RH-ISAC Offers Events and Programs Around the Globe

As the ISAC for the global retail and hospitality sectors, RH-ISAC will host several in-person events in Europe this quarter to continue to serve companies that have a strong presence in the region, including Nestlé, Ahold Delhaize, Natural &Co, Tesco, and Danone. Additionally, RH-ISAC has programming to serve cybersecurity personnel in the Asia-Pacific market and…

Read More

RH-ISAC Adopts TLP 2.0 Standards

The Retail and Hospitality Information Sharing and Analysis Center (RH-ISAC) today announced its adoption of the FIRST Standard Definitions and Usage Guidance — Traffic Light Protocol (TLP) Version 2.0 for sharing information within the organization. As of January 4, 2023, all RH-ISAC intelligence reports, community calls, workshops, and briefings will follow TLP 2.0 standards. The intelligence team will discuss…

Read More

Defining Zero Trust Architecture (ZTA) for the Retail and Hospitality Community

Over the last few years, zero trust has become the latest buzzword in the security industry, right up there with digital transformation and shift left. For many, zero trust is seen as a marketing ploy, designed to sell yet another product. For others, zero trust is an abstract ideal with no clear implementation path. In…

Read More

Double Trouble: Why Account Takeover and Fake Accounts are Still Succeeding

Account takeover (ATO) and fake account generation attacks have become wildly successful in recent years, so much so that the FBI’s Cyber Division issued a recent warning to businesses about the growing threat of automated attacks. To better understand the current landscape as it pertains to retailers, Kasada analyzed the National Retail Federation’s (NRF) Top…

Read More

New Backdoor “Maggie” Targets Microsoft SQL Servers with Focus on APAC Region

Context On October 4, 2022, DCSO CyTec security researchers reported the technical details of a new backdoor malware targeting Microsoft SQL servers they dubbed “Maggie.” According to researchers, the Maggie backdoor can bruteforce logins to other MSSQL servers and add a new hardcoded backdoor user after bruteforcing administrator logins. Researchers did not investigate if and…

Read More