Exclusive first look at Coalition’s new cyber claims dataGet the 2024 Cyber Claims Report
Topic

Cyber Threats

Cyber Insurance

The State of Active Insurance: 2024 Cyber Claims Report

Discover the latest trends in ransomware, funds transfer fraud, risky technology, and the state of Active Insurance in Coalition’s 2024 Cyber Claims Report.
Robert JonesApril 24, 2024
Cyber Insurance

The Double-Edged Sword of Using Boundary Devices

Boundary devices can help mitigate cyber threats and enable secure remote access. However, these technologies are often directly targeted in cyber attacks.
Gregory AndersenApril 18, 2024
Security Labs

Palo Alto Networks: Patch Available for PAN-OS Zero-day

A patch is now available for a command injection zero-day vulnerability impacting Palo Alto Networks PAN-OS. Learn what actions you need to take.
Simon BellApril 15, 2024
Cyber Insurance

Cyber Incident Reporting: Important Questions to Ask for Essential Business Planning

Cyber incident reporting obligations can be complex. Businesses must consider how they will meet the requirements before an incident to expedite the process.
Sezaneh SeymourApril 08, 2024
Cyber Insurance

Change Healthcare Attack Fallout: How Coalition is Responding

The attack on Change Healthcare is a reminder of our shared dependency on technology and the ever-present cyber threats facing modern businesses.
Gregory AndersenMarch 21, 2024
Cyber Insurance

Ransomware Myths Busted: How Cyber Insurance Impacts Payments

The decision to pay a ransomware demand is complex. Misconceptions about the role of cyber insurance in these incidents can exacerbate the problem.
Sezaneh SeymourMarch 21, 2024
Security Labs

MFA Bypass Attacks: Weak MFA Implementation Welcomes Intrusion

Threat actors are increasingly targeting multi-factor authentication (MFA). Learn the most effective types of MFA and how to avoid MFA bypass attacks.
Joe ToomeyMarch 01, 2024
Security Labs

Cyber Threat Index 2024: Scans, Honeypots, and CVEs 

The Coalition Cyber Threat Index uses our data derived from internet scans, honeypots, and vulnerabilities to provide in-depth cyber insights for 2024.
Tiago HenriquesFebruary 21, 2024
Cyber Insurance

Common Cyber Tax Fraud Schemes (and How to Help Mitigate Them)

During tax season, businesses tend to unknowingly lower their defenses to attackers — and almost all cyber tax fraud starts with a phishing email.
Gregory AndersenFebruary 20, 2024
Security Labs

FortiOS SSL VPN Vulnerability Actively Exploited in the Wild

Fortinet disclosed a critical remote code execution (RCE) vulnerability impacting FortiOS SSL VPN. Learn what actions you need to take.
Ryan GregoryFebruary 12, 2024
Security Labs

SonicWall Firewall Devices Vulnerable to DoS Attacks

SonicWall NGFW series 6 and 7 devices are vulnerable to two critical CVEs that can lead to denial-of-service attacks. Learn what steps businesses should take.
Simon BellJanuary 29, 2024
Cyber Insurance

Why MDR is the Next MFA for Cyber Insurance

Cyber insurance providers are increasingly encouraging businesses to implement MDR — if not incentivizing it — just as they did with MFA.
Gregory AndersenJanuary 24, 2024
Security Labs

Ivanti VPN Zero-Day Avoided with Device Isolation

Two zero-day vulnerabilities are impacting Ivanti VPN devices. Learn how proactive outreach to Coalition policyholders is helping mitigate the threat.
Ryan GregoryJanuary 22, 2024
Security Labs

QR Codes Increasingly Used in Phishing Attacks

Threat actors are using QR codes in phishing attacks to gain access to business networks. Learn the risks and how to evaluate a QR code for legitimacy.
Jason VitaleJanuary 11, 2024
Security Labs

From Blockchain to the Dark Web: Cybersecurity Buzzword Myths Debunked

New tech is worthy of promotion, but when buzzwords and FOMO define purchasing decisions, your cybersecurity program is likely to be a patchwork affair of half-useful tools. 
Aaron KrausJanuary 04, 2024