Policyholder Education
![](/https/www.coalitioninc.com/_next/image?url=https%3A%2F%2Frp.liu233w.com%3A443%2Fhttps%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F5L7Eb511qyHZ5EiQ6nAnTw%2F082932188551f5c36810999a1f655c23%2FBlog_Crowdstrike-Outage_alt.jpg&w=3840&q=75)
CrowdStrike Outage: Policyholder Guidance and Insurance Implications
The global outage triggered by CrowdStrike has raised questions about how cyber insurance will respond and whether the industry can insure widespread events.
![](/https/www.coalitioninc.com/_next/image?url=https%3A%2F%2Frp.liu233w.com%3A443%2Fhttps%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F2RPDCkjbUVUmLV8DmlFhU3%2Fbf04ce9dbddbc95de92205c728b2ffdd%2FCrowdstrike_Security_Alert_-July_19_2024.png&w=3840&q=75)
CrowdStrike Software Update Triggers Global Outage
A software update from cybersecurity vendor CrowdStrike prompted a global computer outage impacting Microsoft Windows operating systems.
![](/https/www.coalitioninc.com/_next/image?url=https%3A%2F%2Frp.liu233w.com%3A443%2Fhttps%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F5Qgub2nW9RTvxMmGEP7NIE%2Fcec58d4ad8ef9e6446b433c19eaae7dd%2Flarge-Security_Alert_Polyfill.io_Security-Labs.png&w=3840&q=75)
Remove Polyfill.io to Prevent Malicious Attacks
Researchers published new information about the open-source code Polyfill leading to malicious attacks. Learn more about prevention.
![](/https/www.coalitioninc.com/_next/image?url=https%3A%2F%2Frp.liu233w.com%3A443%2Fhttps%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F2q0NLVHJ4byIG3tqWezuQi%2F8751734c3bc316ac91e2a87076cf430a%2FBlog_Timely-Reporting.png&w=3840&q=75)
Timely Reporting Can Be the Deciding Factor in Cyber Insurance
The cyber insurance industry must work to normalize the reporting of suspicious activity and encourage businesses to use the resources at their disposal.
![](/https/www.coalitioninc.com/_next/image?url=https%3A%2F%2Frp.liu233w.com%3A443%2Fhttps%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2FafwxWzlT1WZdS6wJwqPcB%2F7c18fc0bcc96d43f353f0d9735421db0%2FSecurity_Alert_Palo_Alto_Networks_April_15.png&w=3840&q=75)
Palo Alto Networks: Patch Available for PAN-OS Zero-day
A patch is now available for a command injection zero-day vulnerability impacting Palo Alto Networks PAN-OS. Learn what actions you need to take.
![](/https/www.coalitioninc.com/_next/image?url=https%3A%2F%2Frp.liu233w.com%3A443%2Fhttps%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F3M0bsgMw6yBymSKCJqPDvu%2Fe01f07384817b68db54aed7f2b61362e%2FCoalition_Blog-Ready_to_Report.jpg&w=3840&q=75)
Cyber Incident Reporting: Important Questions to Ask for Essential Business Planning
Cyber incident reporting obligations can be complex. Businesses must consider how they will meet the requirements before an incident to expedite the process.
![](/https/www.coalitioninc.com/_next/image?url=https%3A%2F%2Frp.liu233w.com%3A443%2Fhttps%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F6Jtn9quHut38ZFfWK53l3W%2Fba33f5f186006e31e9e052c0c22a420b%2FMFA_Bypass_Blog_Security-Labs.jpg&w=3840&q=75)
MFA Bypass Attacks: Weak MFA Implementation Welcomes Intrusion
Threat actors are increasingly targeting multi-factor authentication (MFA). Learn the most effective types of MFA and how to avoid MFA bypass attacks.
![](/https/www.coalitioninc.com/_next/image?url=https%3A%2F%2Frp.liu233w.com%3A443%2Fhttps%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F18LBE92ZZHGYQuI9FrZNjk%2Fd885d389d333afcc0429fb968bae9dfd%2FBlog_CTI__1_.png&w=3840&q=75)
Cyber Threat Index 2024: Scans, Honeypots, and CVEs
The Coalition Cyber Threat Index uses our data derived from internet scans, honeypots, and vulnerabilities to provide in-depth cyber insights for 2024.
![](/https/www.coalitioninc.com/_next/image?url=https%3A%2F%2Frp.liu233w.com%3A443%2Fhttps%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F34DsPig9zWLd4BvYzhs5WJ%2F1da103e0b18eac9b657e4f09765fc205%2FFortinet_Security_Alert_-_Feb_12_Security-Labs.png&w=3840&q=75)
FortiOS SSL VPN Vulnerability Actively Exploited in the Wild
Fortinet disclosed a critical remote code execution (RCE) vulnerability impacting FortiOS SSL VPN. Learn what actions you need to take.
![](/https/www.coalitioninc.com/_next/image?url=https%3A%2F%2Frp.liu233w.com%3A443%2Fhttps%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F1mgP1Liu4sXuXY8lB1Hg50%2Fe9509784593b3f6b666c703b8960625e%2FSONICWALL_NGFW_Security_Alert_Security-Labs.png&w=3840&q=75)
SonicWall Firewall Devices Vulnerable to DoS Attacks
SonicWall NGFW series 6 and 7 devices are vulnerable to two critical CVEs that can lead to denial-of-service attacks. Learn what steps businesses should take.
![](/https/www.coalitioninc.com/_next/image?url=https%3A%2F%2Frp.liu233w.com%3A443%2Fhttps%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F3thnbLPfhIsoVPH5uFuQIe%2Fbb97a89f49b374f34aec31a57f3fb223%2FIvanti_Security_Alert_Security-Labs__1_.png&w=3840&q=75)
Ivanti VPN Zero-Day Avoided with Device Isolation
Two zero-day vulnerabilities are impacting Ivanti VPN devices. Learn how proactive outreach to Coalition policyholders is helping mitigate the threat.
![](/https/www.coalitioninc.com/_next/image?url=https%3A%2F%2Frp.liu233w.com%3A443%2Fhttps%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F7Bz4XbchC87xy2xRJo51CS%2F1ccc06e0fa794b19dae94a1d4a0f8b72%2FSecurity_Alert__Guidance_for_End-of-Life_Microsoft_IIS_8.5__1_.png&w=3840&q=75)
Guidance for Hosted End-Of-Life Microsoft IIS 8.5
Microsoft Internet Information Services (IIS) 8.5 went end-of-life (EOL) on October 10, 2023. Learn how to handle hosted IIS 8.5.
![](/https/www.coalitioninc.com/_next/image?url=https%3A%2F%2Frp.liu233w.com%3A443%2Fhttps%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2FYLKwZ7oz8nrJwGLLDdi5g%2F334bf1518be2ccbd24ce2e458e8a5c95%2FBlog_SecLabs-Ransomware_Negotiation.jpg&w=3840&q=75)
Everything You Always Wanted to Know About Ransomware Negotiation (But Were Afraid to Ask)
Have you ever wondered how ransomware negotiations and payments happen? An Incident Responder breaks down everything from crypto to AI and more.
![](/https/www.coalitioninc.com/_next/image?url=https%3A%2F%2Frp.liu233w.com%3A443%2Fhttps%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F2l9OLuEpGg8CrVC2EFiJdU%2F2d1fe62c0fe0346a124ba72795699b81%2FBlog_SecLabs_RDP.jpg&w=3840&q=75)
How to Mitigate the Risks of Internet-Exposed RDP
Learn the risks of internet-exposed Remote desktop protocol (RDP), steps to provide secure remote access, and what Coalition scan data shows about the risk.
![](/https/www.coalitioninc.com/_next/image?url=https%3A%2F%2Frp.liu233w.com%3A443%2Fhttps%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2FmAuRrr2a8hKdYYrSwFPZm%2F27f6c2747a487f7f5b21c49f969ae63f%2FSecurity_Alert_-_SysAid_-_11.9.2023.png&w=3840&q=75)