Brokers are still buzzing about Activate NYC!
Skip To Main Content
Cyber Incident? Get Help

Featured resources

Cyber Knowledge Center

Build your cyber expertise, access exclusive insights, read real customer stories, and more.

Knowledge Center Tile > [Video, Webinar]

GUIDE

Cyber Insurance Buyer's Guide

Know what to look for when selecting a cyber policy.

Knowledge Center Tile > [Video, Webinar]

GUIDE

Coalition MDR Buyer's
Guide

Make sure you're asking the right questions when evaluating managed detection and response.

Knowledge Center Tile > [Report, Blog, Page, (Security Labs Only)]

PAGE

Future of Cyber Insurance

Get a look at what's next in cyber risk — and what you can do about all of it today.

Hero Featured-Card

REPORT

2026 Cyber Claims Report

An in-depth look at cyber claims data and the state of Active Insurance

Knowledge Center Tile > [Video, Webinar]

GUIDE

Cyber Insurance Buyer's Guide

Know what to look for when selecting a cyber policy.

Knowledge Center Tile > [Video, Webinar]

GUIDE

Coalition MDR Buyer's
Guide

Make sure you're asking the right questions when evaluating managed detection and response.

Knowledge Center Tile > [Report, Blog, Page, (Security Labs Only)]

PAGE

Future of Cyber Insurance

Get a look at what's next in cyber risk — and what you can do about all of it today.

Hero Featured-Card

REPORT

2026 Cyber Claims Report

An in-depth look at cyber claims data and the state of Active Insurance

Knowledge Center Tile > [Video, Webinar]

GUIDE

Cyber Insurance Buyer's Guide

Know what to look for when selecting a cyber policy.

Knowledge Center Tile > [Video, Webinar]

GUIDE

Coalition MDR Buyer's
Guide

Make sure you're asking the right questions when evaluating managed detection and response.

Knowledge Center Tile > [Report, Blog, Page, (Security Labs Only)]

PAGE

Future of Cyber Insurance

Get a look at what's next in cyber risk — and what you can do about all of it today.

Hero Featured-Card

REPORT

2026 Cyber Claims Report

An in-depth look at cyber claims data and the state of Active Insurance

Home Incident TypesIndustriesProducts & ServicesTopics

Incident Types

Incident Types

Other

Case Study

Former healthcare contractor steals devices and disrupts operations following termination

Former healthcare contractor steals devices and disrupts operations following termination

Case Study

SaaS company avoids social engineering scheme related to bug bounty program

SaaS company avoids social engineering scheme related to bug bounty program

Case Study

Threat actors collect fraudulent tax refunds after theft from accounting firm

Threat actors collect fraudulent tax refunds after theft from accounting firm

Case Study

School leverages breach response coverage to investigate potential data breach by former employee

School leverages breach response coverage to investigate potential data breach by former employee

Case Study

Coffee company recoups lost revenue after DDoS attack on busy holiday weekend

Coffee company recoups lost revenue after DDoS attack on busy holiday weekend

Case Study

Manufacturer faces prolonged business interruption following ransomware attack

Manufacturer faces prolonged business interruption following ransomware attack

Case Study

Quick reporting of fraudulent wire transfer leads to $2.1M recovery

Quick reporting of fraudulent wire transfer leads to $2.1M recovery

Case Study

Engineering consulting firm relies on Coalition MDR to help prevent cyber incidents

Engineering consulting firm relies on Coalition MDR to help prevent cyber incidents

Case Study

Municipality exercises caution after EDR alerts on suspicious network activity

Municipality exercises caution after EDR alerts on suspicious network activity

Case Study

Nonprofit reports cryptojacking event after noticing higher utility bills

Nonprofit reports cryptojacking event after noticing higher utility bills
Cyber Insurance

Blog

CrowdStrike Outage: Policyholder Guidance and Insurance Implications

The global outage triggered by CrowdStrike has raised questions about how cyber insurance will respond and whether the industry can insure widespread events.
Joshua MottaJuly 25, 2024
Security

Blog

Remove Polyfill.io to Prevent Malicious Attacks

Researchers published new information about the open-source code Polyfill leading to malicious attacks. Learn more about prevention.
Scott WalshJune 28, 2024
Cyber Insurance

Blog

Familiar Threat Actor Attack Tactics Find New Life

Changes in technology are prompting threat actors to revive old attack methods that may seem ordinary on the surface but still lead to cyber insurance claims.
Gregory AndersenJune 27, 2024
Security

Blog

SEO Poisoning Attacks Demand More Scrutiny from Search Engine Users

Threat actors are capitalizing on the trust we put in search engines by hiding malicious websites in plain sight using a tactic known as SEO poisoning.
Alexander AmmonsJune 20, 2024
Security

Blog

Threat Actor Claims 100% Success With SIM-Swapping Extortion

SIM-swapping extortion attacks are on the rise due to self-service password resets, which help threat actors bypass interaction with their victims.
Shelley MaJune 17, 2024

Maximize your

coverage for digital

and technology risks

Protect your business from technology risks with Active Cyber and Tech E&O insurance offered by Coalition.

Tech_E+O_4