Phishing

Blog
Ransomware Revealed: Top 4 Technologies Exploited by Threat Actors
Most attackers exploit technologies that are highly common among small and businesses and use the same tactics to get inside a network and deploy ransomware.

Blog
Are Your Weak Passwords Welcoming a Cyber Attack?
Weak passwords can put your business at risk. Learn how to mitigate the threat of compromised credentials and safeguard your data, finances, and reputation.

Blog
The Psychology of Social Engineering
The power of psychology, people, and persuasion is essential to successful social engineering attacks. Greater awareness is the best defense.

Blog
Phishing Scams Will Be Harder to Spot in 2025
Artificial intelligence helps attackers execute sophisticated phishing scams that are personalized, grammatically flawless, and contextually relevant.

Blog
Bolstering Resilience to Avoid Disruption: The Evolving Role of Cyber Insurance
Sezaneh Seymour, Coalition’s VP and Head of Regulatory Risk and Policy, discusses an evolving cyber risk landscape on The Cyber Insider podcast.

Blog
Common Cyber Tax Fraud Schemes (and How to Help Mitigate Them)
During tax season, businesses tend to unknowingly lower their defenses to attackers — and almost all cyber tax fraud starts with a phishing email.

Blog
QR Codes Increasingly Used in Phishing Attacks
Threat actors are using QR codes in phishing attacks to gain access to business networks. Learn the risks and how to evaluate a QR code for legitimacy.

Blog
The Tremendous Opportunity (and Threat) of Artificial Intelligence
When considering the benefits of artificial intelligence, striking the right balance is essential in Coalition's commitment to protecting the unprotected.

Blog
How Coalition Recovered $5.5M After Funds Transfer Fraud
After a Coalition policyholder mistakenly wired money to a fraudulent account, our claims team jumped into action and recovered 85% of the initial loss.








