Ransomware demands surged 47% last year. See how businesses fought back.
Skip To Main Content
Cyber Incident? Get Help
Blog homeCyber InsuranceSecurityExecutive RisksBroker EducationLife at Coalition

July Risk Roundup: Cybersecurity shiny objects — don’t overlook the basics

Person > Aaron Kraus
Aaron KrausJuly 09, 2021
Share:
Featured Image for July Risk Roundup: Cybersecurity shiny objects — don’t overlook the basics

A healthy dose of skepticism is never a bad idea in cybersecurity. People will try to take advantage of chaotic situations, bad ideas will be expressed when people have ulterior motives, and sometimes a flashy headline is designed to sell you ads rather than give you useful information.

1. Fake Kaseya VSA security update backdoors networks with Cobalt Strike

Attacker’s creed: never let a good disaster go to waste. The lesson for defenders? Chaotic conditions demand extra vigilance – when things go wrong, it’s helpful to have defined procedures and team members trained via exercises/drills to respond.

 Fake Kaseya VSA security update backdoors networks with Cobalt Strike

View tweet here

2. RSA sponsored content issues

Kudos to RSA for (retroactively) policing their sponsored content and dunking on the “blame the interns” meme. But how did an article about blockchain fixing TCP/IP security issues that didn’t demonstrate a solution at all make it through editorial reviews?

RSA sponsored content issues

View tweet here

3. Headline-driven threat landscape

Media sensationalism is nothing new, and the problem is worse in tech and infosec due to unfamiliar vocabulary. It takes time and effort to contextualize cyber risk, so both infosec and business leaders need to allocate that time rather than following clickbait headlines.

 Headline-driven threat landscape

View tweet here

If you enjoyed this post be sure to check our blog weekly; the Risk Roundup runs Friday mornings in addition to more enlightening content we post related to the ever-evolving landscape of digital risk. Follow us on Twitter (@SolveCyberRisk) and LinkedIn (Coalition Inc). If you have any suggestions for content that we should be adding to our reading list, let us know!

Tags:

Cyber Threats

Related blog posts

See all articles
Security

Blog

How Geopolitical
Tension Can Spotlight
Latent Cyber Risks

Coalition security researchers observed distinct changes in cyber scanning behavior originating from Iranian IP addresses that coincided with military activities in the Middle East.
Scott WalshMarch 13, 2026
Security

Blog

How Infostealers May Have Opened the Door to the Stryker Wipe

Coalition security researchers examine the recent cyber attack on Stryker and how infostealers can be a most dangerous fuse in business environments.
Joe ToomeyMarch 12, 2026
Security

Blog

Security Alert: Critical Data Exposure in Salesforce Experience Cloud

Coalition has notified policyholders about a widespread campaign targeting misconfigured guest user permissions in Salesforce Experience Cloud sites.
Scott WalshMarch 11, 2026