Vulnerabilities
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F4VEjBcSTdqNGr3fGvTxRGV%2F4ce7670b231cbe867f85cbc92501b407%2FBlog_Active-Data-Graph__2_.jpg&w=3840&q=75)
Powered by the Active Data Graph
Coalition’s Active Data Graph unearths the cyber threats that are most likely to result in losses and distills that data into actionable insights.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F24cYVhiQ9MfoTiPrJ2QWQW%2Fe256ca488d0d6afa31fa652c458a5412%2FBlog_Not_All_Endpoint_Security_Solutions_Are_Created_Equal.jpg&w=3840&q=75)
Not All Endpoint Security Solutions Are Created Equal
As more businesses adopt endpoint security solutions, a clear disconnect has emerged between how they’re marketed and how they truly function.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F77QdxFFbn4ycHPbRs6q4B3%2F4e2096e0e3e0c10aae056ada94f532e9%2FCoalition_Emisoft-Podcast-Recap.jpg&w=3840&q=75)
Bolstering Resilience to Avoid Disruption: The Evolving Role of Cyber Insurance
Sezaneh Seymour, Coalition’s VP and Head of Regulatory Risk and Policy, discusses an evolving cyber risk landscape on The Cyber Insider podcast.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F5lmENWwbTvuqUo0LMqq57k%2F15af7f3eda7254a294faa8d38d9a4d12%2FBlog_XZ_Vulnerability___Patching_Cadence.jpg&w=3840&q=75)
XZ Near Miss Sheds Light on Vulnerability, Patching Issues
The recent XZ Utils backdoor uncovered the potential risks associated with vulnerabilities in open-source systems.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F3Bra2ENCNKJXa7pEfMhqqh%2F783981a306fce81c65bf34859510a582%2FBlog_april-newsletter__1_.png&w=3840&q=75)
The Double-Edged Sword of Using Boundary Devices
Boundary devices can help mitigate cyber threats and enable secure remote access. However, these technologies are often directly targeted in cyber attacks.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2FafwxWzlT1WZdS6wJwqPcB%2F7c18fc0bcc96d43f353f0d9735421db0%2FSecurity_Alert_Palo_Alto_Networks_April_15.png&w=3840&q=75)
Palo Alto Networks: Patch Available for PAN-OS Zero-day
A patch is now available for a command injection zero-day vulnerability impacting Palo Alto Networks PAN-OS. Learn what actions you need to take.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F60AxWV6Y0etLTLatdVBKYz%2Faa4c2a43501e579c29dd05cb4cbfadcd%2FLockBit_ConnectWise_ScreenConnect.png&w=3840&q=75)
LockBit Ransomware Used in Exploitation of ConnectWise ScreenConnect
Coalition Incident Response has discovered a link between the LockBit ransomware gang and the ConnectWise ScreenConnect vulnerabilities.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F18LBE92ZZHGYQuI9FrZNjk%2Fd885d389d333afcc0429fb968bae9dfd%2FBlog_CTI__1_.png&w=3840&q=75)
Cyber Threat Index 2024: Scans, Honeypots, and CVEs
The Coalition Cyber Threat Index uses our data derived from internet scans, honeypots, and vulnerabilities to provide in-depth cyber insights for 2024.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F47ziNhMiGSccBrEEIhUGNl%2Ffe7859ddcc7f3fc0f80f47e843a3d1d5%2FBlog_Q1_Product_Launch__2.jpg&w=3840&q=75)
Empower Your Clients (and Yourself) With More Visibility Into Cyber Risks
Increased visibility across Coalition's quoting and risk management platforms can empower you as a cyber risk advisor.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F1mgP1Liu4sXuXY8lB1Hg50%2Fe9509784593b3f6b666c703b8960625e%2FSONICWALL_NGFW_Security_Alert_Security-Labs.png&w=3840&q=75)
SonicWall Firewall Devices Vulnerable to DoS Attacks
SonicWall NGFW series 6 and 7 devices are vulnerable to two critical CVEs that can lead to denial-of-service attacks. Learn what steps businesses should take.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F28oI7DIG04euRoYt3j0ZlP%2Fc3cf70f3e5d10533b2cc8e5cfaf73b45%2FBlog_MDR-MFA.png&w=3840&q=75)
Why MDR is the Next MFA for Cyber Insurance
Cyber insurance providers are increasingly encouraging businesses to implement MDR — if not incentivizing it — just as they did with MFA.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F4Oqvk0kXfc5XDm8ZZ10ej6%2F605e060f97d64959ea740f508ae4d0b7%2FBlog_SecLabs-CVE-2023__1_.jpg&w=3840&q=75)
From Widespread Damage to Failure to Launch: The Celebrity CVEs of 2023
The number of CVEs has been steadily rising for years. Coalition reflects on the CVEs from 2023 that were the most (and least) impactful.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F2l9OLuEpGg8CrVC2EFiJdU%2F2d1fe62c0fe0346a124ba72795699b81%2FBlog_SecLabs_RDP.jpg&w=3840&q=75)
How to Mitigate the Risks of Internet-Exposed RDP
Learn the risks of internet-exposed Remote desktop protocol (RDP), steps to provide secure remote access, and what Coalition scan data shows about the risk.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2FmAuRrr2a8hKdYYrSwFPZm%2F27f6c2747a487f7f5b21c49f969ae63f%2FSecurity_Alert_-_SysAid_-_11.9.2023.png&w=3840&q=75)
SysAid Zero-Day Exploited to Deploy Ransomware
A vulnerability targeting SysAid On-Prem allows threat actors to deploy ransomware. Learn how Coalition Security Labs is responding.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F2TMuNUiuebOZyLbofkOeFY%2F362e32d89d15bf078dc77b8708d3b4fc%2FBlog_Security_Insights.png&w=3840&q=75)