Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity NewsRetail/Restaurants/Convenience

Victoria’s Secret Security Incident Shuts Down Website

By Jordyn Alger, Managing Editor
Shopping mall

Boudhayan Bardhan via Unsplash

June 2, 2025

Victoria’s Secret took down its United States website after a security incident. BBC News was informed by the police that Scattered Spider, a hacking crime group, is among the suspects. While the website appears to be restored, it previously was replaced with a customer notice stating the organization was “working around the clock to fully restore operations.”  

Security Leaders Weigh In

Darren Guccione, CEO and Co-Founder at Keeper Security:

Cyberattacks are global threats, rarely limited to one nation or region. As Google Threat Intelligence reported, the international spread of the large-scale attacks on major U.K. retailers were to be treated as a “not if, but when” threat for retailers in other regions. The recently-disclosed Memorial Day Weekend attack on Victoria’s Secret matches many of the patterns demonstrated in the breaches on U.K. companies like Harrod’s and Co-op, which may indicate the arrival of the Scattered Spider hacking group in America.

These breaches demonstrate the necessity of proactive cyber strategies. Privileged Access Management (PAM) is one available and reliable defense against cyber threats that will also protect critical resources in the event of a successful attack. Features like automated password rotation and just-in-time access limit a cybercriminal’s ability to gather or steal data, while session monitoring and recording can allow organizations to identify the root cause of a breach. By providing visibility and access management across the entire organization, PAM solutions limit access sprawl, which significantly minimizes the impact of any breach. 

Customers of Victoria’s Secret, especially those with accounts in the company’s online system, should proceed with caution and take proactive steps to prevent the misuse of their data. Attacks like these highlight the critical need to use a password manager as a first line of defense. Account protection begins with a secure password that is not easily guessed and has not been used for any other accounts. A password manager creates high-strength random passwords for every website, application and system. Further, it enables strong forms of MFA, such as an authenticator app, to add layers of protection to your accounts and make it significantly harder for bad actors to gain unauthorized access. Additionally, a dark web monitoring service can alert you if your information shows up on the dark web so that you can take immediate action in real time.

Ben Hutchison, Associate Principal Consultant at Black Duck:

Unfortunately, it is not uncommon for a particular industry sector and classes of organizations to suffer from a wave of similar attacks or seemingly targeted attacks in phases of threat actor operations. They may be considered “victims of the moment,” as unfortunately once a particular attack or threat actor group has been successful in compromising a specific target/sector, this can serve as motivation both for others to engage in similar efforts and for the specific threat actor to double down on their efforts and launch attacks against similar targets. Given the recent rising trend in attacks targeting retail organizations and high street stores, such organizations should treat this as a wakeup call to ensure they are prioritizing their cybersecurity and digital resiliency.

Haviv Rosh, Chief Technology Officer at Pathlock:

The recent expanding campaign against U.S. retailers, including Adidas, highlights a critical need for CISOs to operate under an “assume breach is inevitable” mindset. Today’s cybercrime gangs aren’t just technically skilled — they’re socially creative and relentlessly focused. The question isn’t if they get in, but what happens next.

Specifically, security leaders should incorporate a strategy grounded on three key elements:

First, they should identify crown-jewel assets — the systems and data that drive revenue, trust, or operations. Second, segmenting and isolating critical workloads is important to prevent lateral movement. Third, they must invest in recovery-first infrastructure. This task includes having in place immutable backups with fast restore capability. It also assumes incorporating infrastructure-as-code to redeploy environments quickly. Lastly, serverless or container-based services for modular failover, as well as privileged access governance with real-time audit and drift detection, are essential.

And the final yet critical element of this strategy is continuously testing resilience under real-world conditions. If you don’t test it, it won’t work when it matters. Tabletop exercises, red team drills and recovery dry-runs must be a standard practice.

The modern security program isn’t defined by how many attacks it blocks, but by how confidently it recovers when hit. Resilience is now the most important control.

KEYWORDS: cyberattack retail cyber security website security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Central Library exterior at night

    Cyberattack shuts down Seattle Public Library systems

    See More
  • School bus on an empty street

    Cyberattack compromises and shuts down Highline Public Schools

    See More
  • Open padlock with keyboard keys

    Security leaders discuss the Cisco security incident

    See More

Events

View AllSubmit An Event
  • March 6, 2025

    Why Mobile Device Response is Key to Managing Data Risk

    ON DEMAND: Most organizations and their associating operations have the response and investigation of computers, cloud resources, and other endpoint technologies under lock and key. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing