Ransomware demands surged 47% last year. See how businesses fought back.
Skip To Main Content
Cyber Incident? Get Help

Featured resources

Cyber Knowledge Center

Build your cyber expertise, access exclusive insights, read real customer stories, and more.

Knowledge Center Tile > [Video, Webinar]

GUIDE

Coalition MDR Buyer's
Guide

Make sure you're asking the right questions when evaluating managed detection and response.

Knowledge Center Tile > [Report, Blog, Page, (Security Labs Only)]

PAGE

Future of Cyber Insurance

Get a look at what's next in cyber risk — and what you can do about all of it today.

Knowledge Center Tile > [Video, Webinar]

GUIDE

Cyber Insurance Buyer's Guide

Know what to look for when selecting a cyber policy.

Knowledge Center Tile > [Video, Webinar]

GUIDE

Coalition MDR Buyer's
Guide

Make sure you're asking the right questions when evaluating managed detection and response.

Knowledge Center Tile > [Report, Blog, Page, (Security Labs Only)]

PAGE

Future of Cyber Insurance

Get a look at what's next in cyber risk — and what you can do about all of it today.

Knowledge Center Tile > [Video, Webinar]

GUIDE

Cyber Insurance Buyer's Guide

Know what to look for when selecting a cyber policy.

Knowledge Center Tile > [Video, Webinar]

GUIDE

Coalition MDR Buyer's
Guide

Make sure you're asking the right questions when evaluating managed detection and response.

Home Incident TypesIndustriesProducts & ServicesTopics

Incident Types

Incident Types

Other

Case Study

Former healthcare contractor steals devices and disrupts operations following termination

Former healthcare contractor steals devices and disrupts operations following termination

Case Study

SaaS company avoids social engineering scheme related to bug bounty program

SaaS company avoids social engineering scheme related to bug bounty program

Case Study

Threat actors collect fraudulent tax refunds after theft from accounting firm

Threat actors collect fraudulent tax refunds after theft from accounting firm

Case Study

School leverages breach response coverage to investigate potential data breach by former employee

School leverages breach response coverage to investigate potential data breach by former employee

Case Study

Coffee company recoups lost revenue after DDoS attack on busy holiday weekend

Coffee company recoups lost revenue after DDoS attack on busy holiday weekend
Security

Blog

Not All Endpoint Security Solutions Are Created Equal

As more businesses adopt endpoint security solutions, a clear disconnect has emerged between how they’re marketed and how they truly function.
Jason VitaleJune 28, 2025

Case Study

Manufacturer faces prolonged business interruption following ransomware attack

Manufacturer faces prolonged business interruption following ransomware attack

Case Study

Quick reporting of fraudulent wire transfer leads to $2.1M recovery

Quick reporting of fraudulent wire transfer leads to $2.1M recovery

Case Study

Engineering consulting firm relies on Coalition MDR to help prevent cyber incidents

Engineering consulting firm relies on Coalition MDR to help prevent cyber incidents
Cyber Insurance

Blog

Best Practices to Avoid a Wrongful Collection Event

The legal and regulatory landscape is constantly evolving. We’ll explore how businesses can reduce their exposure to legal action.
Cara Thompson April 03, 2025

Case Study

Municipality exercises caution after EDR alerts on suspicious network activity

Municipality exercises caution after EDR alerts on suspicious network activity

Case Study

Nonprofit reports cryptojacking event after noticing higher utility bills

Nonprofit reports cryptojacking event after noticing higher utility bills
Cyber Insurance

Blog

CrowdStrike Outage: Policyholder Guidance and Insurance Implications

The global outage triggered by CrowdStrike has raised questions about how cyber insurance will respond and whether the industry can insure widespread events.
Joshua MottaJuly 25, 2024
Security

Blog

CrowdStrike Software Update Triggers Global Outage

A software update from cybersecurity vendor CrowdStrike prompted a global computer outage impacting Microsoft Windows operating systems.
Tiago HenriquesJuly 19, 2024
Security

Blog

Remove Polyfill.io to Prevent Malicious Attacks

Researchers published new information about the open-source code Polyfill leading to malicious attacks. Learn more about prevention.
Scott WalshJune 28, 2024

Maximize your

coverage for digital

and technology risks

Protect your business from technology risks with Active Cyber and Tech E&O insurance offered by Coalition.

Tech_E+O_4