By Kyle Sawdey, CRO & EVP of Underwriting, SeedPod Cyber | March 2026 In early January, the Crimson Collective extortion group posted to Telegram claiming they had stolen the personal data of more than one million Brightspeed customers. Names, email addresses, phone numbers, billing addresses, service records, partial payment card data, account status. Brightspeed, a […]
Category: Cyber Threats & Incident Analysis
By Kyle Sawdey, CRO & EVP of Insurance, SeedPod Cyber By now, most people in our industry have seen the headlines. Stryker — a Fortune 300 medical device giant with $25 billion in revenue — had its global Microsoft environment hit by a destructive wiper attack on March 11. Over 200,000 endpoints wiped. 50 terabytes […]
By Ryan Windt | Head of Growth Marketing | Updated January 2026 For years, cyber risk conversations focused on stolen data. How many records were exposed?Was customer information compromised?What were the notification costs? That is no longer where the biggest losses occur. Today, business interruption has become the single largest driver of cyber insurance claims — and […]
By Ryan Windt | Head of Growth Marketing | Updated April 2026 Every April, the FBI’s Internet Crime Complaint Center publishes its annual report on cybercrime losses across the United States. Every year, the numbers get worse. The 2024 IC3 Annual Report is no exception. Total reported losses reached $16.6 billion last year, a 33% […]
By Ryan Windt | Head of Growth Marketing | Updated April 2026 Phishing is the starting point for most of the cyber incidents that end up as insurance claims. It is how ransomware gets in. It is how business email compromise begins. It is how credentials get stolen, accounts get compromised, and wire transfers go […]
By Ryan Windt | Head of Growth Marketing | Updated March 2026 In 2023, one of the United Kingdom’s oldest logistics companies ceased to exist because of a weak password. KNP Logistics Group, founded in 1865, was hit by a ransomware attack after hackers gained access through a remote desktop protocol endpoint protected by the […]
In September 2023, social-engineering crews hit MGM Resorts and Caesars Entertainment. Caesars reportedly paid a ransom around $15M, while MGM booked more than $100M in business impact. The entry point wasn’t a zero-day; it was identity tricks and help-desk manipulation. AP News Same playbook, new headlines (2024–2025) Bottom line: attackers don’t need your zero-days if they can […]
By Ryan Windt | Head of Growth Marketing | Updated March 2026 Even strong security programs can’t make risk disappear—but they can make incidents survivable. The 2022 LastPass breach is still a great teaching moment because it produced two dramatically different outcomes for users depending on basic habits. Context: What happened at LastPass (short timeline) Aug 2022 – […]
The answer is yes. Here’s why – and specific steps to mitigate the threats.
The truth is that, despite dramatic plot-lines in movies and news stories, the most common cybersecurity threat isn’t from shadowy, skilled hackers, but from all-too-human mistakes and weakness within your organization.
By Ryan Windt | Head of Growth Marketing | Updated March 2026 SaaS made business faster, cheaper, and more collaborative—but it also shifted risk into places that traditional perimeter tools can’t see. Most compromises don’t start with exotic zero-days; they start with misconfiguration, excessive permissions, malicious OAuth consent, or a weak help-desk workflow. This rewrite […]
By Ryan Windt | Head of Growth Marketing | Updated March 2026 Every year, three reports do more to shape how cyber insurance is priced and underwritten than almost anything else: the Verizon Data Breach Investigations Report, the NetDiligence Cyber Claims Study, and the Cyentia IRIS study. Together they give you a view of the […]