Data & Insights
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F4VEjBcSTdqNGr3fGvTxRGV%2F4ce7670b231cbe867f85cbc92501b407%2FBlog_Active-Data-Graph__2_.jpg&w=3840&q=75)
Powered by the Active Data Graph
Coalition’s Active Data Graph unearths the cyber threats that are most likely to result in losses and distills that data into actionable insights.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F3Ua7tZNScgsHL9MpXCd5rY%2F78d8f41f63ee58f83df0f15c899f3879%2FCoalition_Blog_2024-Claims.jpg&w=3840&q=75)
The State of Active Insurance: 2024 Cyber Claims Report
Discover the latest trends in ransomware, funds transfer fraud, risky technology, and the state of Active Insurance in Coalition’s 2024 Cyber Claims Report.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F3Bra2ENCNKJXa7pEfMhqqh%2F783981a306fce81c65bf34859510a582%2FBlog_april-newsletter__1_.png&w=3840&q=75)
The Double-Edged Sword of Using Boundary Devices
Boundary devices can help mitigate cyber threats and enable secure remote access. However, these technologies are often directly targeted in cyber attacks.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F60AxWV6Y0etLTLatdVBKYz%2Faa4c2a43501e579c29dd05cb4cbfadcd%2FLockBit_ConnectWise_ScreenConnect.png&w=3840&q=75)
LockBit Ransomware Used in Exploitation of ConnectWise ScreenConnect
Coalition Incident Response has discovered a link between the LockBit ransomware gang and the ConnectWise ScreenConnect vulnerabilities.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F18LBE92ZZHGYQuI9FrZNjk%2Fd885d389d333afcc0429fb968bae9dfd%2FBlog_CTI__1_.png&w=3840&q=75)
Cyber Threat Index 2024: Scans, Honeypots, and CVEs
The Coalition Cyber Threat Index uses our data derived from internet scans, honeypots, and vulnerabilities to provide in-depth cyber insights for 2024.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F4Oqvk0kXfc5XDm8ZZ10ej6%2F605e060f97d64959ea740f508ae4d0b7%2FBlog_SecLabs-CVE-2023__1_.jpg&w=3840&q=75)
From Widespread Damage to Failure to Launch: The Celebrity CVEs of 2023
The number of CVEs has been steadily rising for years. Coalition reflects on the CVEs from 2023 that were the most (and least) impactful.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F6QaEji3yS77kqgyM1az188%2F8cc9d7723f8e0a8b27bfbfa890137bc3%2FBlog_Claims-Trend.png&w=3840&q=75)
How Broker Roles Evolve Alongside Claims Trends
Businesses are getting hit harder and more often with cyber attacks — and they’re increasingly turning to their trusted brokers for guidance.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F5sG9lPlFCv5lfAn1HvaAxM%2F270dd1199328fd48cd1d9d8d628d186a%2FCoalition_Blog-PreservingDataPrivacyInDigitalAge.jpg&w=3840&q=75)
Preserving Data Privacy in a Digital Age
Organizations that fail to prioritize data privacy can put themselves at risk not only of the direct impacts of a cyber attack but also liability to others.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F4i4wfgcLPhQ5EQ5ofOIsuv%2Fac953761d13362945dde27711f90da86%2FCoalition_Blog-SecurityLabs_ESS__1_.jpg&w=3840&q=75)
Announcing Coalition Exploit Scoring System (ESS)
Coalition Exploit Scoring System (ESS) helps defenders cut through the noise of vulnerability management. Learn how our dynamic scores work and try the tool.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F2I20yEl8Po2CMB8SxqVPkX%2F54b057d61d25e1e8b5c3c985eed640ab%2FCoalition_Blog-Cyber_Risk_Aggregation_Model__1_.png&w=3840&q=75)
The Art (and Peril) of Modeling Catastrophic Cyber Risk
Coalition dives deeper into cyber catastrophe models and explains what makes our approach to cyber risk aggregation unique.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F5s9SyJBaHAdLZlDBdJCBSp%2F3e29b7348cb8a2c21ab6a9643103588c%2FCoalition_Blog-FTFClawbackClaim.jpg&w=3840&q=75)
How Coalition Recovered $5.5M After Funds Transfer Fraud
After a Coalition policyholder mistakenly wired money to a fraudulent account, our claims team jumped into action and recovered 85% of the initial loss.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F4pNd7GveoHEcJejnUMrEOq%2F193d4d7c93255422c8b9eadb1523f561%2FCoalition_Blog_AnnouncingControl.jpg&w=3840&q=75)
Announcing Control 2.0: Coalition’s Cyber Risk Management Platform
Coalition Control 2.0 is now live for all users, featuring enhanced attack surface monitoring capabilities and improvements to the user interface.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F67FlZUQRATDiybZinUPCZf%2F0b6cde6fbab00e41b9cfdaeea0ac96a6%2FCoalition_Blog-SecurityLabs__1_.jpg&w=3840&q=75)
Announcing Coalition Security Labs
Announcing Coalition Security Labs, our research and innovation center providing insights to help face the ever-evolving cyber threat landscape.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F6JoVJGq74L9mb8ynjPitna%2Fab1239dca1792c11612b4624fd92d9c3%2FCoalition_Blog-Cyber_Risk_Aggregation_Model_-_2.png&w=3840&q=75)
Active Cyber Risk Modeling: a new approach to aggregate risk
Cyber risk is insurable with the correct data and approach. Our Active Cyber Risk Model underscores how shared technology fuels cyber risk aggregation.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2Fw0TIpBwxlb7uZDZvxNeTL%2F4caf109654e40bb87a81181691a6b1a6%2FCoalition_Blog-SecurityLabs_CyberThreatIndex.jpg&w=3840&q=75)