Ransomware

Blog
Australia’s Ransomware Reporting Laws to Clarify True Costs and Impact
New ransomware reporting rules in Australia could set a precedent for how transparency and shared responsibility are prioritised across the cyber ecosystem.

Blog
UK Government Issues Response to Public Ransomware Consultation
Coalition shares its perspective after the UK government published its official response to the public consultation on ransomware legislation.

Blog
Scattered Spider: Hacker Collective Ensnaring Industry-Specific Targets
The Scattered Spider threat actor group is known for systematically targeting IT help desks and vendors at large organizations within specific industries.

Blog
Fortinet SSL VPN Decision Presents New Risks
Fortinet’s decision to end support for its SSL VPN technology is creating new challenges for businesses that depend on the remote access technology.

Blog
Insights from Coalition's 2025 Cyber Claims Report
Despite a changing risk landscape, Coalition observed year-over-year stability in 2024, reaffirming the fact that prevention must be prioritized over reaction.

Blog
Coalition’s Response to the UK’s Ransomware Consultation: An Opportunity to Prioritise Resilience and Recovery
Coalition contributed a formal response to the UK Home Office's public ransomware consultation and is sharing its views publicly to promote transparency and facilitate a conversation on this important issue.

Blog
Why Every SMB Should Shrink Its Attack Surface
Shrinking your attack surface can eliminate vulnerabilities and exposures that contribute to your business' overall cyber risk profile.

Blog
Ransomware Revealed: Top 4 Technologies Exploited by Threat Actors
Most attackers exploit technologies that are highly common among small and businesses and use the same tactics to get inside a network and deploy ransomware.

Blog
5 Key Takeaways from Activate 2025
Relive the excitement and announcements from Activate 2025 and see how Active Insurance is driving cyber insurance forward with innovation and expertise.

Blog
Why We Built the Risky Tech Ranking
The Risky Tech Ranking is designed to help businesses make better-informed purchasing decisions and drive more accountability among technology providers.

Blog
Cyber Threat Index 2025: Deciphering the Ransomware Playbook
The Cyber Threat Index 2025 offers insights and data from Coalition’s insurance claims, scanning engine, global honeypot network, and vulnerability analysis.

Blog
How MDR Helps Businesses Protect Against Top Cyber Threats
Managed detection and response is an invaluable way for small and midsize businesses to strengthen their cybersecurity posture without an in-house team.

Blog
7 Security Actions for SMBs to Prioritize in 2025
Knowing which security actions to prioritize is the first step toward small and midsize businesses becoming more cyber resilient.

Blog
Security Alert: rsync Vulnerability Allows for Remote Code Execution
Coalition proactively notified policyholders about vulnerabilities in the popular rsync (remote sync) file-synchronizing tool.
