Why We Built the Risky Tech Ranking

Technology vendors releasing insecure products has become all too common in the IT industry. This practice appears to be tolerated because security patches can be applied to fix known vulnerabilities.
However, under-resourced businesses often struggle to apply crucial patches in a timely fashion. With every new patch, IT teams must dedicate valuable resources to ensure the update won't disrupt core business systems — and this effort is multiplied by the thousands of vulnerabilities that are published each month.
Even defenders who keep up with the relentless patch management cycle can be compromised by zero-day vulnerabilities. This helps to explain why software vulnerabilities are a leading cause of ransomware incidents.
Based on Coalition’s* view of the risk landscape, the lack of accountability from select technology providers magnifies this problem. We can tell when vendors release products to market without adequate testing, leaving businesses unknowingly exposed to vulnerabilities. And even after flaws are discovered, vendors can still delay issuing patches or downplay the severity of the issue, potentially leaving businesses to bear the brunt of a cyber attack.
Coalition’s commitment to protecting the unprotected is what inspired the Risky Tech Ranking, a list of technology providers whose products were vulnerable to exploitation by threat actors. The ranking is designed not only to serve as an educational tool for businesses when making purchasing decisions, but also to push vendors to make their popular technologies more secure.
Coalition’s unique view of cyber risk
As a cyber insurance provider, Coalition** frequently encounters technology products and services that fail to adequately safeguard businesses. We also have an unparalleled view of the cyber threat landscape through our Active Data Graph, a purpose-built data collection and analysis engine that allows us to unearth the newest and most pressing cyber threats and determine which threats are most likely to result in losses.
The Risky Tech Ranking is designed not only to serve as an educational tool for businesses when making purchasing decisions, but also to push vendors to make their popular technologies more secure.
We’ve already used these insights to create the Coalition Exploit Scoring System (Coalition ESS), a generative AI-based risk scoring system that helps risk managers and security professionals cut through the noise surrounding new vulnerabilities.
Now, we’re applying Coalition ESS to the Risky Tech Ranking to help businesses make better-informed decisions about the technologies they adopt.
How the Risky Tech Ranking works
The Risky Tech Ranking applies publicly available data to a methodology formulated by Coalition. You can read our full methodology, but here’s how it generally works:
We determine the number of vulnerabilities impacting a vendor’s products
We weight vulnerabilities using Coalition ESS
We assign a Vendor Score to each vendor, calculated by multiplying the number of vulnerabilities impacting a vendor's products by the average Coalition ESS score
Simply counting published vulnerabilities per vendor would be misleading, as not all vulnerabilities are alike:
A vulnerability discovered via a bug bounty program creates less risk than one discovered being exploited as a zero day in the wild.
A vulnerability that allows a remote attacker to gain full control over the device presents more risk than a vulnerability that can only be exploited by plugging a USB stick into the device.
A vulnerability affecting a smart fridge used by 100 customers is less risky than a vulnerability in the world’s most popular web server.
Coalition ESS accounts for these factors by assigning a higher weighting to vulnerabilities that are more likely to be exploited. The end result is a list of the top 100 vendors whose products were vulnerable to exploitation by threat actors. See the full list for Q1 2025.
The Risky Tech Ranking is updated on a quarterly basis throughout the calendar year and tracks changes over time to both average Vendor Score and contributing vulnerabilities.
Transparency around the risks associated with specific vendors and their technologies empowers businesses to make better-informed choices about the tools and services they adopt.
Our goals for the Risky Tech Ranking
When products are impacted by vulnerabilities, threat actors can exploit these weaknesses to launch damaging ransomware attacks or gain access to sensitive data.
For small and midsize businesses (SMBs), the stakes are even higher. With fewer resources and limited cybersecurity expertise, they often assume that their technology providers are delivering sound products that can be trusted. Transparency around the risks associated with specific vendors and their technologies empowers businesses to make better-informed choices.
Coalition remains committed to the goal of mitigating cybersecurity threats. By building the Risky Tech Ranking, we’re providing businesses with greater peace of mind and contributing to a safer digital environment for everyone.