Security

Blog
‘Bleed’ Trilogy Complete With Newest Memory Leak in Citrix NetScaler
For the third time in as many years, businesses are being urged to patch a “bleed”-style vulnerability in Citrix NetScaler.

Blog
How Geopolitical Tension Can Spotlight Latent Cyber Risks
Coalition security researchers observed distinct changes in cyber scanning behavior originating from Iranian IP addresses that coincided with military activities in the Middle East.

Blog
How Infostealers May Have Opened the Door to the Stryker Wipe
Coalition security researchers examine the recent cyber attack on Stryker and how infostealers can be a most dangerous fuse in business environments.

Blog
Security Alert: Critical Data Exposure in Salesforce Experience Cloud
Coalition has notified policyholders about a widespread campaign targeting misconfigured guest user permissions in Salesforce Experience Cloud sites.

Blog
How Wirespeed Eliminates Guesswork in Detecting Attack Simulations
Wirespeed’s SafeBreach integration enables the positive identification of breach and attack simulations without any additional alert noise.

Blog
Risky Tech Ranking: Q4 2025 Updates
See how Coalition’s Risky Tech Ranking evolved in Q4 2025 with updates on the number of vendors scored, contributing vulnerabilities, Vendor Scores, and more.

Blog
The Patchwork Dilemma: Why the Cycle of Reactive Security Must End
Break the cycle of vendor-introduced risk by demanding better tech accountability and transitioning to modern architectures built for cyber resilience.

Blog
The Incident Responder Wishlist
The experts at Coalition Incident Response (CIR) share their list of strategic shifts that any business can make to enhance its overall security posture.

Blog
When a 10.0 CVSS Hits: Inside the React2Shell Mobilization
How Coalition mobilized to protect policyholders in response to a potentially massive cyber risk aggregation event in React2Shell.

Blog
Patch Immediately: Critical Vulnerability Dubbed 'React2Shell'
Coalition notified policyholders about a new critical vulnerability impacting React and Next.js applications that allows RCE without authentication.

Blog
Risky Tech Ranking: Q3 2025 Updates
See how Coalition’s Risky Tech Ranking evolved in Q3 2025 with updates on the number of vendors scored, contributing vulnerabilities, Vendor Scores, and more.

Blog
Why We Acquired Wirespeed
How Coalition's acquisition of Wirespeed, an industry-leading cybersecurity platform, will enhance its suite of cyber risk management tools.

Blog
Predicting Real-World Exploitation with Coalition ESS
The Coalition Exploit Scoring System provides predictive insights that enhance vulnerability management without replacing human judgment or threat intelligence.

Blog
Nation-State Breach of F5 Creates Widespread Exposure
Coalition notified policyholders about a newly disclosed breach, which prompted government warnings of an imminent threat to all businesses using F5 technology.







