🎉 Exciting news! Coalition has acquired Wirespeed to accelerate cybersecurity for all.
Cyber Incident? Get Help
Topic

Phishing

Security

Blog

How Threat Actors Are Outsmarting Your Email Defenses

Coalition Incident Response has seen an uptick in phishing attacks via Microsoft 365’s Direct Send feature. How does that work?
Joshua SmithOctober 01, 2025
Security

Blog

Deepfakes Are Making Cyber Scams More Difficult to Detect

While deepfakes introduce a need for increased scrutiny, businesses can combat the rise of AI-enhanced technology with always-on security awareness.
Alok OjhaAugust 13, 2025
Cyber Insurance

Blog

Your Email Account is the Primary Gateway for Cyber Attackers

Business email compromise is one of the most pervasive cyber threats. Learn how to protect your business with security awareness training.
Anne JuntunenJune 11, 2025
Security

Blog

Limiting Employee Access Can Reduce Your Cyber Exposure

Role-based access control can strengthen your security posture by reducing employee error and malicious insiders while addressing compliance requirements.
Meet PatelMay 23, 2025
Security

Blog

Are Your Weak Passwords Welcoming a Cyber Attack?

Weak passwords can put your business at risk. Learn how to mitigate the threat of compromised credentials and safeguard your data, finances, and reputation.
Shubham LalwaniApril 17, 2025
Security

Blog

How MDR Helps Businesses Protect Against Top Cyber Threats

Managed detection and response is an invaluable way for small and midsize businesses to strengthen their cybersecurity posture without an in-house team.
Cory MarchandFebruary 27, 2025
Security

Blog

Phishing Scams Will Be Harder to Spot in 2025

Artificial intelligence helps attackers execute sophisticated phishing scams that are personalized, grammatically flawless, and contextually relevant.
Leeann NicoloDecember 31, 2024
Cyber Insurance

Blog

Common Cyber Tax Fraud Schemes (and How to Help Mitigate Them)

During tax season, businesses tend to unknowingly lower their defenses to attackers — and almost all cyber tax fraud starts with a phishing email.
Gregory AndersenFebruary 20, 2024
Security

Blog

QR Codes Increasingly Used in Phishing Attacks

Threat actors are using QR codes in phishing attacks to gain access to business networks. Learn the risks and how to evaluate a QR code for legitimacy.
Jason VitaleJanuary 11, 2024
Security

Blog

From Blockchain to the Dark Web: Cybersecurity Buzzword Myths Debunked

New tech is worthy of promotion, but when buzzwords and FOMO define purchasing decisions, your cybersecurity program is likely to be a patchwork affair of half-useful tools. 
Aaron KrausJanuary 04, 2024
Security

Blog

Security Alert: MFA Spamming Attacks Increase Cyber Claims

MFA fatigue, overwhelming users with constant authentication requests, can lead to cyber insurance claims. Learn what mitigations are available.
Joshua SmithJune 12, 2023
Cyber Insurance

Blog

How Coalition Recovered $5.5M After Funds Transfer Fraud

After a Coalition policyholder mistakenly wired money to a fraudulent account, our claims team jumped into action and recovered 85% of the initial loss.
Catherine LyleJune 08, 2023