🎉 Exciting news! Coalition has acquired Wirespeed to accelerate cybersecurity for all.
Cyber Incident? Get Help
Topic

Vulnerabilities

Security

Blog

Risky Tech Ranking: Q3 2025 Updates

See how Coalition’s Risky Tech Ranking evolved in Q3 2025 with updates on the number of vendors scored, contributing vulnerabilities, Vendor Scores, and more.
Lucio Fernandez-ArjonaNovember 07, 2025
Security

Blog

Why We Acquired Wirespeed

How Coalition's acquisition of Wirespeed, an industry-leading cybersecurity platform, will enhance its suite of cyber risk management tools.
Sisi LiuNovember 06, 2025
Security

Blog

Predicting Real-World Exploitation with Coalition ESS

The Coalition Exploit Scoring System provides predictive insights that enhance vulnerability management without replacing human judgment or threat intelligence.
Tiago HenriquesOctober 20, 2025
Security

Blog

It’s Time to Say Goodbye to On-Premises Microsoft Exchange

Businesses are urged to migrate away from Microsoft Exchange to a secure cloud or hosted email solution that’s built for the way we work today.
Gregory AndersenOctober 07, 2025
Security

Blog

Citrix NetScaler RCE Vulnerability Exploited in Zero-Day Attacks

Coalition notified policyholders about a critical remote code execution vulnerability in Citrix’s NetScaler products that is already being exploited in the wild.
Joe ToomeyAugust 28, 2025
Cyber Insurance

Blog

Taking Responsibility in the Age of Non-Stop CVEs

Like other types of insurance, cyber coverage is meant to ease the financial burden of unforeseen events, not to erase accountability altogether.
Gregory AndersenJuly 31, 2025
Cyber Insurance

Blog

UK Government Issues Response to Public Ransomware Consultation

Coalition shares its perspective after the UK government published its official response to the public consultation on ransomware legislation.
Sezaneh SeymourJuly 28, 2025
Security

Blog

Not All Endpoint Security Solutions Are Created Equal

As more businesses adopt endpoint security solutions, a clear disconnect has emerged between how they’re marketed and how they truly function.
Jason VitaleJune 28, 2025
Security

Blog

Fortinet SSL VPN Decision Presents New Risks

Fortinet’s decision to end support for its SSL VPN technology is creating new challenges for businesses that depend on the remote access technology.
Ryan GregoryMay 19, 2025
Security

Blog

Introducing Coalition Security Copilot

Coalition Security Copilot gives policyholders an AI-driven assistant designed to provide personalized guidance for managing security risks.
Meet PatelNovember 18, 2024
Security

Blog

How MDR Elevates the Role of In-house Security and IT Teams

A managed detection and response (MDR) service is like having your own security operations center but at a more manageable cost.
Jamie McGrorySeptember 10, 2024
Security

Blog

XZ Near Miss Sheds Light on Vulnerability, Patching Issues

The recent XZ Utils backdoor uncovered the potential risks associated with vulnerabilities in open-source systems.
Scott WalshJune 04, 2024
Cyber Insurance

Blog

The Double-Edged Sword of Using Boundary Devices

Boundary devices can help mitigate cyber threats and enable secure remote access. However, these technologies are often directly targeted in cyber attacks.
Gregory AndersenApril 18, 2024
Security

Blog

Palo Alto Networks: Patch Available for PAN-OS Zero-day

A patch is now available for a command injection zero-day vulnerability impacting Palo Alto Networks PAN-OS. Learn what actions you need to take.
Simon BellApril 15, 2024
Security

Blog

Cyber Threat Index 2024: Scans, Honeypots, and CVEs 

The Coalition Cyber Threat Index uses our data derived from internet scans, honeypots, and vulnerabilities to provide in-depth cyber insights for 2024.
Tiago HenriquesFebruary 21, 2024