article thumbnail

Luxury, Loyalty and Lateral Movement: Retail and Banking Attacks Surge

SecureWorld News

In a matter of days, three major cybersecurity incidents have hit the retail and financial services sectors, drawing renewed attention to supply chain vulnerabilities, credential-based attacks, and the increasing value of non-financial customer data. The retail sector can find themselves caught in tradeoffs," said BeyondTrust's Maude.

Retail 68
article thumbnail

Cyber Criminals and Groceries?

SecureWorld News

In early May 2025, two of the United Kingdom's best-known grocers, Marks & Spencer (M&S) and the Co-op, as well as luxury retailer Harrods, were struck by sophisticated social-engineering attacks that tricked IT teams into resetting critical passwords and deploying ransomware across their networks. retail industry.

Retail 107
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Unanswered Questions Loom Over Cyber Attacks on M&S, Co-op & Harrods

Jane Frankland

Then, the focus of cyber attacks on retailers, and what lessons must be learned by business leaders and customers. These hackers, often part of loosely affiliated communities like “The Com,” use innovative methods and target industries like retail, telecoms, and finance for maximum impact.

article thumbnail

Amazon's Latest Data Breach a Ripple Effect of MOVEit

SecureWorld News

The online retail giant confirmed Monday that some employee data, including names and email addresses, was obtained by a threat actor in a breach that impacted a third-party vendor. The threat actor responsible for the breach, known as "Nam3L3ss," has been actively exploiting the MOVEit vulnerability to target numerous organizations.

article thumbnail

Oracle April 2025 Critical Patch Update Addresses 171 CVEs

Security Boulevard

A full breakdown of the patches for this quarter can be seen in the following table, which also includes a count of vulnerabilities that can be exploited over a network without authentication.

article thumbnail

16 billion passwords leaked across Apple, Google, more: What to know and how to protect yourself

Zero Day

We gather data from the best available sources, including vendor and retailer listings as well as other relevant and independent reviews sites. When you click through from our site to a retailer and buy a product or service, we may earn affiliate commissions. Many vendors are now exploring passwordless authentication.

Passwords 101
article thumbnail

2025 Supply Chain Threat Landscape: AI, APIs, and the Weakest Link

SecureWorld News

A stark example came in early 2025: a major global retailer was breached not through its network, but via a little-known third-party SaaS provider handling employee onboarding. Ensure you have backup systems and data (with offline, immutable backups) in place in case a critical supplier or cloud service is compromised by ransomware.