Third Party Vendor Risks

The threat landscape has transformed significantly over the last decade. As organizations have invested in security controls, tools and personnel to combat threats, threat actors have found other ways to infect systems and ultimately compromise organizations. As a result, threat actor groups have begun to target third-party vendors. Organizations rely heavily on their third-party vendors…

Read More

Phishing-As-A-Service (PHASS) Platforms and Frameworks

PHISHING-AS-A-SERVICE (PHAAS) allows attackers to create individual phishing campaigns, schedule and process emails and a lot of other related procedures that are involved in phishing computer targets. While most currently available PhaaS platforms are designed to test the resilience of organizations and their ability to detect social engineering attempts against their employees and help craft…

Read More

Collaboration in the Twin Cities – Recap of Minneapolis’ Regional Intelligence Workshop

The commitment to increasing retailer’s cyber security posture via collaboration, partnership and sharing threat intelligence was evident at the RH-ISAC Regional Intelligence Workshop, hosted at member company Target’s headquarters June 7. Rich Agostino, Target’s CISO, kicked things off with a powerful opening statement indicating, “Cybersecurity is critical to the success of the entire organization. Collaboration…

Read More

RH-ISAC goes to Canada

We took our workshop tour to Canada on Tuesday to host the first RH-ISAC Canadian Retail Cybersecurity Invitational with our partner, Deloitte. The one-day gathering brought cybersecurity professionals together from Canada’s leading retail, grocer, consumer products, entertainment, and hospitality organizations. The day increased local retailers’ awareness of shared cybersecurity challenges and we began meaningful discussions…

Read More

Compromised Point-of-Sale Data Remains a Staple Among Fraudsters

By Kathleen Weinberger and Roman Sannikov Below is a featured blog post from associate member Flashpoint. This comes as a follow-up to the webinar they presented recently to the RH-ISAC membership. We thank them for their expertise and willingness to share and support the RH-ISAC’s community of retail cybersecurity practitioners.    Fraud is a persistent…

Read More