Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Microsoft donates DocumentDB to the Linux Foundation

      August 25, 2025

      A Week In The Life Of An AI-Augmented Designer

      August 22, 2025

      This week in AI updates: Gemini Code Assist Agent Mode, GitHub’s Agents panel, and more (August 22, 2025)

      August 22, 2025

      Microsoft adds Copilot-powered debugging features for .NET in Visual Studio

      August 21, 2025

      ChatGPT is reportedly scraping Google Search data to answer your questions – here’s how

      August 26, 2025

      The 10 best early Labor Day deals live now: Save on Apple, Samsung and more

      August 26, 2025

      5 rumored Apple iPhone Fold features that have me excited (and frustrated at the same time)

      August 26, 2025

      Forget plug-and-play AI: Here’s what successful AI projects do differently

      August 26, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Log Outgoing HTTP Requests with the Laravel Spy Package

      August 26, 2025
      Recent

      Log Outgoing HTTP Requests with the Laravel Spy Package

      August 26, 2025

      devdojo/auth

      August 26, 2025

      Rust Slices: Cutting Into References the Safe Way

      August 26, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Best AI Girlfriend Simulator [2025 Working Apps and Websites]

      August 25, 2025
      Recent

      Best AI Girlfriend Simulator [2025 Working Apps and Websites]

      August 25, 2025

      8 Best Paid and Free AI Sexting Chat Apps in 2025

      August 25, 2025

      Best AI Anime Art Generator: 7 Best to Use [Free & Premium]

      August 25, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Cyber Insurers Might Not Pay if Vulnerabilities Unpatched

    Cyber Insurers Might Not Pay if Vulnerabilities Unpatched

    August 26, 2025

    Cyber insurers CVE exclusions

    A cyber insurance provider is taking issue with competitors that won’t pay claims resulting from unpatched vulnerabilities.

    In a recent LinkedIn post, cyber insurer Coalition said that while these exclusions are not “widely deployed,” the company has been seeing more of them recently. Some cyber insurers won’t pay if a claim arises from a vulnerability that’s gone unpatched for a certain number of days, the insurer said. Others use a sliding scale, in which the payout falls the longer the vulnerability has gone unpatched.

    One “well-known” U.S. insurer excludes losses arising from CVEs with a CVSS severity score greater than 8.0 if a patch has been available for three weeks and not been applied, Coalition said.

    “This logic might make sense if patching were simple and straightforward,” stated Tiago Henriques, Chief Underwriting Officer at Coalition. “But in reality, vulnerability management is complicated and convoluted, even for businesses with sophisticated security teams.”

    Cyber Insurers and CVE Exclusions

    Coalition looked at the data surrounding the CVSS 8.0 patching exclusion. As of July 2025, more than 61,000 vulnerabilities would fit that exclusion, yet only a little more than 1% of those vulnerabilities are in CISA’s Known Exploited Vulnerabilities (KEV) catalog, the insurer said.

    In an era in which there are more than 40,000 new vulnerabilities a year, “CVE exclusions are putting businesses in an impossible situation,” Henriques said. “Either waste precious resources chasing thousands of low-likelihood vulnerabilities or invest in a cyber insurance policy that risks claim denial when an unpatched system is breached.”

    Coalition didn’t name insurers with patch exclusions or endorsements, but Chubb, for example, may add a “Neglected Software Exploit Endorsement” for policyholders that are lax in applying security fixes.

    “For policyholders that lack strong patch management hygiene, Chubb may address this risk by adding the neglected software exploit endorsement,” Chubb’s website says. “This endorsement provides policyholders with a 45-day grace period to patch software vulnerabilities that are published as Common Vulnerabilities and Exposures (CVEs) within the National Vulnerability Database operated by the U.S. National Institute for Standards and Technology (NIST). After the 45-day grace period expires, there is risk sharing between the policyholder and insurer incrementally shifting to the policyholder, who takes on progressively more of the risk if the vulnerability is not patched at the 45-, 90-, 180-, and 365-day mark.”

    A Risk-based Approach to Cyber Insurance Patching Requirements

    Coalition endorses a more risk-based approach, with technical assistance from the insurer, and rewards policyholders with good security hygiene under its new Active Cyber Policy.

    Coalition Security – the insurer’s security affiliate – focuses on vulnerabilities that are similar to those that have been exploited by ransomware gangs, and sends out alerts “for the most urgent, high-impact threats with significant financial risk,” the company says.

    In 2024, Coalition said it issued an average of 5.5 such alerts per month, representing just 0.15% of published vulnerabilities, and 90% of its policyholders didn’t receive a single alert last year.

    “In other words, if you receive a Coalition security alert, pay attention because it’s important,” the company says.

     

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleWhat I learned from Inspired
    Next Article UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats

    Related Posts

    Development

    Log Outgoing HTTP Requests with the Laravel Spy Package

    August 26, 2025
    Development

    devdojo/auth

    August 26, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Community News: Latest PEAR Releases (07.21.2025)

    Development

    Non-Human Identities: How to Address the Expanding Security Risk

    Development

    Reevaluating SSEs: A Technical Gap Analysis of Last-Mile Protection

    Development

    CVE-2025-36633 – Tenable Agent Local Privilege Escalation

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    News & Updates

    Building your first MCP server: How to extend AI tools with custom capabilities

    August 22, 2025

    Have you ever worked with AI tools and wished they had access to some additional…

    You Can Now Auto-Generate Google Forms Using Gemini Using Prompts or Files – Here’s How

    June 19, 2025

    AI’s biggest impact on your workforce is still to come – 3 ways to avoid getting left behind

    July 18, 2025

    CVE-2025-4815 – Campcodes Sales and Inventory System SQL Injection Vulnerability

    May 17, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.