Data & Insights

Blog
‘Bleed’ Trilogy Complete With Newest Memory Leak in Citrix NetScaler
For the third time in as many years, businesses are being urged to patch a “bleed”-style vulnerability in Citrix NetScaler.

Blog
How Geopolitical Tension Can Spotlight Latent Cyber Risks
Coalition security researchers observed distinct changes in cyber scanning behavior originating from Iranian IP addresses that coincided with military activities in the Middle East.

Blog
Risky Tech Ranking: Q4 2025 Updates
See how Coalition’s Risky Tech Ranking evolved in Q4 2025 with updates on the number of vendors scored, contributing vulnerabilities, Vendor Scores, and more.

Blog
Bridging the Cyber Insurance Gap Between Brokers and SMEs
Coalition UK research reveals a gap between specialist cyber insurance take-up by SME decision makers and broker impact on outcomes

Blog
Risky Tech Ranking: Q3 2025 Updates
See how Coalition’s Risky Tech Ranking evolved in Q3 2025 with updates on the number of vendors scored, contributing vulnerabilities, Vendor Scores, and more.

Blog
Predicting Real-World Exploitation with Coalition ESS
The Coalition Exploit Scoring System provides predictive insights that enhance vulnerability management without replacing human judgment or threat intelligence.

Blog
Study Finds Small Businesses Underestimate Cyber Risk Reality
Coalition’s new Small Business Cybersecurity Study uncovers small business leaders’ experiences with and perceptions of cyber risk.

Blog
Cyber Threat Index 2025: Deciphering the Ransomware Playbook
The Cyber Threat Index 2025 offers insights and data from Coalition’s insurance claims, scanning engine, global honeypot network, and vulnerability analysis.

Blog
Powered by the Active Data Graph
Coalition’s Active Data Graph unearths the cyber threats that are most likely to result in losses and distills that data into actionable insights.

Blog
The State of Active Insurance: 2024 Cyber Claims Report
Discover the latest trends in ransomware, funds transfer fraud, risky technology, and the state of Active Insurance in Coalition’s 2024 Cyber Claims Report.

Blog
The Double-Edged Sword of Using Boundary Devices
Boundary devices can help mitigate cyber threats and enable secure remote access. However, these technologies are often directly targeted in cyber attacks.

Blog
LockBit Ransomware Used in Exploitation of ConnectWise ScreenConnect
Coalition Incident Response has discovered a link between the LockBit ransomware gang and the ConnectWise ScreenConnect vulnerabilities.

Blog
Cyber Threat Index 2024: Scans, Honeypots, and CVEs
The Coalition Cyber Threat Index uses our data derived from internet scans, honeypots, and vulnerabilities to provide in-depth cyber insights for 2024.

Blog
How Broker Roles Evolve Alongside Claims Trends
Businesses are getting hit harder and more often with cyber attacks — and they’re increasingly turning to their trusted brokers for guidance.











