem to Strengthen Your Cyber Defenses
Single sign-on (SSO) and multi-factor authentication (MFA) are two vital security controls to protect against attackers gaining access to a business network.

Blog
It’s Time to Say Goodbye to On-Premises Microsoft Exchange
Businesses are urged to migrate away from Microsoft Exchange to a secure cloud or hosted email solution that’s built for the way we work today.

Blog
How to Translate Cyber Risk Into Financial Impact
Coalition’s Financial Risk Calculator translates cyber risks into clear financial impact so you can remove the guesswork and make smarter security decisions.

Blog
Two New Cisco ASA Vulnerabilities Actively Exploited in the Wild
Coalition notified policyholders about two critical vulnerabilities in Cisco’s Secure Firewall Adaptive Security Appliance.

Blog
The Endpoint Security Tool You May Already Be Paying For
Rather than buying a new security tool to bolster your cybersecurity posture, see if you’re entitled to endpoint security with your Microsoft business license.

Blog
Risky Tech Ranking: Q2 2025 Updates
See how Coalition’s Risky Tech Ranking evolved in Q2 2025 with updates on the number of vendors scored, contributing vulnerabilities, and more.

Blog
How Hackers Leverage Insurance Details in Ransomware Attacks
Businesses should secure their cyber insurance policies like any other highly sensitive document to prevent it from becoming a negotiation playbook.

Blog
Citrix NetScaler RCE Vulnerability Exploited in Zero-Day Attacks
Coalition notified policyholders about a critical remote code execution vulnerability in Citrix’s NetScaler products that is already being exploited in the wild.

Blog
Defense in Depth: Building a Multi-Layered Security Strategy
Determining which security controls will make the biggest impact can be challenging. Explore the 5 focus areas for building a defense-in-depth strategy.

Blog
Australia’s Ransomware Reporting Laws to Clarify True Costs and Impact
New ransomware reporting rules in Australia could set a precedent for how transparency and shared responsibility are prioritised across the cyber ecosystem.

Blog
Taking Responsibility in the Age of Non-Stop CVEs
Like other types of insurance, cyber coverage is meant to ease the financial burden of unforeseen events, not to erase accountability altogether.

Blog
UK Government Issues Response to Public Ransomware Consultation
Coalition shares its perspective after the UK government published its official response to the public consultation on ransomware legislation.










