Company Details
coalition
7
474
53112
coalitionspace.com
0
COA_1455700
In-progress


Coalition Space - Office Space, Coworking, HQ, Virtual Offices Company CyberSecurity Posture
coalitionspace.comCoalition Space is a pioneering flexible term office space firm with locations in New York City, Jersey City, and Denver. We offer curated shared office space, private offices, coworking, virtual offices, enterprise HQ workspace and meeting rooms with value-added features such as expanded lounge areas and engaged business communities. Schedule a no-nonsense tour here: https://calendly.com/coalition-workspace-nyc-chi-bos-office or call 212-268-2100. We serve large corporations to start-ups, technology groups, professional investment managers, and all teams from 1-100+. We take pride in designing, building, and operating custom spaces for established and growing brands using evidence-based workplace strategies. Come view our locations in New York City, Jersey City, and Denver.
Company Details
coalition
7
474
53112
coalitionspace.com
0
COA_1455700
In-progress
Between 700 and 749

CSOSCHVO Global Score (TPRM)XXXX

Description: Email-Based Cyberattacks Dominate 2024 Claims, Outpacing Ransomware in Frequency A new report from San Francisco-based Coalition Insurance reveals that business email compromise (BEC) and funds transfer fraud (FTF) accounted for 60% of cyber insurance claims in 2024 far surpassing ransomware as the most common threat. While ransomware remained the most costly attack type, email-related incidents drove the majority of policyholder losses, with 29% of BEC attacks leading to fraudulent transfers. The 2025 Cyber Claims Report, released this month, highlights a 23% increase in BEC severity year-over-year, with average losses rising to $35,000 per incident. Legal fees, incident response costs, and recovery efforts contributed to the spike. Meanwhile, FTF claims saw a 46% drop in severity, averaging $185,000 per case down from a record $340,000 in 2023 as financial institutions improved fraud detection, flagging large transactions for review. Despite the decline, FTF losses remain volatile, with one 2024 case involving a $9.3 million fraudulent transfer that was later recovered. Coalition successfully recovered $31 million in stolen funds for clients in 2024, averaging $278,000 per case. The report underscores the role of social engineering in these attacks, with threat actors using AI-enhanced phishing and deepfake audio/video to impersonate executives or trusted entities. The FBI reported that BEC scams in 2023 affected all 50 U.S. states and 186 countries, with losses exceeding $55 million. While ransomware frequency declined by 3%, it remained the most damaging attack type, with average demands dropping 22% to $1.1 million the first time in two years they fell below seven figures. Akira was the most prevalent ransomware variant, followed by Play, MedusaLocker, RansomHub, and Fog. The cyber insurance market continues to evolve amid rising threats, with global spending projected to grow from $20.88 billion in 2023 to $120.47 billion by 2032. Insurers and cybersecurity firms are introducing AI-driven tools to streamline policy analysis and risk assessment, aiming to improve access and clarity for businesses.


No incidents recorded for Coalition Space - Office Space, Coworking, HQ, Virtual Offices in 2026.
No incidents recorded for Coalition Space - Office Space, Coworking, HQ, Virtual Offices in 2026.
No incidents recorded for Coalition Space - Office Space, Coworking, HQ, Virtual Offices in 2026.
CSOSCHVO cyber incidents detection timeline including parent company and subsidiaries

Coalition Space is a pioneering flexible term office space firm with locations in New York City, Jersey City, and Denver. We offer curated shared office space, private offices, coworking, virtual offices, enterprise HQ workspace and meeting rooms with value-added features such as expanded lounge areas and engaged business communities. Schedule a no-nonsense tour here: https://calendly.com/coalition-workspace-nyc-chi-bos-office or call 212-268-2100. We serve large corporations to start-ups, technology groups, professional investment managers, and all teams from 1-100+. We take pride in designing, building, and operating custom spaces for established and growing brands using evidence-based workplace strategies. Come view our locations in New York City, Jersey City, and Denver.


Senior Commercial Associate, top 1.7 percent of performers among NRT’s sales associates in the nation. Active member of the International Council of Shopping Centers. Isaac's main focus is taking care of his clients, helping them to create and maximize wealth and assisting them in achieving their g
.png)
Operational tech security startups are drumming up interest again as cyberattacks pick up. Why it matters: They appeal to both tech...
On 20 and 21 January 2026, the European Commission presented its proposals for a Cybersecurity Act 2 (CSA2) and a Digital Networks Act (DNA)...
CertiK co-founder Ronghui Gu said the cybersecurity firm is exploring paths to go public in an interview this week in Davos, Switzerland.
ReliaQuest has shared an update. The company announced an upcoming webinar focused on modern detection strategies for cybersecurity operations.
Global Legal Insights' tenth edition of “Fund Finance” features a chapter titled, “Data Privacy and Cybersecurity Considerations for Private...
Fortinet, Palo Alto Networks, CrowdStrike, Globant, and SentinelOne are the five Cybersecurity stocks to watch today, according to...
As businesses continue their digital transformation journeys, they are exposed to an ever-expanding attack surface.
Corr-Serve, a South African value-added distributor of cybersecurity solutions, has strengthened its long-standing partnership with Seceon,...
HHS must address the persistent cybersecurity threats facing the healthcare sector and adapt its approach to cybersecurity within the...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Coalition Space - Office Space, Coworking, HQ, Virtual Offices is http://www.coalitionspace.com.
According to Rankiteo, Coalition Space - Office Space, Coworking, HQ, Virtual Offices’s AI-generated cybersecurity score is 711, reflecting their Moderate security posture.
According to Rankiteo, Coalition Space - Office Space, Coworking, HQ, Virtual Offices currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Coalition Space - Office Space, Coworking, HQ, Virtual Offices has been affected by a supply chain cyber incident involving PLAYSTUDIOS ISRAEL, with the incident ID FBICOAPLA1766711007.
According to Rankiteo, Coalition Space - Office Space, Coworking, HQ, Virtual Offices is not certified under SOC 2 Type 1.
According to Rankiteo, Coalition Space - Office Space, Coworking, HQ, Virtual Offices does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Coalition Space - Office Space, Coworking, HQ, Virtual Offices is not listed as GDPR compliant.
According to Rankiteo, Coalition Space - Office Space, Coworking, HQ, Virtual Offices does not currently maintain PCI DSS compliance.
According to Rankiteo, Coalition Space - Office Space, Coworking, HQ, Virtual Offices is not compliant with HIPAA regulations.
According to Rankiteo,Coalition Space - Office Space, Coworking, HQ, Virtual Offices is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Coalition Space - Office Space, Coworking, HQ, Virtual Offices operates primarily in the Leasing Non-residential Real Estate industry.
Coalition Space - Office Space, Coworking, HQ, Virtual Offices employs approximately 7 people worldwide.
Coalition Space - Office Space, Coworking, HQ, Virtual Offices presently has no subsidiaries across any sectors.
Coalition Space - Office Space, Coworking, HQ, Virtual Offices’s official LinkedIn profile has approximately 474 followers.
Coalition Space - Office Space, Coworking, HQ, Virtual Offices is classified under the NAICS code 53112, which corresponds to Lessors of Nonresidential Buildings (except Miniwarehouses).
No, Coalition Space - Office Space, Coworking, HQ, Virtual Offices does not have a profile on Crunchbase.
Yes, Coalition Space - Office Space, Coworking, HQ, Virtual Offices maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/coalition.
As of January 23, 2026, Rankiteo reports that Coalition Space - Office Space, Coworking, HQ, Virtual Offices has experienced 1 cybersecurity incidents.
Coalition Space - Office Space, Coworking, HQ, Virtual Offices has an estimated 1,881 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.
Total Financial Loss: The total financial loss from these incidents is estimated to be $40.52 million.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with incident response firms, and recovery measures with fund recovery efforts ($31 million recovered in 2024)..
Title: Business Email Compromise (BEC) and Funds Transfer Fraud (FTF) Incidents - 2024 Trends
Description: Coalition Insurance reported that 60% of cyber claims in 2024 were related to BEC and FTF incidents, with 29% of BEC events resulting in FTF. The severity of BEC attacks increased by 23%, with an average loss of $35,000, while FTF severity dropped by 46% to an average loss of $185,000. Threat actors used social engineering, AI tools, and deepfakes to enhance phishing attacks. Ransomware remained the most damaging attack type, though its frequency and ransom demands decreased.
Date Publicly Disclosed: 2025-01
Type: Business Email Compromise (BEC)
Attack Vector: EmailSocial EngineeringPhishingAI-Enhanced PhishingDeepfake
Motivation: Financial Gain
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Financial Loss: $35,000 (average BEC loss)$185,000 (average FTF loss)$9.3 million (single FTF incident recovered)$31 million (total recovered in 2024)
Operational Impact: Legal expensesIncident response costsData miningNotificationsMitigation and recovery efforts
Average Financial Loss: The average financial loss per incident is $40.52 million.

Entity Type: Businesses
Location: Global (50 U.S. states, 186 countries)

Third Party Assistance: Incident Response Firms.
Recovery Measures: Fund recovery efforts ($31 million recovered in 2024)
Third-Party Assistance: The company involves third-party assistance in incident response through Incident response firms, .

Ransom Demanded: $1.1 million (average, down 22% YoY)
Ransomware Strain: AkiraPlayMedusaLockerRansomHubFog
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Fund recovery efforts ($31 million recovered in 2024), .

Lessons Learned: Email attacks remain a major vector due to their ease of execution and effectiveness. AI and deepfakes are increasingly used to enhance phishing attacks. Financial institutions are improving fraud detection for large transactions, reducing FTF severity. Cyber insurance and risk management tools are evolving to simplify access and understanding for businesses.

Recommendations: Use filtered email services to detect malicious files and links., Train employees to recognize phishing attempts., Implement multi-factor authentication (MFA) for financial transactions., Enhance monitoring for large or suspicious transactions., Leverage cyber insurance and risk management platforms for better protection.Use filtered email services to detect malicious files and links., Train employees to recognize phishing attempts., Implement multi-factor authentication (MFA) for financial transactions., Enhance monitoring for large or suspicious transactions., Leverage cyber insurance and risk management platforms for better protection.Use filtered email services to detect malicious files and links., Train employees to recognize phishing attempts., Implement multi-factor authentication (MFA) for financial transactions., Enhance monitoring for large or suspicious transactions., Leverage cyber insurance and risk management platforms for better protection.Use filtered email services to detect malicious files and links., Train employees to recognize phishing attempts., Implement multi-factor authentication (MFA) for financial transactions., Enhance monitoring for large or suspicious transactions., Leverage cyber insurance and risk management platforms for better protection.Use filtered email services to detect malicious files and links., Train employees to recognize phishing attempts., Implement multi-factor authentication (MFA) for financial transactions., Enhance monitoring for large or suspicious transactions., Leverage cyber insurance and risk management platforms for better protection.
Key Lessons Learned: The key lessons learned from past incidents are Email attacks remain a major vector due to their ease of execution and effectiveness. AI and deepfakes are increasingly used to enhance phishing attacks. Financial institutions are improving fraud detection for large transactions, reducing FTF severity. Cyber insurance and risk management tools are evolving to simplify access and understanding for businesses.

Source: Coalition 2025 Cyber Claims Report
Date Accessed: 2025-01

Source: FBI Report on BEC Scams (2023)
Date Accessed: 2024-09

Source: MSSP Alert

Source: Fortune Business Insights
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Coalition 2025 Cyber Claims ReportDate Accessed: 2025-01, and Source: FBI Report on BEC Scams (2023)Date Accessed: 2024-09, and Source: MSSP Alert, and Source: Fortune Business Insights.

Root Causes: Social Engineering, Ai-Enhanced Phishing, Lack Of Employee Awareness, Insufficient Transaction Monitoring,
Corrective Actions: Improved Email Filtering, Employee Training, Enhanced Transaction Monitoring, Adoption Of Cyber Insurance Tools,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Incident Response Firms, .
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Improved Email Filtering, Employee Training, Enhanced Transaction Monitoring, Adoption Of Cyber Insurance Tools, .
Last Ransom Demanded: The amount of the last ransom demanded was $1.1 million (average, down 22% YoY).
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-01.
Highest Financial Loss: The highest financial loss from an incident was ['$35,000 (average BEC loss)', '$185,000 (average FTF loss)', '$9.3 million (single FTF incident recovered)', '$31 million (total recovered in 2024)'].
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was incident response firms, .
Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was $1.1 million (average, down 22% YoY).
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Email attacks remain a major vector due to their ease of execution and effectiveness. AI and deepfakes are increasingly used to enhance phishing attacks. Financial institutions are improving fraud detection for large transactions, reducing FTF severity. Cyber insurance and risk management tools are evolving to simplify access and understanding for businesses.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Train employees to recognize phishing attempts., Implement multi-factor authentication (MFA) for financial transactions., Leverage cyber insurance and risk management platforms for better protection., Enhance monitoring for large or suspicious transactions. and Use filtered email services to detect malicious files and links..
Most Recent Source: The most recent source of information about an incident are Coalition 2025 Cyber Claims Report, MSSP Alert, Fortune Business Insights and FBI Report on BEC Scams (2023).
.png)
Improper validation of specified type of input in M365 Copilot allows an unauthorized attacker to disclose information over a network.
Improper access control in Azure Front Door (AFD) allows an unauthorized attacker to elevate privileges over a network.
Azure Entra ID Elevation of Privilege Vulnerability
Moonraker is a Python web server providing API access to Klipper 3D printing firmware. In versions 0.9.3 and below, instances configured with the "ldap" component enabled are vulnerable to LDAP search filter injection techniques via the login endpoint. The 401 error response message can be used to determine whether or not a search was successful, allowing for brute force methods to discover LDAP entries on the server such as user IDs and user attributes. This issue has been fixed in version 0.10.0.
Runtipi is a Docker-based, personal homeserver orchestrator that facilitates multiple services on a single server. Versions 3.7.0 and above allow an authenticated user to execute arbitrary system commands on the host server by injecting shell metacharacters into backup filenames. The BackupManager fails to sanitize the filenames of uploaded backups. The system persists user-uploaded files directly to the host filesystem using the raw originalname provided in the request. This allows an attacker to stage a file containing shell metacharacters (e.g., $(id).tar.gz) at a predictable path, which is later referenced during the restore process. The successful storage of the file is what allows the subsequent restore command to reference and execute it. This issue has been fixed in version 4.7.0.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.