Topic

Cyber Threats

Security Labs

MFA Bypass Attacks: Weak MFA Implementation Welcomes Intrusion

Threat actors are increasingly targeting multi-factor authentication (MFA). Learn the most effective types of MFA and how to avoid MFA bypass attacks.
Security Labs

Cyber Threat Index 2024: Scans, Honeypots, and CVEs 

The Coalition Cyber Threat Index uses our data derived from internet scans, honeypots, and vulnerabilities to provide in-depth cyber insights for 2024.
Security Labs

FortiOS SSL VPN Vulnerability Actively Exploited in the Wild

Fortinet disclosed a critical remote code execution (RCE) vulnerability impacting FortiOS SSL VPN. Learn what actions you need to take.
Security Labs

SonicWall Firewall Devices Vulnerable to DoS Attacks

SonicWall NGFW series 6 and 7 devices are vulnerable to two critical CVEs that can lead to denial-of-service attacks. Learn what steps businesses should take.
Security Labs

Ivanti VPN Zero-Day Avoided with Device Isolation

Two zero-day vulnerabilities are impacting Ivanti VPN devices. Learn how proactive outreach to Coalition policyholders is helping mitigate the threat.
Security Labs

QR Codes Increasingly Used in Phishing Attacks

Threat actors are using QR codes in phishing attacks to gain access to business networks. Learn the risks and how to evaluate a QR code for legitimacy.
Security Labs

Guidance for Hosted End-Of-Life Microsoft IIS 8.5

Microsoft Internet Information Services (IIS) 8.5 went end-of-life (EOL) on October 10, 2023. Learn how to handle hosted IIS 8.5.
Security Labs

Coalition Security Services: More Protection From Cyber Risk

Learn about our expanded security offering, Coalition Security Services, and how it can help protect your business from cyber risks.
Security Labs

From Widespread Damage to Failure to Launch: The Celebrity CVEs of 2023

The number of CVEs has been steadily rising for years. Coalition reflects on the CVEs from 2023 that were the most (and least) impactful.
Security Labs

Everything You Always Wanted to Know About Ransomware Negotiation (But Were Afraid to Ask)

Have you ever wondered how ransomware negotiations and payments happen? An Incident Responder breaks down everything from crypto to AI and more.
Security Labs

How to Mitigate the Risks of Internet-Exposed RDP

Learn the risks of internet-exposed Remote desktop protocol (RDP), steps to provide secure remote access, and what Coalition scan data shows about the risk.
Cyber Insurance

Prioritizing Exposures Gives Clients a Security Advantage

Focusing on the security exposures that are most likely to result in loss allows policyholders to prioritize their time and effort on impactful improvements. 
Security Labs

Security Alert: MFA Spamming Attacks Increase Cyber Claims

MFA fatigue, overwhelming users with constant authentication requests, can lead to cyber insurance claims. Learn what mitigations are available.
Security Labs

Security Alert: What to Know About Threat Actor Volt Typhoon

Microsoft and CISA warned that the Chinese APT Volt Typhoon is targeting critical infrastructure by living off the land. Learn the risks of this technique.
Security Labs

Security Incident Retrospective: The 3CX Supply Chain Attack

Coalition dives deeper into what security leaders need to know about the supply chain attack that impacted 3CX.