🎉 Exciting news! Coalition has acquired Wirespeed to accelerate cybersecurity for all.
Topic

Policyholder Education

Cyber Insurance

Blog

Timely Reporting Can Be the Deciding Factor in Cyber Insurance

The cyber insurance industry must work to normalize the reporting of suspicious activity and encourage businesses to use the resources at their disposal.
Robert JonesAugust 25, 2025
Cyber Insurance

Blog

CrowdStrike Outage: Policyholder Guidance and Insurance Implications

The global outage triggered by CrowdStrike has raised questions about how cyber insurance will respond and whether the industry can insure widespread events.
Joshua MottaJuly 25, 2024
Security

Blog

CrowdStrike Software Update Triggers Global Outage

A software update from cybersecurity vendor CrowdStrike prompted a global computer outage impacting Microsoft Windows operating systems.
Tiago HenriquesJuly 19, 2024
Security

Blog

Remove Polyfill.io to Prevent Malicious Attacks

Researchers published new information about the open-source code Polyfill leading to malicious attacks. Learn more about prevention.
Scott WalshJune 28, 2024
Security

Blog

Palo Alto Networks: Patch Available for PAN-OS Zero-day

A patch is now available for a command injection zero-day vulnerability impacting Palo Alto Networks PAN-OS. Learn what actions you need to take.
Simon BellApril 15, 2024
Cyber Insurance

Blog

Cyber Incident Reporting: Important Questions to Ask for Essential Business Planning

Cyber incident reporting obligations can be complex. Businesses must consider how they will meet the requirements before an incident to expedite the process.
Sezaneh SeymourApril 08, 2024
Security

Blog

MFA Bypass Attacks: Weak MFA Implementation Welcomes Intrusion

Threat actors are increasingly targeting multi-factor authentication (MFA). Learn the most effective types of MFA and how to avoid MFA bypass attacks.
Joe ToomeyMarch 01, 2024
Security

Blog

Cyber Threat Index 2024: Scans, Honeypots, and CVEs 

The Coalition Cyber Threat Index uses our data derived from internet scans, honeypots, and vulnerabilities to provide in-depth cyber insights for 2024.
Tiago HenriquesFebruary 21, 2024
Security

Blog

FortiOS SSL VPN Vulnerability Actively Exploited in the Wild

Fortinet disclosed a critical remote code execution (RCE) vulnerability impacting FortiOS SSL VPN. Learn what actions you need to take.
Ryan GregoryFebruary 12, 2024
Security

Blog

SonicWall Firewall Devices Vulnerable to DoS Attacks

SonicWall NGFW series 6 and 7 devices are vulnerable to two critical CVEs that can lead to denial-of-service attacks. Learn what steps businesses should take.
Simon BellJanuary 29, 2024
Security

Blog

Ivanti VPN Zero-Day Avoided with Device Isolation

Two zero-day vulnerabilities are impacting Ivanti VPN devices. Learn how proactive outreach to Coalition policyholders is helping mitigate the threat.
Ryan GregoryJanuary 22, 2024
Security

Blog

Guidance for Hosted End-Of-Life Microsoft IIS 8.5

Microsoft Internet Information Services (IIS) 8.5 went end-of-life (EOL) on October 10, 2023. Learn how to handle hosted IIS 8.5.
Joe ToomeyDecember 19, 2023
Security

Blog

Everything You Always Wanted to Know About Ransomware Negotiation (But Were Afraid to Ask)

Have you ever wondered how ransomware negotiations and payments happen? An Incident Responder breaks down everything from crypto to AI and more.
Leeann NicoloNovember 29, 2023
Security

Blog

How to Mitigate the Risks of Internet-Exposed RDP

Learn the risks of internet-exposed Remote desktop protocol (RDP), steps to provide secure remote access, and what Coalition scan data shows about the risk.
Ryan GregoryNovember 20, 2023
Security

Blog

Security Alert: MFA Spamming Attacks Increase Cyber Claims

MFA fatigue, overwhelming users with constant authentication requests, can lead to cyber insurance claims. Learn what mitigations are available.
Joshua SmithJune 12, 2023