Cyber Incident? Get Help
Topic

Cyber Threats

Security Labs

MFA Bypass Attacks: Weak MFA Implementation Welcomes Intrusion

Threat actors are increasingly targeting multi-factor authentication (MFA). Learn the most effective types of MFA and how to avoid MFA bypass attacks.
Security Labs

Cyber Threat Index 2024: Scans, Honeypots, and CVEs 

The Coalition Cyber Threat Index uses our data derived from internet scans, honeypots, and vulnerabilities to provide in-depth cyber insights for 2024.
Security Labs

FortiOS SSL VPN Vulnerability Actively Exploited in the Wild

Fortinet disclosed a critical remote code execution (RCE) vulnerability impacting FortiOS SSL VPN. Learn what actions you need to take.
Security Labs

SonicWall Firewall Devices Vulnerable to DoS Attacks

SonicWall NGFW series 6 and 7 devices are vulnerable to two critical CVEs that can lead to denial-of-service attacks. Learn what steps businesses should take.
Security Labs

Ivanti VPN Zero-Day Avoided with Device Isolation

Two zero-day vulnerabilities are impacting Ivanti VPN devices. Learn how proactive outreach to Coalition policyholders is helping mitigate the threat.
Security Labs

QR Codes Increasingly Used in Phishing Attacks

Threat actors are using QR codes in phishing attacks to gain access to business networks. Learn the risks and how to evaluate a QR code for legitimacy.
Security Labs

Guidance for Hosted End-Of-Life Microsoft IIS 8.5

Microsoft Internet Information Services (IIS) 8.5 went end-of-life (EOL) on October 10, 2023. Learn how to handle hosted IIS 8.5.
Security Labs

Coalition Security Services: More Protection From Cyber Risk

Learn about our expanded security offering, Coalition Security Services, and how it can help protect your business from cyber risks.
Security Labs

From Widespread Damage to Failure to Launch: The Celebrity CVEs of 2023

The number of CVEs has been steadily rising for years. Coalition reflects on the CVEs from 2023 that were the most (and least) impactful.
Security Labs

Everything You Always Wanted to Know About Ransomware Negotiation (But Were Afraid to Ask)

Have you ever wondered how ransomware negotiations and payments happen? An Incident Responder breaks down everything from crypto to AI and more.
Security Labs

How to Mitigate the Risks of Internet-Exposed RDP

Learn the risks of internet-exposed Remote desktop protocol (RDP), steps to provide secure remote access, and what Coalition scan data shows about the risk.
Security Labs

SysAid Zero-Day Exploited to Deploy Ransomware

A vulnerability targeting SysAid On-Prem allows threat actors to deploy ransomware. Learn how Coalition Security Labs is responding.
Cyber Insurance

How Our Security Support Center Helps Clients Resolve Alerts

Learn how our Security Support Center helps policyholders understand and resolve alerts and critical security findings to avoid cyber insurance claims.
Cyber Insurance

Prioritizing Exposures Gives Clients a Security Advantage

Focusing on the security exposures that are most likely to result in loss allows policyholders to prioritize their time and effort on impactful improvements. 
Security Labs

Research Redux: Examining the Cost of Cybercrime

Research Redux explores academic insights on measuring and mitigating cyber risk, reviewing the cost of cybercrime and its evolving trends.