[Live Webinar] Join us 25 March for more insights from our new 2026 Cyber Claims Report.
Skip To Main Content
Cyber Incident? Get Help
Blog homeCyber InsuranceSecurityExecutive RisksBroker EducationLife at Coalition
Topic

Ransomware

Security

Blog

Security Alert: Critical Data Exposure in Salesforce Experience Cloud

Coalition has notified policyholders about a widespread campaign targeting misconfigured guest user permissions in Salesforce Experience Cloud sites.
Scott WalshMarch 11, 2026
Cyber Insurance

Blog

5 Essential Insights From Our 2026 Cyber Claims Report

Discover how Active Insurance is helping businesses overcome the Cyber Protection Paradox with insights from Coalition’s 2026 Cyber Claims Report.
Robert JonesMarch 05, 2026
Security

Blog

How SSO & MFA Work in Tandem to Strengthen Your Cyber Defenses

Single sign-on (SSO) and multi-factor authentication (MFA) are two vital security controls to protect against attackers gaining access to a business network.
Meet PatelOctober 08, 2025
Cyber Insurance

Blog

How Hackers Leverage Insurance Details in Ransomware Attacks

Businesses should secure their cyber insurance policies like any other highly sensitive document to prevent it from becoming a negotiation playbook.
Gregory AndersenAugust 28, 2025
Cyber Insurance

Blog

Australia’s Ransomware Reporting Laws to Clarify True Costs and Impact

New ransomware reporting rules in Australia could set a precedent for how transparency and shared responsibility are prioritised across the cyber ecosystem.
Sezaneh SeymourAugust 01, 2025
Cyber Insurance

Blog

Insights from Coalition's 2025 Cyber Claims Report

Despite a changing risk landscape, Coalition observed year-over-year stability in 2024, reaffirming the fact that prevention must be prioritized over reaction.
Robert JonesMay 08, 2025
Cyber Insurance

Blog

Coalition’s Response to the UK’s Ransomware Consultation: An Opportunity to Prioritise Resilience and Recovery

Coalition contributed a formal response to the UK Home Office's public ransomware consultation and is sharing its views publicly to promote transparency and facilitate a conversation on this important issue.
Sezaneh SeymourMay 08, 2025
Security

Blog

Why Every SMB Should Shrink Its Attack Surface

Shrinking your attack surface can eliminate vulnerabilities and exposures that contribute to your business' overall cyber risk profile.
Alok OjhaMay 01, 2025
Security

Blog

Ransomware Revealed: Top 4 Technologies Exploited by Threat Actors

Most attackers exploit technologies that are highly common among small and businesses and use the same tactics to get inside a network and deploy ransomware.
Ramya RagavanApril 22, 2025
Security

Blog

Cyber Threat Index 2025: Deciphering the Ransomware Playbook

The Cyber Threat Index 2025 offers insights and data from Coalition’s insurance claims, scanning engine, global honeypot network, and vulnerability analysis.
Daniel WoodsMarch 11, 2025
Security

Blog

How MDR Helps Businesses Protect Against Top Cyber Threats

Managed detection and response is an invaluable way for small and midsize businesses to strengthen their cybersecurity posture without an in-house team.
Cory MarchandFebruary 27, 2025
Security

Blog

Security Alert: rsync Vulnerability Allows for Remote Code Execution

Coalition proactively notified policyholders about vulnerabilities in the popular rsync (remote sync) file-synchronizing tool.
Gavin AtenJanuary 23, 2025
Security

Blog

As Zero Days Increase, SMBs Need More Help With Fast-Moving Risks

Coalition’s Zero-Day Alerts give small and midsize businesses a fast and reliable way to stay informed about zero-day vulnerabilities.
Gregory AndersenNovember 26, 2024
Security

Blog

The Mission of a Strategic Cyber Pro

A strategic cyber pro must achieve an appropriate risk posture, plan ahead to minimize damage, and find creative ways to drive business value.
Jamie McGrorySeptember 20, 2024
Cyber Insurance

Blog

Change Healthcare Attack Fallout: How Coalition is Responding

The attack on Change Healthcare is a reminder of our shared dependency on technology and the ever-present cyber threats facing modern businesses.
Gregory AndersenMarch 21, 2024