Security

Blog
Remove Polyfill.io to Prevent Malicious Attacks
Researchers published new information about the open-source code Polyfill leading to malicious attacks. Learn more about prevention.

Blog
Security Alert: What to Know About Threat Actor Volt Typhoon
Microsoft and CISA warned that the Chinese APT Volt Typhoon is targeting critical infrastructure by living off the land. Learn the risks of this technique.

Blog
Empowering MSPs as Trusted Cyber Risk Advisors
IT Nation Connect 2024 was a testament to the collaborative spirit of the managed service provider community and opportunities for deeper relationships.

Blog
The Psychology of Social Engineering
The power of psychology, people, and persuasion is essential to successful social engineering attacks. Greater awareness is the best defense.

Blog
Everything You Always Wanted to Know About Ransomware Negotiation (But Were Afraid to Ask)
Have you ever wondered how ransomware negotiations and payments happen? An Incident Responder breaks down everything from crypto to AI and more.

Blog
As Zero Days Increase, SMBs Need More Help With Fast-Moving Risks
Coalition’s Zero-Day Alerts give small and midsize businesses a fast and reliable way to stay informed about zero-day vulnerabilities.

Blog
Why we love EDR: Better detection and response to malware
As the cybersecurity landscape evolves and attacks become harder to detect, endpoints are left incredibly vulnerable. Find out what EDR solutions we recommend to mitigate the risk.

Blog
How to minimize ransomware attacks with a recovery-in-depth approach
If your organization is ever hit by ransomware, here's how incorporating a recovery-in-depth approach first can help you get back to business with minimal loss.

Blog
Cyber Threat Index 2024: Scans, Honeypots, and CVEsÂ
The Coalition Cyber Threat Index uses our data derived from internet scans, honeypots, and vulnerabilities to provide in-depth cyber insights for 2024.

Blog
Threat Actor Claims 100% Success With SIM-Swapping Extortion
SIM-swapping extortion attacks are on the rise due to self-service password resets, which help threat actors bypass interaction with their victims.

Blog
Infostealers Are Silently Siphoning Businesses’ Sensitive Data
Attackers are increasingly using infostealers to loot private data en masse. Businesses can mitigate these risks with support from Coalition Security.

Blog
Coalition Claims Chronicles: Don’t pick up the phone — it’s HelloKitty ransomware
This series shares real stories from Coalition policyholders. A medical company was hit with a new, more threatening ransomware called HelloKitty. See why it's so dangerous.

Blog
Why We Built the Risky Tech Ranking
The Risky Tech Ranking is designed to help businesses make better-informed purchasing decisions and drive more accountability among technology providers.

Blog
MFA Push Notifications considered harmful?
MFA is a critical security control for creating a defense-in-depth authentication solution, but push notifications may pose a danger via notification fatigue.
