Policyholder Education

Blog
CrowdStrike Outage: Policyholder Guidance and Insurance Implications
The global outage triggered by CrowdStrike has raised questions about how cyber insurance will respond and whether the industry can insure widespread events.

Blog
CrowdStrike Software Update Triggers Global Outage
A software update from cybersecurity vendor CrowdStrike prompted a global computer outage impacting Microsoft Windows operating systems.

Blog
Remove Polyfill.io to Prevent Malicious Attacks
Researchers published new information about the open-source code Polyfill leading to malicious attacks. Learn more about prevention.

Blog
Timely Reporting Can Be the Deciding Factor in Cyber Insurance
The cyber insurance industry must work to normalize the reporting of suspicious activity and encourage businesses to use the resources at their disposal.

Blog
Palo Alto Networks: Patch Available for PAN-OS Zero-day
A patch is now available for a command injection zero-day vulnerability impacting Palo Alto Networks PAN-OS. Learn what actions you need to take.

Blog
Cyber Incident Reporting: Important Questions to Ask for Essential Business Planning
Cyber incident reporting obligations can be complex. Businesses must consider how they will meet the requirements before an incident to expedite the process.

Blog
MFA Bypass Attacks: Weak MFA Implementation Welcomes Intrusion
Threat actors are increasingly targeting multi-factor authentication (MFA). Learn the most effective types of MFA and how to avoid MFA bypass attacks.

Blog
Cyber Threat Index 2024: Scans, Honeypots, and CVEs
The Coalition Cyber Threat Index uses our data derived from internet scans, honeypots, and vulnerabilities to provide in-depth cyber insights for 2024.

Blog
FortiOS SSL VPN Vulnerability Actively Exploited in the Wild
Fortinet disclosed a critical remote code execution (RCE) vulnerability impacting FortiOS SSL VPN. Learn what actions you need to take.

Blog
SonicWall Firewall Devices Vulnerable to DoS Attacks
SonicWall NGFW series 6 and 7 devices are vulnerable to two critical CVEs that can lead to denial-of-service attacks. Learn what steps businesses should take.

Blog
Ivanti VPN Zero-Day Avoided with Device Isolation
Two zero-day vulnerabilities are impacting Ivanti VPN devices. Learn how proactive outreach to Coalition policyholders is helping mitigate the threat.

Blog
Guidance for Hosted End-Of-Life Microsoft IIS 8.5
Microsoft Internet Information Services (IIS) 8.5 went end-of-life (EOL) on October 10, 2023. Learn how to handle hosted IIS 8.5.

Blog
Everything You Always Wanted to Know About Ransomware Negotiation (But Were Afraid to Ask)
Have you ever wondered how ransomware negotiations and payments happen? An Incident Responder breaks down everything from crypto to AI and more.

Blog
How to Mitigate the Risks of Internet-Exposed RDP
Learn the risks of internet-exposed Remote desktop protocol (RDP), steps to provide secure remote access, and what Coalition scan data shows about the risk.
