<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=1354242&amp;fmt=gif">

Broker resources

Access to resources tailored to cyber insurance brokers such as appetite guides and product information, cybersecurity reports, and emerging cyber insurance trends from Corvus Insurance.

Search for a resource

Filter by
Request Data:
{}
[ARTICLE] Q3 Ransomware Report: Global Ransomware Attacks Up Over 95% From 2022

Report

Q2 '23 Ransomware Report PDF: Global Attacks At All-Time High

1698105600000
Read Article
Request Data:
{}
[ARTICLE] Cyber and Financial Services: Living with a Target on Your Back

Article

Cyber and Financial Services: Living with a Target on Your Back

1701820800000
Read Article
Request Data:
{}
[ARTICLE] Cyber and Manufacturing: If You Build It, Threat Actors Will Come

Article

Cyber and Manufacturing: If You Build It, Threat Actors Will Come

1705622400000
Read Article
Request Data:
{}
[ARTICLE] Navigating Regulatory Changes: A Look into the NYDFS Cybersecurity Regulation

Article

Navigating Regulatory Changes: A Look into the NYDFS Cybersecurity Regulation

1698883200000
Read Article
Request Data:
{}
[ARTICLE] Three Tactics to Combat Next-Gen Social Engineering Schemes

Article

Three Tactics to Combat Next-Gen Social Engineering Schemes

1700006400000
Read Article
Request Data:
{}
Request Data:
{}
[ARTICLE] Cyber Insurance Defined: Traditionally, and Now

Article

Cyber Insurance Defined: Traditionally, and Now

1667952000000
Read Article
Request Data:
{}
[ARTICLE] What’s Next in Cyber: 3 Trends Cyber Underwriters Are Seeing

Article

What’s Next in Cyber: 3 Trends Cyber Underwriters Are Seeing

1675987200000
Read Article
Request Data:
{}
[ARTICLE] Cyber Coverage Explained: Sub-limits and Coinsurance

Article

Cyber Coverage Explained: Sub-limits and Coinsurance

1643155200000
Read Article
Request Data:
{}
[ARTICLE] 3 Ways Threat Actors Will Kick Off the New Year

Article

3 Ways Threat Actors Will Kick Off the New Year

1702425600000
Read Article
Request Data:
{}
[ARTICLE] Black Basta Ransomware Has Extracted Over $100 Million From its Victims

Article

Black Basta Ransomware Has Extracted Over $100 Million From its Victims

1698883200000
Read Article
Request Data:
{}
[ARTICLE] Another Record-Breaking Month for Ransomware: November Up 110% YoY

Article

Another Record-Breaking Month for Ransomware: November Up 110% YoY

1702857600000
Read Article
Request Data:
{}
[ARTICLE] Cyber and Healthcare: Treating the Rise of Ransomware

Article

Cyber and Healthcare: Treating the Rise of Ransomware

1702944000000
Read Article
Request Data:
{}
[ARTICLE] Key Ransomware Indicator Up 56% Year-on-Year: October Data

Article

Key Ransomware Indicator Up 56% Year-on-Year: October Data

1699833600000
Read Article
Request Data:
{}
[ARTICLE] Generative AI is here. How does it impact cyber insurance?

Article

Generative AI is here. How does it impact cyber insurance?

1687910400000
Read Article
Request Data:
{}
[ARTICLE] The Privacy Problem: A Conversation on Pixel Tracking with Experts from BakerHostetler

Broker Resource

The Privacy Problem: A Conversation on Pixel Tracking with Experts from BakerHostetler

1674604800000
Read Article
Request Data:
{}
[ARTICLE] A Tale of How Business Email Compromise Attacks Work

Case Study

A Tale of How Business Email Compromise Attacks Work

1648598400000
Read Article
Request Data:
{}
[ARTICLE] Data Science Insight: How VPN Vulnerabilities Affect Ransomware Risk

Article

Data Science Insight: How VPN Vulnerabilities Affect Ransomware Risk

1662595200000
Read Article
Request Data:
{}
[ARTICLE] Decrease in Ransomware at the Start of the Russian Invasion of Ukraine

Article

Decrease in Ransomware at the Start of the Russian Invasion of Ukraine

1647907200000
Read Article
Request Data:
{}
[ARTICLE] Common Cyber Insurance Myths, Debunked

Article

Common Cyber Insurance Myths, Debunked

1655337600000
Read Article
Request Data:
{}
[ARTICLE] How Healthcare is Responding to New Guidelines for Pixel Tech

Article

How Healthcare is Responding to New Guidelines for Pixel Tech

1680566400000
Read Article
Request Data:
{}
[ARTICLE] August Ransomware Recap: Sixth Month in a Row with YoY Increase

Article

August Ransomware Recap: Sixth Month in a Row with YoY Increase

1694649600000
Read Article
Request Data:
{}
[ARTICLE] Cyber Risk, IT Tools & Ransomware Trends: Pre-Pandemic to 2021

Article

Cyber Risk, IT Tools & Ransomware Trends: Pre-Pandemic to 2021

1634774400000
Read Article
Request Data:
{}
[ARTICLE] Record Ransomware Attacks: 6-Month Upward Trend Continues in July

Article

Record Ransomware Attacks: 6-Month Upward Trend Continues in July

1691625600000
Read Article
Request Data:
{}
[ARTICLE] While Leaves Fall, Ransomware Rises: Attacks Are Up 5.1% in September

Article

While Leaves Fall, Ransomware Rises: Attacks Are Up 5.1% in September

1697155200000
Read Article
Request Data:
{}
Corvus_Interview_Modern_Cyber_Warfare_with_John_Hultquist

Article

Corvus Interview: Modern Cyber Warfare with John Hultquist

1661904000000
Read Article
Request Data:
{}
[ARTICLE] The Ransomware Handbook: Cybercriminals in the News

Article

The Ransomware Handbook: Cybercriminals in the News

1664323200000
Read Article
Request Data:
{}
[ARTICLE] How Our Policyholders Avoid Vulnerability Patching Paralysis

Article

How Our Policyholders Avoid Vulnerability Patching Paralysis

1690761600000
Read Article
Request Data:
{}
[ARTICLE] Cyber Coverage Explained: Social Engineering Attacks and Cyber Crime

Article

Cyber Coverage Explained: Social Engineering Attacks and Cyber Crime

1638403200000
Read Article
Request Data:
{}
[ARTICLE] Cyber Coverage Explained: Wrongful Collection of Data

Article

Cyber Coverage Explained: Wrongful Collection of Data

1683763200000
Read Article
Request Data:
{}
[ARTICLE] Ransomware Groups Want to Exploit Your File Transfer Software

Article

Ransomware Groups Want to Exploit Your File Transfer Software

1693440000000
Read Article
Request Data:
{}
[ARTICLE] 4 Ways Cyber Brokers Are Embracing Digital Transformation

Article

4 Ways Cyber Brokers Are Embracing Digital Transformation

1663545600000
Read Article
Request Data:
{}
[ARTICLE] Can Cyber Risk Prevention Really Work? Yes, And Here’s How

Article

Can Cyber Risk Prevention Really Work? Yes, And Here’s How

1687305600000
Read Article
Request Data:
{}
[ARTICLE] Cyber Threats: 2022 in Review (& What to Expect from 2023)

Article

Cyber Threats: 2022 in Review (& What to Expect from 2023)

1671494400000
Read Article
Request Data:
{}
[ARTICLE] Cyberwarfare in Ukraine: One Year of Observations

Article

Cyberwarfare in Ukraine: One Year of Observations

1677801600000
Read Article
Request Data:
{}
[ARTICLE] Cyber is insurable, and it’s a watershed moment for our industry

Article

Cyber is insurable, and it’s a watershed moment for our industry

1672963200000
Read Article
Request Data:
{}
[ARTICLE] Corvus Risk Navigator™: How We Supercharge Cyber Underwriters

Article

Corvus Risk Navigator™: How We Supercharge Cyber Underwriters

1675296000000
Read Article
Request Data:
{}
[ARTICLE] Tracking Pixel Technology: Everything You Need To Know

Article

Tracking Pixel Technology: Everything You Need To Know

1670544000000
Read Article
Request Data:
{}
[ARTICLE] Cyber Insurance Coverage & Terminology Guide

Article

Cyber Insurance Coverage & Terminology Guide

1654560000000
Read Article
Request Data:
{}
[ARTICLE] Q2 Ransomware Report: Global Attacks At All-Time High

Article

Q2 '23 Ransomware Report: Global Attacks At All-Time High

1690761600000
Read Article
Request Data:
{}
[ARTICLE] A Chilling Tale of How Data Exfiltration Attacks Happen

Case Study

A Chilling Tale of How Data Exfiltration Attacks Happen

1665532800000
Read Article
Request Data:
{}
[ARTICLE] Modern Warfare & Cyber Risk: Cybercrime, Sanctions Impact & More

Article

Modern Warfare & Cyber Risk: Cybercrime, Sanctions Impact & More

1660176000000
Read Article
Request Data:
{}
[ARTICLE] 5 High-Impact Cybersecurity Practices for Tech Companies

Article

5 High-Impact Cybersecurity Practices for Tech Companies

1694131200000
Read Article
Request Data:
{}
[ARTICLE] Your Survival Guide to the DDoS Resurgence

Article

Your Survival Guide to the DDoS Resurgence

1646697600000
Read Article
Request Data:
{}
[ARTICLE] Mitigating Vendor Risk: Three Steps to Protect Your Organization

Article

Mitigating Vendor Risk: Three Steps to Protect Your Organization

1619654400000
Read Article
Request Data:
{}
[ARTICLE] The ABCs of 3-2-1 Backup Plans

Article

The ABCs of 3-2-1 Backup Plans

1632873600000
Read Article
Request Data:
{}
[REPORT] Corvus Claims Data Infographic - December 2023

Report

Corvus Claims Data Infographic - December 2023

1704067200000
Read Article
Request Data:
{}
[WEBINAR] Cyberattack Prevention Month

Webinar

Cyberattack Prevention Month

1696118400000
Watch Webinar
Request Data:
{}
[REPORT] Corvus Risk Insights Index: Q2 2023 Edition

Report

Corvus Risk Insights Index: Q2 2023 Edition

1682899200000
Read Article
Request Data:
{}
[WEBINAR] When AI and Insurance Collide

Webinar

When AI and Insurance Collide

1680307200000
Watch Webinar
Request Data:
{}
[WEBINAR] Pixels and Ad Tech: Learning the Liabilities and Mitigating Risk

Webinar

Pixels and Ad Tech: Learning the Liabilities and Mitigating Risk

1672531200000
Watch Webinar
Request Data:
{}
[REPORT] Corvus Risk Insights Index: Q4 2022 Edition

Report

Corvus Risk Insights Index: Q4 2022 Edition

1669852800000
Read Article
Request Data:
{}
[ARTICLE] Cyber Coverage Explained: Business Interruption

Article

Cyber Coverage Explained: Business Interruption

1583452800000
Read Article
Request Data:
{}
Request Data:
{}
Cyber_Coverage_Explained_Contingent_Business_Interruption

Article

Cyber Coverage Explained: Contingent Business Interruption

1632787200000
Read Article
Request Data:
{}
[ARTICLE] How We Use AI to Better Understand Tech E&O Risk (Part I of II)

Article

How We Use AI to Better Understand Tech E&O Risk (Part I of II)

1598572800000
Read Article
Request Data:
{}
[ARTICLE] How We Use AI to Better Understand Tech E&O Risk (Part II of II)

Article

How We Use AI to Better Understand Tech E&O Risk (Part II of II)

1599091200000
Read Article
Request Data:
{}
[ARTICLE] Historical Data Won’t Predict Cyber Claims - Here’s What Will

Article

Historical Data Won’t Predict Cyber Claims - Here’s What Will

1553731200000
Read Article
Request Data:
{}
[ARTICLE] Not-quite-CAT: Exploring Aggregate Cyber Risk in SaaS Providers & VPNs

Article

Not-quite-CAT: Exploring Aggregate Cyber Risk in SaaS Providers & VPNs

1672790400000
Read Article
Request Data:
{}
[ARTICLE] Client Breach Response: The Impact of Capital One’s Legal Battle

Article

Client Breach Response: The Impact of Capital One’s Legal Battle

1594598400000
Read Article
Request Data:
{}
[ARTICLE] BYOD: Does A Cyber Insurance Policy Cover Remote Workers?

Article

BYOD: Does A Cyber Insurance Policy Cover Remote Workers?

1585785600000
Read Article
Request Data:
{}
[ARTICLE] How to Prepare for a Cyber Hurricane: 3 Key Takeaways

Article

How to Prepare for a Cyber Hurricane: 3 Key Takeaways

1652918400000
Read Article
Request Data:
{}
[ARTICLE] Corvus Interview: The State of Cyber with Ian Newman

Article

Corvus Interview: The State of Cyber with Ian Newman

1652227200000
Read Article
Request Data:
{}
[ARTICLE] Cybersecurity Strategies for Small- and Medium-Sized Businesses

Article

Cybersecurity Strategies for Small- and Medium-Sized Businesses

1649808000000
Read Article
Request Data:
{}
[ARTICLE] Prioritize Patching with Risk-Based Vulnerability Management

Article

Prioritize Patching with Risk-Based Vulnerability Management

1630281600000
Read Article
Request Data:
{}
[ARTICLE] Microsoft Exchange: Where We Are Now

Article

Microsoft Exchange: Where We Are Now

1616544000000
Read Article
Request Data:
{}
[ARTICLE] Attack Analysis: The Latest on Kaseya and PrintNightmare

Article

Attack Analysis: The Latest on Kaseya and PrintNightmare

1625788800000
Read Article
Request Data:
{}
[ARTICLE] Energy & Utilities Companies: Custom Reports Improve Cyber Hygiene

Article

Energy & Utilities Companies: Custom Reports Improve Cyber Hygiene

1620864000000
Read Article
Request Data:
{}
[ARTICLE] Tech Companies: Beyond Cyber Risk, the Cost of Downstream Impact

Article

Tech Companies: Beyond Cyber Risk, the Cost of Downstream Impact

1637020800000
Read Article
Request Data:
{}
[ARTICLE] Graph Your Dependencies: Facebook Outage Proves 'Simple' Doesn’t Work

Article

Graph Your Dependencies: Facebook Outage Proves 'Simple' Doesn’t Work

1633651200000
Read Article
Request Data:
{}
[ARTICLE] Cyber Insurance Broker Tips: How to Play Offense in a Hard Market

Article

Cyber Insurance Broker Tips: How to Play Offense in a Hard Market

1635465600000
Read Article
Request Data:
{}
[ARTICLE] Cyber Hygiene for Public Utilities: Why to Take Action Now, and How

Article

Cyber Hygiene for Public Utilities: Why to Take Action Now, and How

1613692800000
Read Article
Request Data:
{}
[ARTICLE] Cyber Coverage Explained: PCI Fines and Penalties Coverage

Article

Cyber Coverage Explained: PCI Fines and Penalties Coverage

1661299200000
Read Article
Request Data:
{}
[ARTICLE] Technology: Revolutionizing the Specialty Commercial Insurance Market

Article

Technology: Revolutionizing the Specialty Commercial Insurance Market

1623283200000
Read Article
Request Data:
{}
[ARTICLE] Property Insurance Meets Big Data

Article

Property Insurance Meets Big Data

1609372800000
Read Article
Request Data:
{}
[ARTICLE] Keeping up with Cybercriminals: The Future of Online Threats

Article

Keeping up with Cybercriminals: The Future of Online Threats

1658448000000
Read Article
Request Data:
{}
[ARTICLE] Small Businesses: How to Improve Your Security on a Budget

Article

Small Businesses: How to Improve Your Security on a Budget

1644969600000
Read Article
Request Data:
{}
[CASE STUDY] Palo Alto Networks VPN Vulnerability

Case Study

Palo Alto Networks VPN Vulnerability

1659312000000
Read Article
Request Data:
{}
[PDF DOWNLOAD] Smart Tech E+O® eBrochure

Broker Resource

Smart Tech E+O® eBrochure

1714521600000
Read Article
Request Data:
{}
[ARTICLE] Cyber and Construction: Laying Groundwork to Combat Digital Threats

Article

Cyber and Construction: Laying Groundwork to Combat Digital Threats

1716422400000
Read Article
Request Data:
{}
[ARTICLE] Cyber Insurance for Small Businesses: BOP vs. Standalone Cyber

Article

Cyber Insurance for Small Businesses: BOP vs. Standalone Cyber

1715904000000
Read Article
Request Data:
{}
[ARTICLE] Q1 Ransomware Report: Ransomware Groups Don’t Die, They Multiply

Article

Q1 '24 Ransomware Report: Ransomware Groups Don’t Die, They Multiply

1714435200000
Read Article
Request Data:
{}
[ARTICLE] Change Healthcare Hack: Everything You Need To Know

Article

Change Healthcare Hack: Everything You Need To Know

1711929600000
Read Article
Request Data:
{}
[Article] Law Enforcement Can Help in a Cyber Crisis — But Prevention is Even Better

Article

Law Enforcement Can Help in a Cyber Crisis — But Prevention is Even Better

1710892800000
Read Article
Request Data:
{}
[ARTICLE] What’s Next in Tech E&O: What Corvus Underwriters Are Seeing

Article

What’s Next in Tech E&O: What Corvus Underwriters Are Seeing

1710201600000
Read Article
Request Data:
{}
[ARTICLE] The Crucial First 48 Hours: Navigating Business Continuity and Disaster Recovery

Article

The Crucial First 48 Hours: Navigating Business Continuity and Disaster Recovery

1707955200000
Read Article
Request Data:
{}
[ARTICLE] Keep It Real: Avoid Falling for the Rise of Deepfake Phishing Scams

Article

Keep It Real: Avoid Falling for the Rise of Deepfake Phishing Scams

1707782400000
Read Article
Request Data:
{}
[ARTICLE] Q4 Ransomware Report: 2023 Ends as a Record-Breaking Year

Article

Q4 '23 Ransomware Report: 2023 Ends as a Record-Breaking Year

1706486400000
Read Article
Request Data:
{}
[ARTICLE] How Inside-out Insights Shape Cyber Risk Assessment

Article

How Inside-out Insights Shape Cyber Risk Assessment

1666915200000
Read Article
Request Data:
{}
[ARTICLE] How US Cyber MGAs Impact Policyholders and the Global Cyber Market

Article

How US Cyber MGAs Impact Policyholders and the Global Cyber Market

1651708800000
Read Article
Request Data:
{}
[REPORT] Corvus Risk Insights Index: Q1 2022 Edition

Report

Corvus Risk Insights Index: Q1 2022 Edition

1648771200000
Read Article
Request Data:
{}
[VIDEO] What are DDoS attacks?

Video

What are DDoS attacks?

1709251200000
Watch Video
Request Data:
{}
[VIDEO] What are Resilient Backup Solutions?

Video

What are Resilient Backup Solutions?

1643673600000
Watch Video
Request Data:
{}
[VIDEO] What is Endpoint Detection and Response?

Video

What is Endpoint Detection and Response?

1643673600000
Watch Video
Request Data:
{}
[REPORT] 2021: Corvus Risk Insights Index

Report

2021: Corvus Risk Insights Index

1633046400000
Read Article
Request Data:
{}
[PDF GUIDE] Incident Response Done Right

Guide

Incident Response Done Right

1633046400000
Download PDF
Request Data:
{}
[PDF GUIDE] About Corvus Black: Risk + Response Services

Guide

About Corvus Black: Risk + Response Services

1627776000000
Download PDF
Request Data:
{}
[WEBINAR] How Brokers Can Win in Cyber Insurance Today

Webinar

How Brokers Can Win in Cyber Insurance Today

1659312000000
Watch Webinar
Request Data:
{}
[PDF DOWNLOAD] Sample Smart Tech E+O® Policy

Broker Resource

Sample Smart Tech E+O® Policy

1651363200000
Read Article
Request Data:
{}
Request Data:
{}
[PDF GUIDE] The Ultimate Guide to a Vendor Data Breach Response

Guide

The Ultimate Guide to a Vendor Data Breach Response

1596240000000
Download PDF
Request Data:
{}
[VIDEO] Cyber Coverage: What is Business Interruption?

Video

Cyber Coverage: What is Business Interruption?

1585699200000
Watch Video
Request Data:
{}
[VIDEO] Cyber Coverage: What are First Party Coverages?

Video

Cyber Coverage: What are First Party Coverages?

1585699200000
Watch Video
Request Data:
{}
[WEBINAR] Privacy Best Practices for Tech Companies

Webinar

Privacy Best Practices for Tech Companies

1633046400000
Watch Webinar
Request Data:
{}
[CASE STUDY] Calls from the Wild: Stories of Risk + Response at Corvus

Case Study

Calls from the Wild: Stories of Risk + Response at Corvus

1633046400000
Read Article
Request Data:
{}
[PDF DOWNLOAD] Working with Risk and Response: Policyholder Experience

Broker Resource

Working with Risk and Response: Policyholder Experience

1656633600000
Read Article
Request Data:
{}
[PDF DOWNLOAD] Sample Smart Cyber Insurance® Policy

Broker Resource

Sample Smart Cyber Insurance® Policy

1651363200000
Read Article
Request Data:
{}
[PDF DOWNLOAD] Smart Cyber Insurance® eBrochure

Broker Resource

Smart Cyber Insurance® eBrochure

1651363200000
Read Article
Request Data:
{}
[VIDEO] What is Multi-Factor Authentication?

Video

What is Multi-Factor Authentication?

1643673600000
Watch Video
Request Data:
{}
[PDF GUIDE] Guide to Multi-Factor Authentication

Guide

Guide to Multi-Factor Authentication

1617235200000
Download PDF
Request Data:
{}
[WEBINAR] Mitigating Vendor Risk

Webinar

Mitigating Vendor Risk

1617235200000
Watch Webinar
Request Data:
{}
[PDF GUIDE] The Broker's Guide to Ransomware: 2nd Edition

Guide

The Broker's Guide to Ransomware: 2nd Edition

1614556800000
Download PDF
Request Data:
{}
[PDF DOWNLOAD] Smart Cyber Made for Construction

Broker Resource

Smart Cyber Made for Construction

1711929600000
Read Article
Request Data:
{}
[PDF DOWNLOAD] Smart Cyber Made for Healthcare

Broker Resource

Smart Cyber Made for Healthcare

1696118400000
Read Article
Request Data:
{}
[PDF DOWNLOAD] Smart Cyber Made for Financial Services

Broker Resource

Smart Cyber Made for Financial Services

1696118400000
Read Article
Request Data:
{}
[PDF DOWNLOAD] Smart Cyber Made for Manufacturers

Broker Resource

Smart Cyber Made for Manufacturers

1693526400000
Read Article
Request Data:
{}
[ARTICLE] Handling Cyber Objections: 'Cyber Insurance Is Too Expensive'

Article

Handling Cyber Objections: 'Cyber Insurance Is Too Expensive'

1718668800000
Read Article
Request Data:
{}
[ARTICLE] What is a Telnet vulnerability?

Article

What is a Telnet vulnerability?

1603843200000
Read Article
Request Data:
{}
[ARTICLE] What is an SMB vulnerability?

Article

What is an SMB vulnerability?

1603843200000
Read Article
Request Data:
{}
[ARTICLE] What is a Bluekeep vulnerability?

Article

What is a Bluekeep vulnerability?

1603670400000
Read Article
Request Data:
{}
[ARTICLE] What is RDP and why is it a security concern?

Article

What is RDP and why is it a security concern?

1670803200000
Read Article
Request Data:
{}
[CASE STUDY] Case Study: Unpatched Microsoft Exchange Server Vulnerabilities

Case Study

Case Study: Unpatched Microsoft Exchange Server Vulnerabilities

1639699200000
Read Article
Request Data:
{}
Request Data:
{}
Request Data:
{}
Request Data:
{}
Request Data:
{}
[ARTICLE] A Guide to Mitigating Infostealer Malware

Article

A Guide to Mitigating Infostealer Malware

1685491200000
Read Article
Request Data:
{}
Request Data:
{}
Request Data:
{}
Request Data:
{}
[ARTICLE] How to Respond to a Cyber Incident

Article

How to Respond to a Cyber Incident

1667347200000
Read Article
Request Data:
{}
Request Data:
{}
Request Data:
{}
Request Data:
{}
Request Data:
{}
Request Data:
{}
Request Data:
{}
[ARTICLE] Q4 2023 Cyber Vulnerability Report and Impact

Article

Q4 2023 Cyber Vulnerability Report and Impact

1704067200000
Read Article
Request Data:
{}
[ARTICLE] Q3 2023 Cyber Vulnerability Report and Impact

Article

Q3 2023 Cyber Vulnerability Report and Impact

1696118400000
Read Article
Request Data:
{}
[ARTICLE] Q2 2023 Cyber Vulnerability Report and Impact

Article

Q2 2023 Cyber Vulnerability Report and Impact

1688169600000
Read Article
Request Data:
{}
[ARTICLE] Q1 2023 Cyber Vulnerability Report and Impact

Article

Q1 2023 Cyber Vulnerability Report and Impact

1711929600000
Read Article
Request Data:
{}
Request Data:
{}
Request Data:
{}
Request Data:
{}
[ARTICLE] GitLab Vulnerability Alert | January 2024

Article

GitLab Vulnerability Alert | January 2024

1705017600000
Read Article
Request Data:
{}
[ARTICLE] Ivanti Connect Secure Vulnerability Alert | January 2024

Article

Ivanti Connect Secure Vulnerability Alert | January 2024

1707350400000
Read Article
Request Data:
{}
[ARTICLE] Jenkins Vulnerability Alert | January 2024

Article

Jenkins Vulnerability Alert | January 2024

1706140800000
Read Article
Request Data:
{}
[ARTICLE] GoAnywhere Vulnerability Alert | January 2024

Article

GoAnywhere Vulnerability Alert | January 2024

1705968000000
Read Article
Request Data:
{}
[ARTICLE] Confluence Data Center Vulnerability Alert | January 2024

Article

Confluence Data Center Vulnerability Alert | January 2024

1705363200000
Read Article
Request Data:
{}
[ARTICLE] ScreenConnect Vulnerability | February 2024

Article

ScreenConnect Vulnerability | February 2024

1709078400000
Read Article
Request Data:
{}
[ARTICLE] Fortinet Fortigate Vulnerability Alert | February 2024

Article

Fortinet Fortigate Vulnerability Alert | February 2024

1708041600000
Read Article
Request Data:
{}
[ARTICLE] Palo Alto GlobalProtect Vulnerability | April 2024

Article

Palo Alto GlobalProtect Vulnerability | April 2024

1713312000000
Read Article
Request Data:
{}
[ARTICLE] CDK Global Incident | June 2024

Article

CDK Global Incident | June 2024

1717372800000
Read Article
Request Data:
{}
[PDF] Q1 '24 Ransomware Report PDF

Report

Q1 '24 Ransomware Report PDF: Ransomware Groups Don’t Die, They Multiply

1714435200000
Read Article
Request Data:
{}
[PDF DOWNLOAD] Smart Cyber Insurance® Appetite Guide

Broker Resource

Smart Cyber Insurance® Appetite Guide

1718668800000
Read Article
Request Data:
{}
[PDF DOWNLOAD] Smart Cyber Insurance® Application

Broker Resource

Smart Cyber Insurance® Application

1714089600000
Read Article
Request Data:
{}
[PDF DOWNLOAD] Smart Tech E+O® Application

Broker Resource

Smart Tech E+O® Application

1714089600000
Read Article
Request Data:
{}
[PDF DOWNLOAD] Risk Prevention Services eBrochure

Broker Resource

Risk Prevention Services eBrochure

1721865600000
Read Article
Request Data:
{}
[PDF DOWNLOAD] Retention Reduction Endorsement

Broker Resource

Retention Reduction Endorsement

1721865600000
Read Article
Request Data:
{}
Request Data:
{}
[ARTICLE] Record Ransomware Attacks: June 2023 Highest Month Ever

Article

Record Ransomware Attacks: June 2023 Highest Month Ever

1689811200000
Read Article
Request Data:
{}
[ARTICLE] Rising Tide of Ransomware Attacks: Current and Future Trends

Article

Rising Tide of Ransomware Attacks: Current and Future Trends

1687996800000
Read Article
Request Data:
{}
[ARTICLE] Ransomware Attacks Remain High: May 2023 Continues Increased YoY Trend

Article

Ransomware Attacks Remain High: May 2023 Continues Increased YoY Trend

1686268800000
Read Article
Request Data:
{}
[ARTICLE] Ransomware Update: April 2023 Takes Spot for Third Highest Month

Article

Ransomware Update: April 2023 Takes Spot for Third Highest Month

1684368000000
Read Article
Request Data:
{}
[ARTICLE] Threat Intel from Corvus Insurance

Article

March 2023 Sees 60% Increase in Ransomware Attacks

1681776000000
Read Article
Request Data:
{}
[ARTICLE] Threat Intel from Corvus Insurance

Article

Global IT Meltdown: CrowdStrike Software Update Causes Broad Outages

1723507200000
Read Article
Request Data:
{}
[ARTICLE] Navigating Third-Party Risk: A Key Component for Business Resilience

Article

Navigating Third-Party Risk: A Key Component for Business Resilience

1721606400000
Read Article
Request Data:
{}
[REPORT] Q2 Cyber Threat Report: Ransomware Season Arrives Early

Article

Q2 '24 Cyber Threat Report: Ransomware Season Arrives Early

1724284800000
Read Article
Request Data:
{}
[PDF] Q2 2024 Cyber Threat Report

Report

Q2 '24 Cyber Threat Report PDF: Ransomware Season Arrives Early

1724284800000
Read Article
Request Data:
{}
[WEBINAR] Q2 Cyber Threat Report: Ransomware Season Arrives Early

Webinar

Q2 '24 Cyber Threat Webinar

1725321600000
Watch Webinar
Request Data:
{}
[PDF] Healthcare Claims Scenarios

Broker Resource

Claims Scenarios for the Healthcare Industry

1727222400000
Read Article
Request Data:
{}
[PDF] Manufacturing Claims Scenarios

Broker Resource

Claims Scenarios for the Manufacturing Industry

1727827200000
Read Article
Request Data:
{}
[PDF] Financial Services Claims Scenarios

Broker Resource

Claims Scenarios for the Financial Services Industry

1727913600000
Read Article
Request Data:
{}
[PDF] Construction Claims Scenarios

Broker Resource

Claims Scenarios for the Construction Industry

1728950400000
Read Article
Request Data:
{}
[WEBINAR] Q1 24' Ransomware Findings

Webinar

Q1 24' Ransomware Findings

1714435200000
Watch Webinar
Request Data:
{}
[WEBINAR] Cyber Threats in 2024: What Claims Data Tells Us About the Dark Web

Webinar

Cyber Threats in 2024

1704844800000
Watch Webinar
Request Data:
{}
[CASE STUDY] Wealth Management Firm Avoids $250K Claim

Case Study

Wealth Management Firm Avoids $250K Claim

1731542400000
Read Article
Request Data:
{}
[ARTICLE] Q3 Cyber Threat Report: The Ransomware Ecosystem is Increasingly Distributed

Article

Q3 Cyber Threat Report: The Ransomware Ecosystem is Increasingly Distributed

1732060800000
Read Article
Request Data:
{}
[PDF] Q3 2024 Cyber Threat Report

Report

Q3 Cyber Threat Report PDF: The Ransomware Ecosystem is Increasingly Distributed

1732060800000
Read Article
Request Data:
{}
[WEBINAR] Analyzing Q3 2024 Ransomware Activity

Webinar

Analyzing Q3 2024 Ransomware Activity

1732147200000
Watch Webinar
Request Data:
{}
[ARTICLE] November 2024: A Record-Breaking Month for Ransomware Attacks

Article

November 2024: A Record-Breaking Month for Ransomware Attacks

1733961600000
Read Article
Request Data:
{}
[ARTICLE] Cleo File Transfer Alert | December 2024

Article

Cleo File Transfer Alert | December 2024

1733961600000
Read Article

Broker thought leadership

 
Article

Cyber is insurable, and it’s a watershed moment for our industry

Getting cyber insurance “right” isn’t just a good business opportunity — it’s also a make-or-break moment for the industry.

Read Article
[ARTICLE] Cyber is insurable, and it’s a watershed moment for our industry
Article

Cyber and Financial Services: Living with a Target on Your Back

1701820800000
Read Article
Article

Cyber and Manufacturing: If You Build It, Threat Actors Will Come

1705622400000
Read Article
Article

Navigating Regulatory Changes: A Look into the NYDFS Cybersecurity Regulation

1698883200000
Read Article
Article

Cyber Insurance Defined: Traditionally, and Now

1667952000000
Read Article
Article

What’s Next in Cyber: 3 Trends Cyber Underwriters Are Seeing

1675987200000
Read Article
Article

Cyber Coverage Explained: Sub-limits and Coinsurance

1643155200000
Read Article
Article

Cyber and Healthcare: Treating the Rise of Ransomware

1702944000000
Read Article
Article

Generative AI is here. How does it impact cyber insurance?

1687910400000
Read Article
Article

Common Cyber Insurance Myths, Debunked

1655337600000
Read Article
Article

How Healthcare is Responding to New Guidelines for Pixel Tech

1680566400000
Read Article
Article

Cyber Coverage Explained: Social Engineering Attacks and Cyber Crime

1638403200000
Read Article
Article

Cyber Coverage Explained: Wrongful Collection of Data

1683763200000
Read Article
Article

4 Ways Cyber Brokers Are Embracing Digital Transformation

1663545600000
Read Article
Article

Cyber is insurable, and it’s a watershed moment for our industry

1672963200000
Read Article
Article

Corvus Risk Navigator™: How We Supercharge Cyber Underwriters

1675296000000
Read Article
Article

Cyber Coverage Explained: Business Interruption

1583452800000
Read Article
Article

Cyber Coverage Explained: Contingent Business Interruption

1632787200000
Read Article
Article

How We Use AI to Better Understand Tech E&O Risk (Part I of II)

1598572800000
Read Article
Article

How We Use AI to Better Understand Tech E&O Risk (Part II of II)

1599091200000
Read Article
Article

Historical Data Won’t Predict Cyber Claims - Here’s What Will

1553731200000
Read Article
Article

How to Prepare for a Cyber Hurricane: 3 Key Takeaways

1652918400000
Read Article
Article

Corvus Interview: The State of Cyber with Ian Newman

1652227200000
Read Article
Article

Cyber Insurance Broker Tips: How to Play Offense in a Hard Market

1635465600000
Read Article
Article

Cyber Coverage Explained: PCI Fines and Penalties Coverage

1661299200000
Read Article
Article

Technology: Revolutionizing the Specialty Commercial Insurance Market

1623283200000
Read Article
Article

Property Insurance Meets Big Data

1609372800000
Read Article
Article

Cyber and Construction: Laying Groundwork to Combat Digital Threats

1716422400000
Read Article
Article

Cyber Insurance for Small Businesses: BOP vs. Standalone Cyber

1715904000000
Read Article
Article

What’s Next in Tech E&O: What Corvus Underwriters Are Seeing

1710201600000
Read Article
Article

How US Cyber MGAs Impact Policyholders and the Global Cyber Market

1651708800000
Read Article
Webinar

How Brokers Can Win in Cyber Insurance Today

1659312000000
Watch Webinar
Video

Cyber Coverage: What is Business Interruption?

1585699200000
Watch Video
Video

Cyber Coverage: What are First Party Coverages?

1585699200000
Watch Video

Threat Intel

 
Report

Q2 '23 Ransomware Report PDF: Global Attacks At All-Time High

1698105600000
Read Article
Article

Cyber and Financial Services: Living with a Target on Your Back

1701820800000
Read Article
Article

Cyber and Manufacturing: If You Build It, Threat Actors Will Come

1705622400000
Read Article
Article

Kickstarting Your Security Program: Leveraging NIST CSF Version 1.1

1693353600000
Read Article
Article

Cyber Insurance Defined: Traditionally, and Now

1667952000000
Read Article
Article

What’s Next in Cyber: 3 Trends Cyber Underwriters Are Seeing

1675987200000
Read Article
Article

Cyber Coverage Explained: Sub-limits and Coinsurance

1643155200000
Read Article
Article

3 Ways Threat Actors Will Kick Off the New Year

1702425600000
Read Article
Article

Black Basta Ransomware Has Extracted Over $100 Million From its Victims

1698883200000
Read Article
Article

Another Record-Breaking Month for Ransomware: November Up 110% YoY

1702857600000
Read Article
Article

Cyber and Healthcare: Treating the Rise of Ransomware

1702944000000
Read Article
Article

Key Ransomware Indicator Up 56% Year-on-Year: October Data

1699833600000
Read Article
Article

Decrease in Ransomware at the Start of the Russian Invasion of Ukraine

1647907200000
Read Article
Article

August Ransomware Recap: Sixth Month in a Row with YoY Increase

1694649600000
Read Article
Article

Record Ransomware Attacks: 6-Month Upward Trend Continues in July

1691625600000
Read Article
Article

While Leaves Fall, Ransomware Rises: Attacks Are Up 5.1% in September

1697155200000
Read Article
Article

Corvus Interview: Modern Cyber Warfare with John Hultquist

1661904000000
Read Article
Article

The Ransomware Handbook: Cybercriminals in the News

1664323200000
Read Article
Article

Cyber Threats: 2022 in Review (& What to Expect from 2023)

1671494400000
Read Article
Article

Cyberwarfare in Ukraine: One Year of Observations

1677801600000
Read Article
Article

Q2 '23 Ransomware Report: Global Attacks At All-Time High

1690761600000
Read Article
Article

Modern Warfare & Cyber Risk: Cybercrime, Sanctions Impact & More

1660176000000
Read Article
Report

Corvus Claims Data Infographic - December 2023

1704067200000
Read Article
Report

Corvus Risk Insights Index: Q2 2023 Edition

1682899200000
Read Article
Report

Corvus Risk Insights Index: Q4 2022 Edition

1669852800000
Read Article
Article

Attack Analysis: The Latest on Kaseya and PrintNightmare

1625788800000
Read Article
Case Study

Palo Alto Networks VPN Vulnerability

1659312000000
Download PDF
Article

Q1 '24 Ransomware Report: Ransomware Groups Don’t Die, They Multiply

1714435200000
Read Article
Article

Change Healthcare Hack: Everything You Need To Know

1711929600000
Read Article
Article

Law Enforcement Can Help in a Cyber Crisis — But Prevention is Even Better

1710892800000
Read Article
Article

Q4 '23 Ransomware Report: 2023 Ends as a Record-Breaking Year

1706486400000
Read Article
Report

Corvus Risk Insights Index: Q1 2022 Edition

1648771200000
Read Article
Report

2021: Corvus Risk Insights Index

1633046400000
Read Article
Article

Q4 2023 Cyber Vulnerability Report and Impact

1704067200000
Read Article
Article

Q3 2023 Cyber Vulnerability Report and Impact

1696118400000
Read Article
Article

Q2 2023 Cyber Vulnerability Report and Impact

1688169600000
Read Article
Article

Q1 2023 Cyber Vulnerability Report and Impact

1711929600000
Read Article
Article

GitLab Vulnerability Alert | January 2024

1705017600000
Read Article
Article

Ivanti Connect Secure Vulnerability Alert | January 2024

1707350400000
Read Article
Article

Jenkins Vulnerability Alert | January 2024

1706140800000
Read Article
Article

GoAnywhere Vulnerability Alert | January 2024

1705968000000
Read Article
Article

Confluence Data Center Vulnerability Alert | January 2024

1705363200000
Read Article
Article

ScreenConnect Vulnerability | February 2024

1709078400000
Read Article
Article

Fortinet Fortigate Vulnerability Alert | February 2024

1708041600000
Read Article
Article

Palo Alto GlobalProtect Vulnerability | April 2024

1713312000000
Read Article
Article

CDK Global Incident | June 2024

1717372800000
Read Article
Report

Q1 '24 Ransomware Report PDF: Ransomware Groups Don’t Die, They Multiply

1714435200000
Read Article
Article

Record Ransomware Attacks: June 2023 Highest Month Ever

1689811200000
Read Article
Article

Rising Tide of Ransomware Attacks: Current and Future Trends

1687996800000
Read Article
Article

Ransomware Attacks Remain High: May 2023 Continues Increased YoY Trend

1686268800000
Read Article
Article

Ransomware Update: April 2023 Takes Spot for Third Highest Month

1684368000000
Read Article
Article

March 2023 Sees 60% Increase in Ransomware Attacks

1681776000000
Read Article
Article

Global IT Meltdown: CrowdStrike Software Update Causes Broad Outages

1723507200000
Read Article
Article

Q2 '24 Cyber Threat Report: Ransomware Season Arrives Early

1724284800000
Read Article
Report

Q2 '24 Cyber Threat Report PDF: Ransomware Season Arrives Early

1724284800000
Read Article
Webinar

Q2 '24 Cyber Threat Webinar

1725321600000
Watch Webinar
Webinar

Q1 24' Ransomware Findings

1714435200000
Watch Webinar
Webinar

Cyber Threats in 2024

1704844800000
Watch Webinar
Article

Q3 Cyber Threat Report: The Ransomware Ecosystem is Increasingly Distributed

1732060800000
Read Article
Report

Q3 Cyber Threat Report PDF: The Ransomware Ecosystem is Increasingly Distributed

1732060800000
Read Article
Webinar

Analyzing Q3 2024 Ransomware Activity

1732147200000
Watch Webinar
Article

November 2024: A Record-Breaking Month for Ransomware Attacks

1733961600000
Read Article
Article

Cleo File Transfer Alert | December 2024

1733961600000
Read Article

Cybersecurity & risk insights

 
Article

Cyber and Financial Services: Living with a Target on Your Back

1701820800000
Read Article
Article

Cyber and Manufacturing: If You Build It, Threat Actors Will Come

1705622400000
Read Article
Article

Navigating Regulatory Changes: A Look into the NYDFS Cybersecurity Regulation

1698883200000
Read Article
Article

Three Tactics to Combat Next-Gen Social Engineering Schemes

1700006400000
Read Article
Article

Kickstarting Your Security Program: Leveraging NIST CSF Version 1.1

1693353600000
Read Article
Article

Generative AI is here. How does it impact cyber insurance?

1687910400000
Read Article
Broker Resource

The Privacy Problem: A Conversation on Pixel Tracking with Experts from BakerHostetler

1674604800000
Read Article
Case Study

A Tale of How Business Email Compromise Attacks Work

1648598400000
Download PDF
Article

Data Science Insight: How VPN Vulnerabilities Affect Ransomware Risk

1662595200000
Read Article
Article

Common Cyber Insurance Myths, Debunked

1655337600000
Read Article
Article

How Healthcare is Responding to New Guidelines for Pixel Tech

1680566400000
Read Article
Article

Cyber Risk, IT Tools & Ransomware Trends: Pre-Pandemic to 2021

1634774400000
Read Article
Article

How Our Policyholders Avoid Vulnerability Patching Paralysis

1690761600000
Read Article
Article

Ransomware Groups Want to Exploit Your File Transfer Software

1693440000000
Read Article
Article

Can Cyber Risk Prevention Really Work? Yes, And Here’s How

1687305600000
Read Article
Article

Tracking Pixel Technology: Everything You Need To Know

1670544000000
Read Article
Article

Cyber Insurance Coverage & Terminology Guide

1654560000000
Read Article
Case Study

A Chilling Tale of How Data Exfiltration Attacks Happen

1665532800000
Download PDF
Article

5 High-Impact Cybersecurity Practices for Tech Companies

1694131200000
Read Article
Article

Your Survival Guide to the DDoS Resurgence

1646697600000
Read Article
Article

Mitigating Vendor Risk: Three Steps to Protect Your Organization

1619654400000
Read Article
Article

The ABCs of 3-2-1 Backup Plans

1632873600000
Read Article
Webinar

Cyberattack Prevention Month

1696118400000
Watch Webinar
Webinar

When AI and Insurance Collide

1680307200000
Watch Webinar
Webinar

Pixels and Ad Tech: Learning the Liabilities and Mitigating Risk

1672531200000
Watch Webinar
Article

The 3 Keys to a Successful Cyber Incident Response Strategy

1634256000000
Read Article
Article

How We Use AI to Better Understand Tech E&O Risk (Part I of II)

1598572800000
Read Article
Article

How We Use AI to Better Understand Tech E&O Risk (Part II of II)

1599091200000
Read Article
Article

Not-quite-CAT: Exploring Aggregate Cyber Risk in SaaS Providers & VPNs

1672790400000
Read Article
Article

Client Breach Response: The Impact of Capital One’s Legal Battle

1594598400000
Read Article
Article

BYOD: Does A Cyber Insurance Policy Cover Remote Workers?

1585785600000
Read Article
Article

Cybersecurity Strategies for Small- and Medium-Sized Businesses

1649808000000
Read Article
Article

Prioritize Patching with Risk-Based Vulnerability Management

1630281600000
Read Article
Article

Microsoft Exchange: Where We Are Now

1616544000000
Read Article
Article

Energy & Utilities Companies: Custom Reports Improve Cyber Hygiene

1620864000000
Read Article
Article

Tech Companies: Beyond Cyber Risk, the Cost of Downstream Impact

1637020800000
Read Article
Article

Graph Your Dependencies: Facebook Outage Proves 'Simple' Doesn’t Work

1633651200000
Read Article
Article

Cyber Hygiene for Public Utilities: Why to Take Action Now, and How

1613692800000
Read Article
Article

Keeping up with Cybercriminals: The Future of Online Threats

1658448000000
Read Article
Article

Small Businesses: How to Improve Your Security on a Budget

1644969600000
Read Article
Article

Cyber and Construction: Laying Groundwork to Combat Digital Threats

1716422400000
Read Article
Article

Cyber Insurance for Small Businesses: BOP vs. Standalone Cyber

1715904000000
Read Article
Article

The Crucial First 48 Hours: Navigating Business Continuity and Disaster Recovery

1707955200000
Read Article
Article

Keep It Real: Avoid Falling for the Rise of Deepfake Phishing Scams

1707782400000
Read Article
Article

How Inside-out Insights Shape Cyber Risk Assessment

1666915200000
Read Article
Video

What are DDoS attacks?

1709251200000
Watch Video
Video

What are Resilient Backup Solutions?

1643673600000
Watch Video
Video

What is Endpoint Detection and Response?

1643673600000
Watch Video
Guide

Incident Response Done Right

1633046400000
Download PDF
Guide

Working with Your Cyber Insurer: Incident Response

1633046400000
Download PDF
Guide

The Ultimate Guide to a Vendor Data Breach Response

1596240000000
Download PDF
Webinar

Privacy Best Practices for Tech Companies

1633046400000
Watch Webinar
Case Study

Calls from the Wild: Stories of Risk + Response at Corvus

1633046400000
Download PDF
Video

What is Multi-Factor Authentication?

1643673600000
Watch Video
Guide

Guide to Multi-Factor Authentication

1617235200000
Download PDF
Webinar

Mitigating Vendor Risk

1617235200000
Watch Webinar
Article

Handling Cyber Objections: 'Cyber Insurance Is Too Expensive'

1718668800000
Read Article
Article

What is a Telnet vulnerability?

1603843200000
Read Article
Article

What is an SMB vulnerability?

1603843200000
Read Article
Article

What is a Bluekeep vulnerability?

1603670400000
Read Article
Article

What is RDP and why is it a security concern?

1670803200000
Read Article
Case Study

Case Study: Unpatched Microsoft Exchange Server Vulnerabilities

1639699200000
Download PDF
Article

A Guide to Multi-factor Authentication (MFA)

1713744000000
Read Article
Article

A Guide to Vulnerability Management

1614211200000
Read Article
Article

A Guide to Zero Trust Network Access (ZTNA)

1668556800000
Read Article
Article

How to Take Email Security to the Next Level

1681257600000
Read Article
Article

A Guide to Mitigating Infostealer Malware

1685491200000
Read Article
Article

HTTP Security Headers Best Practices

1636675200000
Read Article
Article

A Guide to Internal Governance, Risk, and Compliance

1614211200000
Read Article
Article

A Guide to Threat Detection

1679443200000
Read Article
Article

How to Respond to a Cyber Incident

1667347200000
Read Article
Article

A Guide to Securing Access Controls

1681257600000
Read Article
Article

A Guide To Securing Email at Your Organization

1667347200000
Read Article
Article

A Guide to MFA Bypass Attacks

1701302400000
Read Article
Article

A Guide to Data Encryption

1679443200000
Read Article
Article

A Guide to Funds Transfer Fraud

1655769600000
Read Article
Article

Best Practices for Securing Vendors

1614211200000
Read Article
Article

A Guide to Security Controls For Cloud-Based Organizations

1681862400000
Read Article
Article

A Guide to Common Vulnerabilities and Exposures (CVEs)

1664323200000
Read Article
Article

A Guide to Endpoint Detection Response (EDR)

1668643200000
Read Article
Article

Navigating Third-Party Risk: A Key Component for Business Resilience

1721606400000
Read Article
[DIAGRAM] CrowBar & PH Dashboard Information from Corvus

CrowBar & PH Dashboard Information

Get step-by-step instructions, and helpful information about our platforms, products, and services

Explore The Knowledge Base
 

 

Your partner in the business of risk

Grow your business with cyber insurance solutions backed by expert guidance, industry-leading intelligence, and intuitive risk management tools.

 

Log in to Broker Platform

[DIAGRAM] Corvus Broker Platform Login