Vulnerabilities

Blog
Security Alert: rsync Vulnerability Allows for Remote Code Execution
Coalition proactively notified policyholders about vulnerabilities in the popular rsync (remote sync) file-synchronizing tool.

Blog
Why the Best Security Partner for SMBs Might Be a Cyber Insurance Provider
Small and midsize businesses need a security partner who's invested in their well-being — so why not a cyber insurance provider?

Blog
Expect Everyday Cybercrime to Increase in 2025
Small and midsize businesses must be prepared for everyday cybercrime to increase in 2025, particularly attacks targeting email accounts and endpoints.

Blog
As Zero Days Increase, SMBs Need More Help With Fast-Moving Risks
Coalition’s Zero-Day Alerts give small and midsize businesses a fast and reliable way to stay informed about zero-day vulnerabilities.

Blog
Introducing Coalition Security Copilot
Coalition Security Copilot gives policyholders an AI-driven assistant designed to provide personalized guidance for managing security risks.

Blog
The Mission of a Strategic Cyber Pro
A strategic cyber pro must achieve an appropriate risk posture, plan ahead to minimize damage, and find creative ways to drive business value.

Blog
AI and the Future of Actuarial Science
Traditional models simply can’t keep up with the dynamic cyber risk landscape. We need to retool our approach to actuarial science — and AI can help.

Blog
How MDR Elevates the Role of In-house Security and IT Teams
A managed detection and response (MDR) service is like having your own security operations center but at a more manageable cost.

Blog
From Understaffed Firefighters to Value-Adders: The Changing Role of SMB Cybersecurity Teams
Most SMBs could get more out of their cybersecurity function if the people handling security could get ahead of the daily grind of alerts.

Blog
Alert Fatigue: Tips for Reducing and Prioritizing Cyber Alerts at SMBs
Small businesses are often so inundated with security alerts that they get added to an ever-growing backlog or ignored entirely.

Blog
How Proactive Mitigation Helps SMBs Reduce Cyber Exposure
Businesses may be quick to patch vulnerabilities, but addressing all security alerts and proactively mitigating other cyber exposures is just as important.

Blog
Cybersecurity Burnout Is Crushing Your Effectiveness
When security professionals are drowning in alerts or not getting them at all, the truly harmful cyber threats can slip through the cracks.

Blog
Powered by the Active Data Graph
Coalition’s Active Data Graph unearths the cyber threats that are most likely to result in losses and distills that data into actionable insights.

Blog
Not All Endpoint Security Solutions Are Created Equal
As more businesses adopt endpoint security solutions, a clear disconnect has emerged between how they’re marketed and how they truly function.
