Ransomware

Blog
Ransomware Revealed: Top 4 Technologies Exploited by Threat Actors
Most attackers exploit technologies that are highly common among small and businesses and use the same tactics to get inside a network and deploy ransomware.

Blog
5 Key Takeaways from Activate 2025
Relive the excitement and announcements from Activate 2025 and see how Active Insurance is driving cyber insurance forward with innovation and expertise.

Blog
Why We Built the Risky Tech Ranking
The Risky Tech Ranking is designed to help businesses make better-informed purchasing decisions and drive more accountability among technology providers.

Blog
Cyber Threat Index 2025: Deciphering the Ransomware Playbook
The Cyber Threat Index 2025 offers insights and data from Coalition’s insurance claims, scanning engine, global honeypot network, and vulnerability analysis.

Blog
How MDR Helps Businesses Protect Against Top Cyber Threats
Managed detection and response is an invaluable way for small and midsize businesses to strengthen their cybersecurity posture without an in-house team.

Blog
7 Security Actions for SMBs to Prioritize in 2025
Knowing which security actions to prioritize is the first step toward small and midsize businesses becoming more cyber resilient.

Blog
Security Alert: rsync Vulnerability Allows for Remote Code Execution
Coalition proactively notified policyholders about vulnerabilities in the popular rsync (remote sync) file-synchronizing tool.

Blog
Expect Everyday Cybercrime to Increase in 2025
Small and midsize businesses must be prepared for everyday cybercrime to increase in 2025, particularly attacks targeting email accounts and endpoints.

Blog
As Zero Days Increase, SMBs Need More Help With Fast-Moving Risks
Coalition’s Zero-Day Alerts give small and midsize businesses a fast and reliable way to stay informed about zero-day vulnerabilities.

Blog
The Mission of a Strategic Cyber Pro
A strategic cyber pro must achieve an appropriate risk posture, plan ahead to minimize damage, and find creative ways to drive business value.

Blog
How MDR Elevates the Role of In-house Security and IT Teams
A managed detection and response (MDR) service is like having your own security operations center but at a more manageable cost.

Blog
Familiar Threat Actor Attack Tactics Find New Life
Changes in technology are prompting threat actors to revive old attack methods that may seem ordinary on the surface but still lead to cyber insurance claims.

Blog
Bolstering Resilience to Avoid Disruption: The Evolving Role of Cyber Insurance
Sezaneh Seymour, Coalition’s VP and Head of Regulatory Risk and Policy, discusses an evolving cyber risk landscape on The Cyber Insider podcast.

Blog
Change Healthcare Attack Fallout: How Coalition is Responding
The attack on Change Healthcare is a reminder of our shared dependency on technology and the ever-present cyber threats facing modern businesses.
