🎉 Exciting news! Coalition has acquired Wirespeed to accelerate cybersecurity for all.
Cyber Incident? Get Help
Topic

Cyber Threats

Security

Blog

Shades of Gray: The Risk of Doing Business with Hackers

Gray hat hackers may appear altruistic, but attitudes can turn quickly when money is involved. How should businesses decide who to trust?
Jessica StainerNovember 24, 2025
Security

Blog

Risky Tech Ranking: Q3 2025 Updates

See how Coalition’s Risky Tech Ranking evolved in Q3 2025 with updates on the number of vendors scored, contributing vulnerabilities, Vendor Scores, and more.
Lucio Fernandez-ArjonaNovember 07, 2025
Security

Blog

Why We Acquired Wirespeed

How Coalition's acquisition of Wirespeed, an industry-leading cybersecurity platform, will enhance its suite of cyber risk management tools.
Sisi LiuNovember 06, 2025
Security

Blog

Predicting Real-World Exploitation with Coalition ESS

The Coalition Exploit Scoring System provides predictive insights that enhance vulnerability management without replacing human judgment or threat intelligence.
Tiago HenriquesOctober 20, 2025
Security

Blog

It’s Time to Say Goodbye to On-Premises Microsoft Exchange

Businesses are urged to migrate away from Microsoft Exchange to a secure cloud or hosted email solution that’s built for the way we work today.
Gregory AndersenOctober 07, 2025
Security

Blog

How Threat Actors Are Outsmarting Your Email Defenses

Coalition Incident Response has seen an uptick in phishing attacks via Microsoft 365’s Direct Send feature. How does that work?
Joshua SmithOctober 01, 2025
Security

Blog

How to Translate Cyber Risk Into Financial Impact

Coalition’s Financial Risk Calculator translates cyber risks into clear financial impact so you can remove the guesswork and make smarter security decisions.
Shubham LalwaniSeptember 29, 2025
Security

Blog

The Endpoint Security Tool You May Already Be Paying For

Rather than buying a new security tool to bolster your cybersecurity posture, see if you’re entitled to endpoint security with your Microsoft business license.
Taylor BryantSeptember 05, 2025
Cyber Insurance

Blog

How Hackers Leverage Insurance Details in Ransomware Attacks

Businesses should secure their cyber insurance policies like any other highly sensitive document to prevent it from becoming a negotiation playbook.
Gregory AndersenAugust 28, 2025
Security

Blog

Citrix NetScaler RCE Vulnerability Exploited in Zero-Day Attacks

Coalition notified policyholders about a critical remote code execution vulnerability in Citrix’s NetScaler products that is already being exploited in the wild.
Joe ToomeyAugust 28, 2025
Security

Blog

Deepfakes Are Making Cyber Scams More Difficult to Detect

While deepfakes introduce a need for increased scrutiny, businesses can combat the rise of AI-enhanced technology with always-on security awareness.
Alok OjhaAugust 13, 2025
Security

Blog

Living Off the Land: How Hackers Exploit Victims’ Own Tools to Execute Attacks

Threat actors are using your operating system’s built-in tools to execute attacks and remain undetected. How can your business fight back?
Devin CanavanAugust 06, 2025
Cyber Insurance

Blog

Australia’s Ransomware Reporting Laws to Clarify True Costs and Impact

New ransomware reporting rules in Australia could set a precedent for how transparency and shared responsibility are prioritised across the cyber ecosystem.
Sezaneh SeymourAugust 01, 2025
Cyber Insurance

Blog

Taking Responsibility in the Age of Non-Stop CVEs

Like other types of insurance, cyber coverage is meant to ease the financial burden of unforeseen events, not to erase accountability altogether.
Gregory AndersenJuly 31, 2025
Cyber Insurance

Blog

UK Government Issues Response to Public Ransomware Consultation

Coalition shares its perspective after the UK government published its official response to the public consultation on ransomware legislation.
Sezaneh SeymourJuly 28, 2025