Constat de première ligne sur les cyberrisques.
Skip To Main Content
Cyberincident? Obtenir de l’aide
Blog homeCyber InsuranceSecurityExecutive RisksBroker EducationLife at Coalition
Topic

Vulnerabilities

Security

Blog

Not All Endpoint Security Solutions Are Created Equal

As more businesses adopt endpoint security solutions, a clear disconnect has emerged between how they’re marketed and how they truly function.
Jason VitaleJune 28, 2025
Cyber Insurance

Blog

Powered by the Active Data Graph

Coalition’s Active Data Graph unearths the cyber threats that are most likely to result in losses and distills that data into actionable insights.
Tiago HenriquesJuly 09, 2024
Cyber Insurance

Blog

Bolstering Resilience to Avoid Disruption: The Evolving Role of Cyber Insurance

Sezaneh Seymour, Coalition’s VP and Head of Regulatory Risk and Policy, discusses an evolving cyber risk landscape on The Cyber Insider podcast.
Gregory AndersenJune 05, 2024
Security

Blog

XZ Near Miss Sheds Light on Vulnerability, Patching Issues

The recent XZ Utils backdoor uncovered the potential risks associated with vulnerabilities in open-source systems.
Scott WalshJune 04, 2024
Cyber Insurance

Blog

The Double-Edged Sword of Using Boundary Devices

Boundary devices can help mitigate cyber threats and enable secure remote access. However, these technologies are often directly targeted in cyber attacks.
Gregory AndersenApril 18, 2024
Security

Blog

Palo Alto Networks: Patch Available for PAN-OS Zero-day

A patch is now available for a command injection zero-day vulnerability impacting Palo Alto Networks PAN-OS. Learn what actions you need to take.
Simon BellApril 15, 2024
Security

Blog

LockBit Ransomware Used in Exploitation of ConnectWise ScreenConnect

Coalition Incident Response has discovered a link between the LockBit ransomware gang and the ConnectWise ScreenConnect vulnerabilities. 
Leeann NicoloMarch 06, 2024
Security

Blog

Cyber Threat Index 2024: Scans, Honeypots, and CVEs 

The Coalition Cyber Threat Index uses our data derived from internet scans, honeypots, and vulnerabilities to provide in-depth cyber insights for 2024.
Tiago HenriquesFebruary 21, 2024
Broker Education

Blog

Empower Your Clients (and Yourself) With More Visibility Into Cyber Risks

Increased visibility across Coalition's quoting and risk management platforms can empower you as a cyber risk advisor.
Daniel ChungFebruary 20, 2024
Security

Blog

SonicWall Firewall Devices Vulnerable to DoS Attacks

SonicWall NGFW series 6 and 7 devices are vulnerable to two critical CVEs that can lead to denial-of-service attacks. Learn what steps businesses should take.
Simon BellJanuary 29, 2024
Cyber Insurance

Blog

Why MDR is the Next MFA for Cyber Insurance

Cyber insurance providers are increasingly encouraging businesses to implement MDR — if not incentivizing it — just as they did with MFA.
Gregory AndersenJanuary 24, 2024
Security

Blog

From Blockchain to the Dark Web: Cybersecurity Buzzword Myths Debunked

New tech is worthy of promotion, but when buzzwords and FOMO define purchasing decisions, your cybersecurity program is likely to be a patchwork affair of half-useful tools. 
Aaron KrausJanuary 04, 2024
Security

Blog

From Widespread Damage to Failure to Launch: The Celebrity CVEs of 2023

The number of CVEs has been steadily rising for years. Coalition reflects on the CVEs from 2023 that were the most (and least) impactful.
Scott WalshDecember 05, 2023
Security

Blog

How to Mitigate the Risks of Internet-Exposed RDP

Learn the risks of internet-exposed Remote desktop protocol (RDP), steps to provide secure remote access, and what Coalition scan data shows about the risk.
Ryan GregoryNovember 20, 2023
Cyber Insurance

Blog

How to Improve Client Insurability Using Actionable Security Insights

Businesses can gain a security advantage over threat actors through a deeper understanding of the most common and highly exploitable cybersecurity weaknesses.
Gregory AndersenOctober 24, 2023