<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=1354242&amp;fmt=gif">

Policyholder resources

Access to resources tailored towards cyber insurance policyholders such as cybersecurity best practices, emerging cybersecurity threats, and cyber insurance trends from Corvus Insurance.

 
Article

Cyber Insurance Coverage & Terminology Guide

Getting cyber insurance “right” isn’t just a good business opportunity — it’s also a make-or-break moment for the industry.

Read Article
[ARTICLE] Cyber is insurable, and it’s a watershed moment for our industry

Search for a resource

Filter by
Request Data:
{}
[ARTICLE] Q3 Ransomware Report: Global Ransomware Attacks Up Over 95% From 2022

Report

Q2 '23 Ransomware Report PDF: Global Attacks At All-Time High

1698105600000
Read Article
Request Data:
{}
[ARTICLE] Cyber and Financial Services: Living with a Target on Your Back

Article

Cyber and Financial Services: Living with a Target on Your Back

1701820800000
Read Article
Request Data:
{}
[ARTICLE] Cyber and Manufacturing: If You Build It, Threat Actors Will Come

Article

Cyber and Manufacturing: If You Build It, Threat Actors Will Come

1705622400000
Read Article
Request Data:
{}
Request Data:
{}
[ARTICLE] Three Tactics to Combat Next-Gen Social Engineering Schemes

Article

Three Tactics to Combat Next-Gen Social Engineering Schemes

1700006400000
Read Article
Request Data:
{}
[ARTICLE] Kickstarting Your Security Program: Leveraging NIST CSF Version 1.1

Article

Kickstarting Your Security Program: Leveraging NIST CSF Version 1.1

1693353600000
Read Article
Request Data:
{}
[ARTICLE] Cyber Insurance Defined: Traditionally, and Now

Article

Cyber Insurance Defined: Traditionally, and Now

1667952000000
Read Article
Request Data:
{}
Request Data:
{}
Request Data:
{}
[ARTICLE] 3 Ways Threat Actors Will Kick Off the New Year

Article

3 Ways Threat Actors Will Kick Off the New Year

1702425600000
Read Article
Request Data:
{}
[ARTICLE] Black Basta Ransomware Has Extracted Over $100 Million From its Victims

Article

Black Basta Ransomware Has Extracted Over $100 Million From its Victims

1698883200000
Read Article
Request Data:
{}
[ARTICLE] Another Record-Breaking Month for Ransomware: November Up 110% YoY

Article

Another Record-Breaking Month for Ransomware: November Up 110% YoY

1702857600000
Read Article
Request Data:
{}
[ARTICLE] Cyber and Healthcare: Treating the Rise of Ransomware

Article

Cyber and Healthcare: Treating the Rise of Ransomware

1702944000000
Read Article
Request Data:
{}
[ARTICLE] Key Ransomware Indicator Up 56% Year-on-Year: October Data

Article

Key Ransomware Indicator Up 56% Year-on-Year: October Data

1699833600000
Read Article
Request Data:
{}
[ARTICLE] Generative AI is here. How does it impact cyber insurance?

Article

Generative AI is here. How does it impact cyber insurance?

1687910400000
Read Article
Request Data:
{}
Request Data:
{}
[ARTICLE] A Tale of How Business Email Compromise Attacks Work

Case Study

A Tale of How Business Email Compromise Attacks Work

1648598400000
Read Article
Request Data:
{}
[ARTICLE] Data Science Insight: How VPN Vulnerabilities Affect Ransomware Risk

Article

Data Science Insight: How VPN Vulnerabilities Affect Ransomware Risk

1662595200000
Read Article
Request Data:
{}
[ARTICLE] Decrease in Ransomware at the Start of the Russian Invasion of Ukraine

Article

Decrease in Ransomware at the Start of the Russian Invasion of Ukraine

1647907200000
Read Article
Request Data:
{}
[ARTICLE] Common Cyber Insurance Myths, Debunked

Article

Common Cyber Insurance Myths, Debunked

1655337600000
Read Article
Request Data:
{}
[ARTICLE] How Healthcare is Responding to New Guidelines for Pixel Tech

Article

How Healthcare is Responding to New Guidelines for Pixel Tech

1680566400000
Read Article
Request Data:
{}
[ARTICLE] August Ransomware Recap: Sixth Month in a Row with YoY Increase

Article

August Ransomware Recap: Sixth Month in a Row with YoY Increase

1694649600000
Read Article
Request Data:
{}
[ARTICLE] Cyber Risk, IT Tools & Ransomware Trends: Pre-Pandemic to 2021

Article

Cyber Risk, IT Tools & Ransomware Trends: Pre-Pandemic to 2021

1634774400000
Read Article
Request Data:
{}
[ARTICLE] Record Ransomware Attacks: 6-Month Upward Trend Continues in July

Article

Record Ransomware Attacks: 6-Month Upward Trend Continues in July

1691625600000
Read Article
Request Data:
{}
[ARTICLE] While Leaves Fall, Ransomware Rises: Attacks Are Up 5.1% in September

Article

While Leaves Fall, Ransomware Rises: Attacks Are Up 5.1% in September

1697155200000
Read Article
Request Data:
{}
Corvus_Interview_Modern_Cyber_Warfare_with_John_Hultquist

Article

Corvus Interview: Modern Cyber Warfare with John Hultquist

1661904000000
Read Article
Request Data:
{}
[ARTICLE] The Ransomware Handbook: Cybercriminals in the News

Article

The Ransomware Handbook: Cybercriminals in the News

1664323200000
Read Article
Request Data:
{}
[ARTICLE] How Our Policyholders Avoid Vulnerability Patching Paralysis

Article

How Our Policyholders Avoid Vulnerability Patching Paralysis

1690761600000
Read Article
Request Data:
{}
Request Data:
{}
Request Data:
{}
[ARTICLE] Ransomware Groups Want to Exploit Your File Transfer Software

Article

Ransomware Groups Want to Exploit Your File Transfer Software

1693440000000
Read Article
Request Data:
{}
Request Data:
{}
[ARTICLE] Can Cyber Risk Prevention Really Work? Yes, And Here’s How

Article

Can Cyber Risk Prevention Really Work? Yes, And Here’s How

1687305600000
Read Article
Request Data:
{}
[ARTICLE] Cyber Threats: 2022 in Review (& What to Expect from 2023)

Article

Cyber Threats: 2022 in Review (& What to Expect from 2023)

1671494400000
Read Article
Request Data:
{}
[ARTICLE] Cyberwarfare in Ukraine: One Year of Observations

Article

Cyberwarfare in Ukraine: One Year of Observations

1677801600000
Read Article
Request Data:
{}
Request Data:
{}
Request Data:
{}
[ARTICLE] Tracking Pixel Technology: Everything You Need To Know

Article

Tracking Pixel Technology: Everything You Need To Know

1670544000000
Read Article
Request Data:
{}
[ARTICLE] Cyber Insurance Coverage & Terminology Guide

Article

Cyber Insurance Coverage & Terminology Guide

1654560000000
Read Article
Request Data:
{}
[ARTICLE] Q2 Ransomware Report: Global Attacks At All-Time High

Article

Q2 '23 Ransomware Report: Global Attacks At All-Time High

1690761600000
Read Article
Request Data:
{}
[ARTICLE] A Chilling Tale of How Data Exfiltration Attacks Happen

Case Study

A Chilling Tale of How Data Exfiltration Attacks Happen

1665532800000
Read Article
Request Data:
{}
[ARTICLE] Modern Warfare & Cyber Risk: Cybercrime, Sanctions Impact & More

Article

Modern Warfare & Cyber Risk: Cybercrime, Sanctions Impact & More

1660176000000
Read Article
Request Data:
{}
[ARTICLE] 5 High-Impact Cybersecurity Practices for Tech Companies

Article

5 High-Impact Cybersecurity Practices for Tech Companies

1694131200000
Read Article
Request Data:
{}
[ARTICLE] Your Survival Guide to the DDoS Resurgence

Article

Your Survival Guide to the DDoS Resurgence

1646697600000
Read Article
Request Data:
{}
[ARTICLE] Mitigating Vendor Risk: Three Steps to Protect Your Organization

Article

Mitigating Vendor Risk: Three Steps to Protect Your Organization

1619654400000
Read Article
Request Data:
{}
[ARTICLE] The ABCs of 3-2-1 Backup Plans

Article

The ABCs of 3-2-1 Backup Plans

1632873600000
Read Article
Request Data:
{}
Request Data:
{}
[WEBINAR] Cyberattack Prevention Month

Webinar

Cyberattack Prevention Month

1696118400000
Watch Webinar
Request Data:
{}
[REPORT] Corvus Risk Insights Index: Q2 2023 Edition

Report

Corvus Risk Insights Index: Q2 2023 Edition

1682899200000
Read Article
Request Data:
{}
[WEBINAR] When AI and Insurance Collide

Webinar

When AI and Insurance Collide

1680307200000
Watch Webinar
Request Data:
{}
[WEBINAR] Pixels and Ad Tech: Learning the Liabilities and Mitigating Risk

Webinar

Pixels and Ad Tech: Learning the Liabilities and Mitigating Risk

1672531200000
Watch Webinar
Request Data:
{}
[REPORT] Corvus Risk Insights Index: Q4 2022 Edition

Report

Corvus Risk Insights Index: Q4 2022 Edition

1669852800000
Read Article
Request Data:
{}
Request Data:
{}
[ARTICLE] The 3 Keys to a Successful Cyber Incident Response Strategy

Article

The 3 Keys to a Successful Cyber Incident Response Strategy

1634256000000
Read Article
Request Data:
{}
Request Data:
{}
[ARTICLE] How We Use AI to Better Understand Tech E&O Risk (Part I of II)

Article

How We Use AI to Better Understand Tech E&O Risk (Part I of II)

1598572800000
Read Article
Request Data:
{}
[ARTICLE] How We Use AI to Better Understand Tech E&O Risk (Part II of II)

Article

How We Use AI to Better Understand Tech E&O Risk (Part II of II)

1599091200000
Read Article
Request Data:
{}
Request Data:
{}
[ARTICLE] Not-quite-CAT: Exploring Aggregate Cyber Risk in SaaS Providers & VPNs

Article

Not-quite-CAT: Exploring Aggregate Cyber Risk in SaaS Providers & VPNs

1672790400000
Read Article
Request Data:
{}
[ARTICLE] Client Breach Response: The Impact of Capital One’s Legal Battle

Article

Client Breach Response: The Impact of Capital One’s Legal Battle

1594598400000
Read Article
Request Data:
{}
[ARTICLE] BYOD: Does A Cyber Insurance Policy Cover Remote Workers?

Article

BYOD: Does A Cyber Insurance Policy Cover Remote Workers?

1585785600000
Read Article
Request Data:
{}
Request Data:
{}
Request Data:
{}
[ARTICLE] Cybersecurity Strategies for Small- and Medium-Sized Businesses

Article

Cybersecurity Strategies for Small- and Medium-Sized Businesses

1649808000000
Read Article
Request Data:
{}
[ARTICLE] Prioritize Patching with Risk-Based Vulnerability Management

Article

Prioritize Patching with Risk-Based Vulnerability Management

1630281600000
Read Article
Request Data:
{}
[ARTICLE] Microsoft Exchange: Where We Are Now

Article

Microsoft Exchange: Where We Are Now

1616544000000
Read Article
Request Data:
{}
[ARTICLE] Attack Analysis: The Latest on Kaseya and PrintNightmare

Article

Attack Analysis: The Latest on Kaseya and PrintNightmare

1625788800000
Read Article
Request Data:
{}
[ARTICLE] Energy & Utilities Companies: Custom Reports Improve Cyber Hygiene

Article

Energy & Utilities Companies: Custom Reports Improve Cyber Hygiene

1620864000000
Read Article
Request Data:
{}
[ARTICLE] Tech Companies: Beyond Cyber Risk, the Cost of Downstream Impact

Article

Tech Companies: Beyond Cyber Risk, the Cost of Downstream Impact

1637020800000
Read Article
Request Data:
{}
[ARTICLE] Graph Your Dependencies: Facebook Outage Proves 'Simple' Doesn’t Work

Article

Graph Your Dependencies: Facebook Outage Proves 'Simple' Doesn’t Work

1633651200000
Read Article
Request Data:
{}
Request Data:
{}
[ARTICLE] Cyber Hygiene for Public Utilities: Why to Take Action Now, and How

Article

Cyber Hygiene for Public Utilities: Why to Take Action Now, and How

1613692800000
Read Article
Request Data:
{}
Request Data:
{}
Request Data:
{}
Request Data:
{}
[ARTICLE] Keeping up with Cybercriminals: The Future of Online Threats

Article

Keeping up with Cybercriminals: The Future of Online Threats

1658448000000
Read Article
Request Data:
{}
[ARTICLE] Small Businesses: How to Improve Your Security on a Budget

Article

Small Businesses: How to Improve Your Security on a Budget

1644969600000
Read Article
Request Data:
{}
[CASE STUDY] Palo Alto Networks VPN Vulnerability

Case Study

Palo Alto Networks VPN Vulnerability

1659312000000
Read Article
Request Data:
{}
Request Data:
{}
[ARTICLE] Cyber and Construction: Laying Groundwork to Combat Digital Threats

Article

Cyber and Construction: Laying Groundwork to Combat Digital Threats

1716422400000
Read Article
Request Data:
{}
Request Data:
{}
[ARTICLE] Q1 Ransomware Report: Ransomware Groups Don’t Die, They Multiply

Article

Q1 '24 Ransomware Report: Ransomware Groups Don’t Die, They Multiply

1714435200000
Read Article
Request Data:
{}
[ARTICLE] Change Healthcare Hack: Everything You Need To Know

Article

Change Healthcare Hack: Everything You Need To Know

1711929600000
Read Article
Request Data:
{}
[Article] Law Enforcement Can Help in a Cyber Crisis — But Prevention is Even Better

Article

Law Enforcement Can Help in a Cyber Crisis — But Prevention is Even Better

1710892800000
Read Article
Request Data:
{}
Request Data:
{}
[ARTICLE] The Crucial First 48 Hours: Navigating Business Continuity and Disaster Recovery

Article

The Crucial First 48 Hours: Navigating Business Continuity and Disaster Recovery

1707955200000
Read Article
Request Data:
{}
[ARTICLE] Keep It Real: Avoid Falling for the Rise of Deepfake Phishing Scams

Article

Keep It Real: Avoid Falling for the Rise of Deepfake Phishing Scams

1707782400000
Read Article
Request Data:
{}
[ARTICLE] Q4 Ransomware Report: 2023 Ends as a Record-Breaking Year

Article

Q4 '23 Ransomware Report: 2023 Ends as a Record-Breaking Year

1706486400000
Read Article
Request Data:
{}
[ARTICLE] How Inside-out Insights Shape Cyber Risk Assessment

Article

How Inside-out Insights Shape Cyber Risk Assessment

1666915200000
Read Article
Request Data:
{}
Request Data:
{}
[REPORT] Corvus Risk Insights Index: Q1 2022 Edition

Report

Corvus Risk Insights Index: Q1 2022 Edition

1648771200000
Read Article
Request Data:
{}
[VIDEO] What are DDoS attacks?

Video

What are DDoS attacks?

1709251200000
Watch Video
Request Data:
{}
[VIDEO] What are Resilient Backup Solutions?

Video

What are Resilient Backup Solutions?

1643673600000
Watch Video
Request Data:
{}
[VIDEO] What is Endpoint Detection and Response?

Video

What is Endpoint Detection and Response?

1643673600000
Watch Video
Request Data:
{}
[REPORT] 2021: Corvus Risk Insights Index

Report

2021: Corvus Risk Insights Index

1633046400000
Read Article
Request Data:
{}
[PDF GUIDE] Incident Response Done Right

Guide

Incident Response Done Right

1633046400000
Download PDF
Request Data:
{}
[PDF GUIDE] About Corvus Black: Risk + Response Services

Guide

About Corvus Black: Risk + Response Services

1627776000000
Download PDF
Request Data:
{}
Request Data:
{}
Request Data:
{}
[PDF GUIDE] Working with Your Cyber Insurer: Incident Response

Guide

Working with Your Cyber Insurer: Incident Response

1633046400000
Download PDF
Request Data:
{}
Request Data:
{}
Request Data:
{}
Request Data:
{}
[WEBINAR] Privacy Best Practices for Tech Companies

Webinar

Privacy Best Practices for Tech Companies

1633046400000
Watch Webinar
Request Data:
{}
[CASE STUDY] Calls from the Wild: Stories of Risk + Response at Corvus

Case Study

Calls from the Wild: Stories of Risk + Response at Corvus

1633046400000
Read Article
Request Data:
{}
[PDF DOWNLOAD] Working with Risk and Response: Policyholder Experience

Broker Resource

Working with Risk and Response: Policyholder Experience

1656633600000
Read Article
Request Data:
{}
Request Data:
{}
Request Data:
{}
[VIDEO] What is Multi-Factor Authentication?

Video

What is Multi-Factor Authentication?

1643673600000
Watch Video
Request Data:
{}
[PDF GUIDE] Guide to Multi-Factor Authentication

Guide

Guide to Multi-Factor Authentication

1617235200000
Download PDF
Request Data:
{}
[WEBINAR] Mitigating Vendor Risk

Webinar

Mitigating Vendor Risk

1617235200000
Watch Webinar
Request Data:
{}
Request Data:
{}
Request Data:
{}
Request Data:
{}
Request Data:
{}
Request Data:
{}
[ARTICLE] Handling Cyber Objections: 'Cyber Insurance Is Too Expensive'

Article

Handling Cyber Objections: 'Cyber Insurance Is Too Expensive'

1718668800000
Read Article
Request Data:
{}
[ARTICLE] What is a Telnet vulnerability?

Article

What is a Telnet vulnerability?

1603843200000
Read Article
Request Data:
{}
[ARTICLE] What is an SMB vulnerability?

Article

What is an SMB vulnerability?

1603843200000
Read Article
Request Data:
{}
[ARTICLE] What is a Bluekeep vulnerability?

Article

What is a Bluekeep vulnerability?

1603670400000
Read Article
Request Data:
{}
[ARTICLE] What is RDP and why is it a security concern?

Article

What is RDP and why is it a security concern?

1670803200000
Read Article
Request Data:
{}
[CASE STUDY] Case Study: Unpatched Microsoft Exchange Server Vulnerabilities

Case Study

Case Study: Unpatched Microsoft Exchange Server Vulnerabilities

1639699200000
Read Article
Request Data:
{}
[ARTICLE] A Guide to Multi-factor Authentication (MFA)

Article

A Guide to Multi-factor Authentication (MFA)

1713744000000
Read Article
Request Data:
{}
[ARTICLE] A Guide to Vulnerability Management

Article

A Guide to Vulnerability Management

1614211200000
Read Article
Request Data:
{}
[ARTICLE] A Guide to Zero Trust Network Access (ZTNA)

Article

A Guide to Zero Trust Network Access (ZTNA)

1668556800000
Read Article
Request Data:
{}
[ARTICLE] How to Take Email Security to the Next Level

Article

How to Take Email Security to the Next Level

1681257600000
Read Article
Request Data:
{}
[ARTICLE] A Guide to Mitigating Infostealer Malware

Article

A Guide to Mitigating Infostealer Malware

1685491200000
Read Article
Request Data:
{}
[ARTICLE] HTTP Security Headers Best Practices

Article

HTTP Security Headers Best Practices

1636675200000
Read Article
Request Data:
{}
[ARTICLE] A Guide to Internal Governance, Risk, and Compliance

Article

A Guide to Internal Governance, Risk, and Compliance

1614211200000
Read Article
Request Data:
{}
[ARTICLE] A Guide to Threat Detection

Article

A Guide to Threat Detection

1679443200000
Read Article
Request Data:
{}
[ARTICLE] How to Respond to a Cyber Incident

Article

How to Respond to a Cyber Incident

1667347200000
Read Article
Request Data:
{}
[ARTICLE] A Guide to Securing Access Controls

Article

A Guide to Securing Access Controls

1681257600000
Read Article
Request Data:
{}
[ARTICLE] A Guide To Securing Email at Your Organization

Article

A Guide To Securing Email at Your Organization

1667347200000
Read Article
Request Data:
{}
[ARTICLE] A Guide to MFA Bypass Attacks

Article

A Guide to MFA Bypass Attacks

1701302400000
Read Article
Request Data:
{}
[ARTICLE] A Guide to Data Encryption

Article

A Guide to Data Encryption

1679443200000
Read Article
Request Data:
{}
[ARTICLE] A Guide to Funds Transfer Fraud

Article

A Guide to Funds Transfer Fraud

1655769600000
Read Article
Request Data:
{}
[ARTICLE] Best Practices for Securing Vendors

Article

Best Practices for Securing Vendors

1614211200000
Read Article
Request Data:
{}
[ARTICLE] Q4 2023 Cyber Vulnerability Report and Impact

Article

Q4 2023 Cyber Vulnerability Report and Impact

1704067200000
Read Article
Request Data:
{}
[ARTICLE] Q3 2023 Cyber Vulnerability Report and Impact

Article

Q3 2023 Cyber Vulnerability Report and Impact

1696118400000
Read Article
Request Data:
{}
[ARTICLE] Q2 2023 Cyber Vulnerability Report and Impact

Article

Q2 2023 Cyber Vulnerability Report and Impact

1688169600000
Read Article
Request Data:
{}
[ARTICLE] Q1 2023 Cyber Vulnerability Report and Impact

Article

Q1 2023 Cyber Vulnerability Report and Impact

1711929600000
Read Article
Request Data:
{}
[ARTICLE] A Guide to Security Controls For Cloud-Based Organizations

Article

A Guide to Security Controls For Cloud-Based Organizations

1681862400000
Read Article
Request Data:
{}
[ARTICLE] A Guide to Common Vulnerabilities and Exposures (CVEs)

Article

A Guide to Common Vulnerabilities and Exposures (CVEs)

1664323200000
Read Article
Request Data:
{}
[ARTICLE] A Guide to Endpoint Detection Response (EDR)

Article

A Guide to Endpoint Detection Response (EDR)

1668643200000
Read Article
Request Data:
{}
[ARTICLE] GitLab Vulnerability Alert | January 2024

Article

GitLab Vulnerability Alert | January 2024

1705017600000
Read Article
Request Data:
{}
[ARTICLE] Ivanti Connect Secure Vulnerability Alert | January 2024

Article

Ivanti Connect Secure Vulnerability Alert | January 2024

1707350400000
Read Article
Request Data:
{}
[ARTICLE] Jenkins Vulnerability Alert | January 2024

Article

Jenkins Vulnerability Alert | January 2024

1706140800000
Read Article
Request Data:
{}
[ARTICLE] GoAnywhere Vulnerability Alert | January 2024

Article

GoAnywhere Vulnerability Alert | January 2024

1705968000000
Read Article
Request Data:
{}
[ARTICLE] Confluence Data Center Vulnerability Alert | January 2024

Article

Confluence Data Center Vulnerability Alert | January 2024

1705363200000
Read Article
Request Data:
{}
[ARTICLE] ScreenConnect Vulnerability | February 2024

Article

ScreenConnect Vulnerability | February 2024

1709078400000
Read Article
Request Data:
{}
[ARTICLE] Fortinet Fortigate Vulnerability Alert | February 2024

Article

Fortinet Fortigate Vulnerability Alert | February 2024

1708041600000
Read Article
Request Data:
{}
[ARTICLE] Palo Alto GlobalProtect Vulnerability | April 2024

Article

Palo Alto GlobalProtect Vulnerability | April 2024

1713312000000
Read Article
Request Data:
{}
[ARTICLE] CDK Global Incident | June 2024

Article

CDK Global Incident | June 2024

1717372800000
Read Article
Request Data:
{}
[PDF] Q1 '24 Ransomware Report PDF

Report

Q1 '24 Ransomware Report PDF: Ransomware Groups Don’t Die, They Multiply

1714435200000
Read Article
Request Data:
{}
Request Data:
{}
Request Data:
{}
Request Data:
{}
Request Data:
{}
Request Data:
{}
[GUIDE] Policyholder Benefits Guide

Guide

Policyholder Benefits Guide

1721865600000
Download PDF
Request Data:
{}
[ARTICLE] Record Ransomware Attacks: June 2023 Highest Month Ever

Article

Record Ransomware Attacks: June 2023 Highest Month Ever

1689811200000
Read Article
Request Data:
{}
[ARTICLE] Rising Tide of Ransomware Attacks: Current and Future Trends

Article

Rising Tide of Ransomware Attacks: Current and Future Trends

1687996800000
Read Article
Request Data:
{}
[ARTICLE] Ransomware Attacks Remain High: May 2023 Continues Increased YoY Trend

Article

Ransomware Attacks Remain High: May 2023 Continues Increased YoY Trend

1686268800000
Read Article
Request Data:
{}
[ARTICLE] Ransomware Update: April 2023 Takes Spot for Third Highest Month

Article

Ransomware Update: April 2023 Takes Spot for Third Highest Month

1684368000000
Read Article
Request Data:
{}
[ARTICLE] Threat Intel from Corvus Insurance

Article

March 2023 Sees 60% Increase in Ransomware Attacks

1681776000000
Read Article
Request Data:
{}
[ARTICLE] Threat Intel from Corvus Insurance

Article

Global IT Meltdown: CrowdStrike Software Update Causes Broad Outages

1723507200000
Read Article
Request Data:
{}
[ARTICLE] Navigating Third-Party Risk: A Key Component for Business Resilience

Article

Navigating Third-Party Risk: A Key Component for Business Resilience

1721606400000
Read Article
Request Data:
{}
[REPORT] Q2 Cyber Threat Report: Ransomware Season Arrives Early

Article

Q2 '24 Cyber Threat Report: Ransomware Season Arrives Early

1724284800000
Read Article
Request Data:
{}
[PDF] Q2 2024 Cyber Threat Report

Report

Q2 '24 Cyber Threat Report PDF: Ransomware Season Arrives Early

1724284800000
Read Article
Request Data:
{}
[WEBINAR] Q2 Cyber Threat Report: Ransomware Season Arrives Early

Webinar

Q2 '24 Cyber Threat Webinar

1725321600000
Watch Webinar
Request Data:
{}
Request Data:
{}
Request Data:
{}
Request Data:
{}
Request Data:
{}
[WEBINAR] Q1 24' Ransomware Findings

Webinar

Q1 24' Ransomware Findings

1714435200000
Watch Webinar
Request Data:
{}
[WEBINAR] Cyber Threats in 2024: What Claims Data Tells Us About the Dark Web

Webinar

Cyber Threats in 2024

1704844800000
Watch Webinar
Request Data:
{}
[CASE STUDY] Wealth Management Firm Avoids $250K Claim

Case Study

Wealth Management Firm Avoids $250K Claim

1731542400000
Read Article
Request Data:
{}
[ARTICLE] Q3 Cyber Threat Report: The Ransomware Ecosystem is Increasingly Distributed

Article

Q3 Cyber Threat Report: The Ransomware Ecosystem is Increasingly Distributed

1732060800000
Read Article
Request Data:
{}
[PDF] Q3 2024 Cyber Threat Report

Report

Q3 Cyber Threat Report PDF: The Ransomware Ecosystem is Increasingly Distributed

1732060800000
Read Article
Request Data:
{}
[WEBINAR] Analyzing Q3 2024 Ransomware Activity

Webinar

Analyzing Q3 2024 Ransomware Activity

1732147200000
Watch Webinar
Request Data:
{}
[ARTICLE] November 2024: A Record-Breaking Month for Ransomware Attacks

Article

November 2024: A Record-Breaking Month for Ransomware Attacks

1733961600000
Read Article
Request Data:
{}
[ARTICLE] Cleo File Transfer Alert | December 2024

Article

Cleo File Transfer Alert | December 2024

1733961600000
Read Article

Threat Intel

 
Report

Q2 '23 Ransomware Report PDF: Global Attacks At All-Time High

1698105600000
Read Article
Article

Cyber and Financial Services: Living with a Target on Your Back

1701820800000
Read Article
Article

Cyber and Manufacturing: If You Build It, Threat Actors Will Come

1705622400000
Read Article
Article

Kickstarting Your Security Program: Leveraging NIST CSF Version 1.1

1693353600000
Read Article
Article

Cyber Insurance Defined: Traditionally, and Now

1667952000000
Read Article
Article

What’s Next in Cyber: 3 Trends Cyber Underwriters Are Seeing

1675987200000
Read Article
Article

Cyber Coverage Explained: Sub-limits and Coinsurance

1643155200000
Read Article
Article

3 Ways Threat Actors Will Kick Off the New Year

1702425600000
Read Article
Article

Black Basta Ransomware Has Extracted Over $100 Million From its Victims

1698883200000
Read Article
Article

Another Record-Breaking Month for Ransomware: November Up 110% YoY

1702857600000
Read Article
Article

Cyber and Healthcare: Treating the Rise of Ransomware

1702944000000
Read Article
Article

Key Ransomware Indicator Up 56% Year-on-Year: October Data

1699833600000
Read Article
Article

Decrease in Ransomware at the Start of the Russian Invasion of Ukraine

1647907200000
Read Article
Article

August Ransomware Recap: Sixth Month in a Row with YoY Increase

1694649600000
Read Article
Article

Record Ransomware Attacks: 6-Month Upward Trend Continues in July

1691625600000
Read Article
Article

While Leaves Fall, Ransomware Rises: Attacks Are Up 5.1% in September

1697155200000
Read Article
Article

Corvus Interview: Modern Cyber Warfare with John Hultquist

1661904000000
Read Article
Article

The Ransomware Handbook: Cybercriminals in the News

1664323200000
Read Article
Article

Cyber Threats: 2022 in Review (& What to Expect from 2023)

1671494400000
Read Article
Article

Cyberwarfare in Ukraine: One Year of Observations

1677801600000
Read Article
Article

Q2 '23 Ransomware Report: Global Attacks At All-Time High

1690761600000
Read Article
Article

Modern Warfare & Cyber Risk: Cybercrime, Sanctions Impact & More

1660176000000
Read Article
Report

Corvus Claims Data Infographic - December 2023

1704067200000
Read Article
Report

Corvus Risk Insights Index: Q2 2023 Edition

1682899200000
Read Article
Report

Corvus Risk Insights Index: Q4 2022 Edition

1669852800000
Read Article
Article

Attack Analysis: The Latest on Kaseya and PrintNightmare

1625788800000
Read Article
Case Study

Palo Alto Networks VPN Vulnerability

1659312000000
Download PDF
Article

Q1 '24 Ransomware Report: Ransomware Groups Don’t Die, They Multiply

1714435200000
Read Article
Article

Change Healthcare Hack: Everything You Need To Know

1711929600000
Read Article
Article

Law Enforcement Can Help in a Cyber Crisis — But Prevention is Even Better

1710892800000
Read Article
Article

Q4 '23 Ransomware Report: 2023 Ends as a Record-Breaking Year

1706486400000
Read Article
Report

Corvus Risk Insights Index: Q1 2022 Edition

1648771200000
Read Article
Report

2021: Corvus Risk Insights Index

1633046400000
Read Article
Article

Q4 2023 Cyber Vulnerability Report and Impact

1704067200000
Read Article
Article

Q3 2023 Cyber Vulnerability Report and Impact

1696118400000
Read Article
Article

Q2 2023 Cyber Vulnerability Report and Impact

1688169600000
Read Article
Article

Q1 2023 Cyber Vulnerability Report and Impact

1711929600000
Read Article
Article

GitLab Vulnerability Alert | January 2024

1705017600000
Read Article
Article

Ivanti Connect Secure Vulnerability Alert | January 2024

1707350400000
Read Article
Article

Jenkins Vulnerability Alert | January 2024

1706140800000
Read Article
Article

GoAnywhere Vulnerability Alert | January 2024

1705968000000
Read Article
Article

Confluence Data Center Vulnerability Alert | January 2024

1705363200000
Read Article
Article

ScreenConnect Vulnerability | February 2024

1709078400000
Read Article
Article

Fortinet Fortigate Vulnerability Alert | February 2024

1708041600000
Read Article
Article

Palo Alto GlobalProtect Vulnerability | April 2024

1713312000000
Read Article
Article

CDK Global Incident | June 2024

1717372800000
Read Article
Report

Q1 '24 Ransomware Report PDF: Ransomware Groups Don’t Die, They Multiply

1714435200000
Read Article
Article

Record Ransomware Attacks: June 2023 Highest Month Ever

1689811200000
Read Article
Article

Rising Tide of Ransomware Attacks: Current and Future Trends

1687996800000
Read Article
Article

Ransomware Attacks Remain High: May 2023 Continues Increased YoY Trend

1686268800000
Read Article
Article

Ransomware Update: April 2023 Takes Spot for Third Highest Month

1684368000000
Read Article
Article

March 2023 Sees 60% Increase in Ransomware Attacks

1681776000000
Read Article
Article

Global IT Meltdown: CrowdStrike Software Update Causes Broad Outages

1723507200000
Read Article
Article

Q2 '24 Cyber Threat Report: Ransomware Season Arrives Early

1724284800000
Read Article
Report

Q2 '24 Cyber Threat Report PDF: Ransomware Season Arrives Early

1724284800000
Read Article
Webinar

Q2 '24 Cyber Threat Webinar

1725321600000
Watch Webinar
Webinar

Q1 24' Ransomware Findings

1714435200000
Watch Webinar
Webinar

Cyber Threats in 2024

1704844800000
Watch Webinar
Article

Q3 Cyber Threat Report: The Ransomware Ecosystem is Increasingly Distributed

1732060800000
Read Article
Report

Q3 Cyber Threat Report PDF: The Ransomware Ecosystem is Increasingly Distributed

1732060800000
Read Article
Webinar

Analyzing Q3 2024 Ransomware Activity

1732147200000
Watch Webinar
Article

November 2024: A Record-Breaking Month for Ransomware Attacks

1733961600000
Read Article
Article

Cleo File Transfer Alert | December 2024

1733961600000
Read Article

Cybersecurity & risk insights

 
Article

Cyber and Financial Services: Living with a Target on Your Back

1701820800000
Read Article
Article

Cyber and Manufacturing: If You Build It, Threat Actors Will Come

1705622400000
Read Article
Article

Navigating Regulatory Changes: A Look into the NYDFS Cybersecurity Regulation

1698883200000
Read Article
Article

Three Tactics to Combat Next-Gen Social Engineering Schemes

1700006400000
Read Article
Article

Kickstarting Your Security Program: Leveraging NIST CSF Version 1.1

1693353600000
Read Article
Article

Generative AI is here. How does it impact cyber insurance?

1687910400000
Read Article
Broker Resource

The Privacy Problem: A Conversation on Pixel Tracking with Experts from BakerHostetler

1674604800000
Read Article
Case Study

A Tale of How Business Email Compromise Attacks Work

1648598400000
Download PDF
Article

Data Science Insight: How VPN Vulnerabilities Affect Ransomware Risk

1662595200000
Read Article
Article

Common Cyber Insurance Myths, Debunked

1655337600000
Read Article
Article

How Healthcare is Responding to New Guidelines for Pixel Tech

1680566400000
Read Article
Article

Cyber Risk, IT Tools & Ransomware Trends: Pre-Pandemic to 2021

1634774400000
Read Article
Article

How Our Policyholders Avoid Vulnerability Patching Paralysis

1690761600000
Read Article
Article

Ransomware Groups Want to Exploit Your File Transfer Software

1693440000000
Read Article
Article

Can Cyber Risk Prevention Really Work? Yes, And Here’s How

1687305600000
Read Article
Article

Tracking Pixel Technology: Everything You Need To Know

1670544000000
Read Article
Article

Cyber Insurance Coverage & Terminology Guide

1654560000000
Read Article
Case Study

A Chilling Tale of How Data Exfiltration Attacks Happen

1665532800000
Download PDF
Article

5 High-Impact Cybersecurity Practices for Tech Companies

1694131200000
Read Article
Article

Your Survival Guide to the DDoS Resurgence

1646697600000
Read Article
Article

Mitigating Vendor Risk: Three Steps to Protect Your Organization

1619654400000
Read Article
Article

The ABCs of 3-2-1 Backup Plans

1632873600000
Read Article
Webinar

Cyberattack Prevention Month

1696118400000
Watch Webinar
Webinar

When AI and Insurance Collide

1680307200000
Watch Webinar
Webinar

Pixels and Ad Tech: Learning the Liabilities and Mitigating Risk

1672531200000
Watch Webinar
Article

The 3 Keys to a Successful Cyber Incident Response Strategy

1634256000000
Read Article
Article

How We Use AI to Better Understand Tech E&O Risk (Part I of II)

1598572800000
Read Article
Article

How We Use AI to Better Understand Tech E&O Risk (Part II of II)

1599091200000
Read Article
Article

Not-quite-CAT: Exploring Aggregate Cyber Risk in SaaS Providers & VPNs

1672790400000
Read Article
Article

Client Breach Response: The Impact of Capital One’s Legal Battle

1594598400000
Read Article
Article

BYOD: Does A Cyber Insurance Policy Cover Remote Workers?

1585785600000
Read Article
Article

Cybersecurity Strategies for Small- and Medium-Sized Businesses

1649808000000
Read Article
Article

Prioritize Patching with Risk-Based Vulnerability Management

1630281600000
Read Article
Article

Microsoft Exchange: Where We Are Now

1616544000000
Read Article
Article

Energy & Utilities Companies: Custom Reports Improve Cyber Hygiene

1620864000000
Read Article
Article

Tech Companies: Beyond Cyber Risk, the Cost of Downstream Impact

1637020800000
Read Article
Article

Graph Your Dependencies: Facebook Outage Proves 'Simple' Doesn’t Work

1633651200000
Read Article
Article

Cyber Hygiene for Public Utilities: Why to Take Action Now, and How

1613692800000
Read Article
Article

Keeping up with Cybercriminals: The Future of Online Threats

1658448000000
Read Article
Article

Small Businesses: How to Improve Your Security on a Budget

1644969600000
Read Article
Article

Cyber and Construction: Laying Groundwork to Combat Digital Threats

1716422400000
Read Article
Article

Cyber Insurance for Small Businesses: BOP vs. Standalone Cyber

1715904000000
Read Article
Article

The Crucial First 48 Hours: Navigating Business Continuity and Disaster Recovery

1707955200000
Read Article
Article

Keep It Real: Avoid Falling for the Rise of Deepfake Phishing Scams

1707782400000
Read Article
Article

How Inside-out Insights Shape Cyber Risk Assessment

1666915200000
Read Article
Video

What are DDoS attacks?

1709251200000
Watch Video
Video

What are Resilient Backup Solutions?

1643673600000
Watch Video
Video

What is Endpoint Detection and Response?

1643673600000
Watch Video
Guide

Incident Response Done Right

1633046400000
Download PDF
Guide

Working with Your Cyber Insurer: Incident Response

1633046400000
Download PDF
Guide

The Ultimate Guide to a Vendor Data Breach Response

1596240000000
Download PDF
Webinar

Privacy Best Practices for Tech Companies

1633046400000
Watch Webinar
Case Study

Calls from the Wild: Stories of Risk + Response at Corvus

1633046400000
Download PDF
Video

What is Multi-Factor Authentication?

1643673600000
Watch Video
Guide

Guide to Multi-Factor Authentication

1617235200000
Download PDF
Webinar

Mitigating Vendor Risk

1617235200000
Watch Webinar
Article

Handling Cyber Objections: 'Cyber Insurance Is Too Expensive'

1718668800000
Read Article
Article

What is a Telnet vulnerability?

1603843200000
Read Article
Article

What is an SMB vulnerability?

1603843200000
Read Article
Article

What is a Bluekeep vulnerability?

1603670400000
Read Article
Article

What is RDP and why is it a security concern?

1670803200000
Read Article
Case Study

Case Study: Unpatched Microsoft Exchange Server Vulnerabilities

1639699200000
Download PDF
Article

A Guide to Multi-factor Authentication (MFA)

1713744000000
Read Article
Article

A Guide to Vulnerability Management

1614211200000
Read Article
Article

A Guide to Zero Trust Network Access (ZTNA)

1668556800000
Read Article
Article

How to Take Email Security to the Next Level

1681257600000
Read Article
Article

A Guide to Mitigating Infostealer Malware

1685491200000
Read Article
Article

HTTP Security Headers Best Practices

1636675200000
Read Article
Article

A Guide to Internal Governance, Risk, and Compliance

1614211200000
Read Article
Article

A Guide to Threat Detection

1679443200000
Read Article
Article

How to Respond to a Cyber Incident

1667347200000
Read Article
Article

A Guide to Securing Access Controls

1681257600000
Read Article
Article

A Guide To Securing Email at Your Organization

1667347200000
Read Article
Article

A Guide to MFA Bypass Attacks

1701302400000
Read Article
Article

A Guide to Data Encryption

1679443200000
Read Article
Article

A Guide to Funds Transfer Fraud

1655769600000
Read Article
Article

Best Practices for Securing Vendors

1614211200000
Read Article
Article

A Guide to Security Controls For Cloud-Based Organizations

1681862400000
Read Article
Article

A Guide to Common Vulnerabilities and Exposures (CVEs)

1664323200000
Read Article
Article

A Guide to Endpoint Detection Response (EDR)

1668643200000
Read Article
Article

Navigating Third-Party Risk: A Key Component for Business Resilience

1721606400000
Read Article
[DIAGRAM] CrowBar & PH Dashboard Information from Corvus

CrowBar & PH Dashboard Information

Get step-by-step instructions, and helpful information about our platforms, products, and services

Explore The Knowledge Base
 

 

Your partner in the business of risk

Grow your business with cyber insurance solutions backed by expert guidance, industry-leading intelligence, and intuitive risk management tools.

 

Log in to Policyholder Platform

[DIAGRAM] Corvus Broker Platform Login