🎉 Exciting news! Coalition has acquired Wirespeed to accelerate cybersecurity for all.
Skip To Main Content
Cyber Incident? Get Help
Blog homeCyber InsuranceSecurityExecutive RisksBroker EducationLife at Coalition
Topic

Cyber Threats

Security

Blog

The Patchwork Dilemma: Why the Cycle of Reactive Security Must End

Break the cycle of vendor-introduced risk by demanding better tech accountability and transitioning to modern architectures built for cyber resilience.
Joe ToomeyFebruary 11, 2026
Security

Blog

Patch Immediately: Critical Vulnerability Dubbed 'React2Shell'

Coalition notified policyholders about a new critical vulnerability impacting React and Next.js applications that allows RCE without authentication.
Joe ToomeyDecember 05, 2025
Cyber Insurance

Blog

Beyond Capacity: How Coalition Re is Building the Future of Cyber Stability

Coalition Re harnesses the full power of Coalition’s cyber intelligence to give reinsurance cedants an unprecedented view across the entire digital ecosystem.
Diana LiuNovember 26, 2025
Security

Blog

Risky Tech Ranking: Q3 2025 Updates

See how Coalition’s Risky Tech Ranking evolved in Q3 2025 with updates on the number of vendors scored, contributing vulnerabilities, Vendor Scores, and more.
Lucio Fernandez-ArjonaNovember 07, 2025
Security

Blog

Why We Acquired Wirespeed

How Coalition's acquisition of Wirespeed, an industry-leading cybersecurity platform, will enhance its suite of cyber risk management tools.
Sisi LiuNovember 06, 2025
Security

Blog

Predicting Real-World Exploitation with Coalition ESS

The Coalition Exploit Scoring System provides predictive insights that enhance vulnerability management without replacing human judgment or threat intelligence.
Tiago HenriquesOctober 20, 2025
Security

Blog

Nation-State Breach of F5 Creates Widespread Exposure

Coalition notified policyholders about a newly disclosed breach, which prompted government warnings of an imminent threat to all businesses using F5 technology.
Joe ToomeyOctober 17, 2025
Security

Blog

How SSO & MFA Work in Tandem to Strengthen Your Cyber Defenses

Single sign-on (SSO) and multi-factor authentication (MFA) are two vital security controls to protect against attackers gaining access to a business network.
Meet PatelOctober 08, 2025
Security

Blog

It’s Time to Say Goodbye to On-Premises Microsoft Exchange

Businesses are urged to migrate away from Microsoft Exchange to a secure cloud or hosted email solution that’s built for the way we work today.
Gregory AndersenOctober 07, 2025
Security

Blog

How to Translate Cyber Risk Into Financial Impact

Coalition’s Financial Risk Calculator translates cyber risks into clear financial impact so you can remove the guesswork and make smarter security decisions.
Shubham LalwaniSeptember 29, 2025
Security

Blog

Two New Cisco ASA Vulnerabilities Actively Exploited in the Wild

Coalition notified policyholders about two critical vulnerabilities in Cisco’s Secure Firewall Adaptive Security Appliance.
Ryan ChadwickSeptember 29, 2025
Security

Blog

The Endpoint Security Tool You May Already Be Paying For

Rather than buying a new security tool to bolster your cybersecurity posture, see if you’re entitled to endpoint security with your Microsoft business license.
Taylor BryantSeptember 05, 2025
Security

Blog

Risky Tech Ranking: Q2 2025 Updates

See how Coalition’s Risky Tech Ranking evolved in Q2 2025 with updates on the number of vendors scored, contributing vulnerabilities, and more.
Lucio Fernandez-ArjonaSeptember 05, 2025
Cyber Insurance

Blog

How Hackers Leverage Insurance Details in Ransomware Attacks

Businesses should secure their cyber insurance policies like any other highly sensitive document to prevent it from becoming a negotiation playbook.
Gregory AndersenAugust 28, 2025
Security

Blog

Citrix NetScaler RCE Vulnerability Exploited in Zero-Day Attacks

Coalition notified policyholders about a critical remote code execution vulnerability in Citrix’s NetScaler products that is already being exploited in the wild.
Joe ToomeyAugust 28, 2025