🎉 Exciting news! Coalition has acquired Wirespeed to accelerate cybersecurity for all.
Cyberincident? Obtenir de l’aide
Topic

Cyber Threats

Security

Blog

Not All Endpoint Security Solutions Are Created Equal

As more businesses adopt endpoint security solutions, a clear disconnect has emerged between how they’re marketed and how they truly function.
Jason VitaleJune 28, 2025
Cyber Insurance

Blog

Why Coalition is Bringing Active Cyber Insurance to Germany

Growing concerns around cyber risk and low cyber insurance adoption rates among all business segments make Germany an obvious choice for Coalition expansion.
Kyle BryantAugust 01, 2024
Cyber Insurance

Blog

Powered by the Active Data Graph

Coalition’s Active Data Graph unearths the cyber threats that are most likely to result in losses and distills that data into actionable insights.
Tiago HenriquesJuly 09, 2024
Security

Blog

Remove Polyfill.io to Prevent Malicious Attacks

Researchers published new information about the open-source code Polyfill leading to malicious attacks. Learn more about prevention.
Scott WalshJune 28, 2024
Cyber Insurance

Blog

Familiar Threat Actor Attack Tactics Find New Life

Changes in technology are prompting threat actors to revive old attack methods that may seem ordinary on the surface but still lead to cyber insurance claims.
Gregory AndersenJune 27, 2024
Security

Blog

SEO Poisoning Attacks Demand More Scrutiny from Search Engine Users

Threat actors are capitalizing on the trust we put in search engines by hiding malicious websites in plain sight using a tactic known as SEO poisoning.
Alexander AmmonsJune 20, 2024
Security

Blog

Threat Actor Claims 100% Success With SIM-Swapping Extortion

SIM-swapping extortion attacks are on the rise due to self-service password resets, which help threat actors bypass interaction with their victims.
Shelley MaJune 17, 2024
Cyber Insurance

Blog

Bolstering Resilience to Avoid Disruption: The Evolving Role of Cyber Insurance

Sezaneh Seymour, Coalition’s VP and Head of Regulatory Risk and Policy, discusses an evolving cyber risk landscape on The Cyber Insider podcast.
Gregory AndersenJune 05, 2024
Security

Blog

XZ Near Miss Sheds Light on Vulnerability, Patching Issues

The recent XZ Utils backdoor uncovered the potential risks associated with vulnerabilities in open-source systems.
Scott WalshJune 04, 2024
Cyber Insurance

Blog

The State of Active Insurance: 2024 Cyber Claims Report

Discover the latest trends in ransomware, funds transfer fraud, risky technology, and the state of Active Insurance in Coalition’s 2024 Cyber Claims Report.
Robert JonesApril 24, 2024
Cyber Insurance

Blog

The Double-Edged Sword of Using Boundary Devices

Boundary devices can help mitigate cyber threats and enable secure remote access. However, these technologies are often directly targeted in cyber attacks.
Gregory AndersenApril 18, 2024
Security

Blog

Palo Alto Networks: Patch Available for PAN-OS Zero-day

A patch is now available for a command injection zero-day vulnerability impacting Palo Alto Networks PAN-OS. Learn what actions you need to take.
Simon BellApril 15, 2024
Cyber Insurance

Blog

Cyber Incident Reporting: Important Questions to Ask for Essential Business Planning

Cyber incident reporting obligations can be complex. Businesses must consider how they will meet the requirements before an incident to expedite the process.
Sezaneh SeymourApril 08, 2024
Cyber Insurance

Blog

Change Healthcare Attack Fallout: How Coalition is Responding

The attack on Change Healthcare is a reminder of our shared dependency on technology and the ever-present cyber threats facing modern businesses.
Gregory AndersenMarch 21, 2024
Cyber Insurance

Blog

Ransomware Myths Busted: How Cyber Insurance Impacts Payments

The decision to pay a ransomware demand is complex. Misconceptions about the role of cyber insurance in these incidents can exacerbate the problem.
Sezaneh SeymourMarch 21, 2024