<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Retail/Restaurants/Convenience</title>
    <description>
      <![CDATA[It's image in addition to shrink reduction, internal theft and organized retail crime.]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2243-retail-restaurants-convenience</link>
    <language>en-us</language>
    <item>
      <title>Threat Actors Target the Entire Retail Supply Chain</title>
      <description>
        <![CDATA[<p>The full supply chain is at risk for cyberattacks.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102174</guid>
      <pubDate>Wed, 18 Mar 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102174-threat-actors-target-the-entire-retail-supply-chain</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/03-March/SEC-0326-News2-Feat-Slide1-1170x658.webp?t=1773666213" type="image/jpeg" length="120974"/>
    </item>
    <item>
      <title>Expert Insight on Under Armour’s Exposed Customer Data</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>
72 million emails have been exposed.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102090</guid>
      <pubDate>Wed, 21 Jan 2026 14:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102090-expert-insight-on-under-armours-exposed-customer-data</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/21/Under-Armour-logo-in-store-by-Kyle-Bushnell.webp?t=1769020951" type="image/png" length="225593"/>
    </item>
    <item>
      <title>Grubhub Data Stolen in Confirmed Hack, Questions Remain</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The specifics of the Grubhub hacking remain unclear.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102081</guid>
      <pubDate>Fri, 16 Jan 2026 13:15:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102081-grubhub-data-stolen-in-confirmed-hack-questions-remain</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/16/Man-on-motorcycle-with-delivery-by-Rowan-Freeman.webp?t=1768587020" type="image/png" length="373545"/>
    </item>
    <item>
      <title>Target’s Source Code Confirmed Stolen: Why Does This Matter? </title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Source code theft can leave an organization more vulnerable than before.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102075</guid>
      <pubDate>Tue, 13 Jan 2026 11:20:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102075-targets-source-code-confirmed-stolen-why-does-this-matter</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/13/Target-store-by-Shabaz-Usmani.webp?t=1768320862" type="image/png" length="699629"/>
    </item>
    <item>
      <title>34M Impacted by Coupang Breach, Security Leaders Respond</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Security leaders discuss the&nbsp;<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Coupang data breach, which affected approximately 34 million customers.&nbsp;</span></p><br>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102026</guid>
      <pubDate>Tue, 02 Dec 2025 07:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102026-34m-impacted-by-coupang-breach-security-leaders-respond</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/01/Three-rendered-online-tabs-by-Choong-Deng-Xiang.webp?t=1764812378" type="image/png" length="45302"/>
    </item>
    <item>
      <title>Securing Retail’s Trillion-Dollar Season: How Cybercriminals Exploit Peak Holiday Pressure</title>
      <description>
        <![CDATA[<p>5 recommendations to strengthen retail cyber resilience during the holiday season.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102024</guid>
      <pubDate>Tue, 02 Dec 2025 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102024-securing-retails-trillion-dollar-season-how-cybercriminals-exploit-peak-holiday-pressure</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/01/Gift-cards-and-credit-cards-by-Dylan-Gillis.webp?t=1764812376" type="image/png" length="557124"/>
    </item>
    <item>
      <title>Holiday Mobile Threats Quadrupled in 2024 — What’s Expected This Year?</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>With cyber threats only growing in sophistication and speed, it’s likely that retailers and shoppers alike will be facing another increase in attacks and scams this year.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102010</guid>
      <pubDate>Fri, 14 Nov 2025 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102010-holiday-mobile-threats-quadrupled-in-2024-whats-expected-this-year</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/11/13/Rendered-shopping-cart-with-boxes-and-bags-by-Shutter-Speed.webp?t=1763053279" type="image/png" length="200445"/>
    </item>
    <item>
      <title>Shoplifting in the US: Problems, Progress, and the Path Forward</title>
      <description>
        <![CDATA[<p>As shoplifters grow bolder, security leaders need to be more creative to protect their property and employees.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101991</guid>
      <pubDate>Wed, 05 Nov 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101991-shoplifting-in-the-us-problems-progress-and-the-path-forward</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/11-November/SEC-1125-F2-Feat-Slide1-1170x658.webp?t=1763157544" type="image/jpeg" length="117152"/>
    </item>
    <item>
      <title>Security Leaders Discuss Restaurant Brands International’s Vulnerabilities</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>According to research from two ethical hackers, Restaurant Brands International (RBI) has security flaws that could enable a malicious actor to remotely eavesdrop on orders in the drive-through.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101909</guid>
      <pubDate>Tue, 16 Sep 2025 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101909-security-leaders-discuss-restaurant-brands-internationals-vulnerabilities</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/09/15/Hamburger-by-Ilya-Mashkov.webp?t=1757950172" type="image/png" length="538674"/>
    </item>
    <item>
      <title>Cybersecurity in Retail Amidst Escalating Attacks</title>
      <author></author>
      <description>
        <![CDATA[<p>Myke Lyons, CISO at Cribl, discusses cybersecurity in retail, especially in relation to the recent string of attacks against the sector.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101706</guid>
      <pubDate>Wed, 25 Jun 2025 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101706-cybersecurity-in-retail-amidst-escalating-attacks</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/06/18/Myke-Lyons-podcast-news-header.webp?t=1750272890" type="image/png" length="106560"/>
    </item>
    <item>
      <title>Autonomous Shopping Agents Bring Innovation — and New Security Risks</title>
      <description>
        <![CDATA[<p>It is only a matter of time until empowered AI agents routinely browse, select and buy goods online without step-by-step human intervention.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101696</guid>
      <pubDate>Tue, 17 Jun 2025 01:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101696-autonomous-shopping-agents-bring-innovation-and-new-security-risks</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/06/16/Rendered-shopping-cart-with-boxes-and-bags-by-Shutter-Speed.webp?t=1751514038" type="image/png" length="200445"/>
    </item>
    <item>
      <title>Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Harrods, Marks & Spencer, Adidas and more — why are retailers facing this wave of cyberattacks in recent months?&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101674</guid>
      <pubDate>Thu, 05 Jun 2025 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101674-why-are-cyberattacks-targeting-retail-experts-share-their-thoughts</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/06/04/Gift-cards-and-credit-cards-by-Dylan-Gillis.webp?t=1749053598" type="image/png" length="557124"/>
    </item>
    <item>
      <title>Victoria’s Secret Security Incident Shuts Down Website</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Victoria’s Secret took down its United States website after a security incident.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101661</guid>
      <pubDate>Mon, 02 Jun 2025 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101661-victorias-secret-security-incident-shuts-down-website</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/05/30/Shopping-mall-by-Boudhayan-Bardhan.webp?t=1748612901" type="image/png" length="710022"/>
    </item>
    <item>
      <title>Update on Marks &amp; Spencer Cyberattack</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Marks & Spencer (M&S) has provided an update on the cyberattack it recently experienced.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101632</guid>
      <pubDate>Fri, 16 May 2025 01:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101632-update-on-marks-and-spencer-cyberattack</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/05/15/Colorful-jackets-by-The-Nix-Company.webp?t=1747318693" type="image/png" length="448172"/>
    </item>
    <item>
      <title>AI overhaul at McDonald’s needs a super-sized security approach </title>
      <description>
        <![CDATA[<p>Introducing new technology at the many customer interfaces in quick service restaurants opens up fresh attack surfaces for threat actors. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/101506</guid>
      <pubDate>Mon, 31 Mar 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/101506-ai-overhaul-at-mcdonalds-needs-a-super-sized-security-approach</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/03/28/McDonalds-by-Jason-Miraples.webp?t=1744084368" type="image/png" length="711411"/>
    </item>
    <item>
      <title>SEC establishes Cyber and Emerging Technologies Unit</title>
      <author></author>
      <description>
        <![CDATA[<p>The SEC has announced it established the Cyber and Emerging Technologies Unit.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101415</guid>
      <pubDate>Mon, 24 Feb 2025 12:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101415-sec-establishes-cyber-and-emerging-technologies-unit</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/02/21/Golden-lights-by-Joshua-Sortino.webp?t=1740161804" type="image/png" length="929161"/>
    </item>
    <item>
      <title>Retail resilience: Technology strategies to combat organized theft </title>
      <description>
        <![CDATA[<p>3 strategies that leverage innovative solutions to combat organized retail theft.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101402</guid>
      <pubDate>Wed, 19 Feb 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101402-retail-resilience-technology-strategies-to-combat-organized-theft</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/02/18/Colorful-jackets-by-The-Nix-Company.webp?t=1740802514" type="image/png" length="448172"/>
    </item>
    <item>
      <title>Understanding the language of law enforcement</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Douglas Horsting, Manager of Organized Retail Crime & Special Investigations/Law Enforcement Liaison at Rite Aid, shares his insights on successfully partnering with law enforcement.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101333</guid>
      <pubDate>Fri, 07 Feb 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101333-understanding-the-language-of-law-enforcement</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/02-February/SEC-0225-Profiles-Feat-Slide1-1170x658.webp?t=1739985926" type="image/jpeg" length="94744"/>
    </item>
    <item>
      <title>U.S. retail workers report feeling unsafe through holiday season</title>
      <description>
        <![CDATA[<p>Retail workers report fear for their safety over the past holiday season.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101286</guid>
      <pubDate>Mon, 13 Jan 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101286-us-retail-workers-report-feeling-unsafe-through-holiday-season</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/01-January/SEC-0125-News2-Feat-Slide1-1170x658.webp?t=1736438173" type="image/jpeg" length="89765"/>
    </item>
    <item>
      <title>Survey: Parking lot safety influences holiday shopping habits</title>
      <author></author>
      <description>
        <![CDATA[<p>Perceptions of safety influence holiday shopping habits, with parking lot security being a major factor.  </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101267</guid>
      <pubDate>Fri, 20 Dec 2024 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101267-survey-parking-lot-safety-influences-holiday-shopping-habits</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/12/19/Dark-parking-garage-by-Luismi-Snchez.webp?t=1734627222" type="image/png" length="433738"/>
    </item>
    <item>
      <title>5M unique credit and debit cards exposed in data breach</title>
      <author></author>
      <description>
        <![CDATA[<p>The details of 5 million unique credit and debit cards were exposed in a data breach. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101263</guid>
      <pubDate>Thu, 19 Dec 2024 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101263-5m-unique-credit-and-debit-cards-exposed-in-data-breach</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/12/18/Credit-card-and-padlock-by-Ryan-Born.webp?t=1734537501" type="image/png" length="421206"/>
    </item>
    <item>
      <title>Top 5 sectors targeted with subject customization techniques</title>
      <author></author>
      <description>
        <![CDATA[<p>Research has revealed the 5 industries most frequently targeted with subject customization techniques. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101241</guid>
      <pubDate>Wed, 11 Dec 2024 12:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101241-top-5-sectors-targeted-with-subject-customization-techniques</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/12/10/Email-icon-by-Mariia-Shalabaieva.webp?t=1733852209" type="image/png" length="150591"/>
    </item>
    <item>
      <title>Phishing attacks rose by more than 600% in the buildup to Black Friday</title>
      <author></author>
      <description>
        <![CDATA[<p>In the week leading up to Black Friday and Cyber Monday, there was a 692% increase in phishing attacks. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101228</guid>
      <pubDate>Fri, 06 Dec 2024 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101228-phishing-attacks-rose-by-more-than-600-in-the-buildup-to-black-friday</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/12/05/Dangling-fishing-hook-by-Kasia-Derenda.webp?t=1733511628" type="image/png" length="134626"/>
    </item>
    <item>
      <title>Study finds crime is causing retail workers to search for new roles</title>
      <author></author>
      <description>
        <![CDATA[<p>A recent study has shown that crime is causing retail employees to search for new employment opportunities. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101216</guid>
      <pubDate>Tue, 03 Dec 2024 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101216-study-finds-crime-is-causing-retail-workers-to-search-for-new-roles</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/12/02/Shopping-Carts-by-Markus-Spiske.webp?t=1734161151" type="image/png" length="574617"/>
    </item>
    <item>
      <title>Security leaders discuss risks and offer advice on seasonal scams</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>A new report from reveals the state of the e-commerce threat landscape as the holidays approach. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101210</guid>
      <pubDate>Tue, 26 Nov 2024 12:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101210-security-leaders-discuss-risks-and-offer-advice-on-seasonal-scams</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/11/25/Four-presents-UNSPLSH.webp?t=1732556736" type="image/png" length="458523"/>
    </item>
    <item>
      <title>Black Friday gaming sales could be disrupted by bots</title>
      <author></author>
      <description>
        <![CDATA[<p>Recent research shows that bots could disrupt Black Friday gaming sales. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101203</guid>
      <pubDate>Mon, 18 Nov 2024 12:00:11 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101203-black-friday-gaming-sales-could-be-disrupted-by-bots</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/11/15/Black-Friday-sale-sign-UNSPLASH.webp?t=1731688471" type="image/png" length="403905"/>
    </item>
    <item>
      <title>60% increase in scam domain registrations targeting holiday shoppers</title>
      <author></author>
      <description>
        <![CDATA[<p>Research <span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">reveals more than 6,000 domain registrations in the past 90 days, targeting the retail industry.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101197</guid>
      <pubDate>Thu, 14 Nov 2024 09:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101197-60-increase-in-scam-domain-registrations-targeting-holiday-shoppers</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/11/13/Money-wrapped-on-a-holdaiy-parcel-UNSPLASH.webp?t=1731514009" type="image/png" length="685832"/>
    </item>
    <item>
      <title>Use technology to maintain assets and reduce shrink in retail</title>
      <description>
        <![CDATA[<p>Retailers are taking extraordinary measures to protect their shelves from theft. How can technology help mitigate risk?</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101164</guid>
      <pubDate>Mon, 04 Nov 2024 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101164-use-technology-to-maintain-assets-and-reduce-shrink-in-retail</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/10/30/Person-using-ATM-UNSPLASH.webp?t=1731098763" type="image/png" length="427478"/>
    </item>
    <item>
      <title>Risks and rewards: Managing loyalty program privacy and security</title>
      <description>
        <![CDATA[<p>Managing loyalty programs isn’t without its challenges. With evolving privacy laws and growing consumer awareness, businesses must carefully balance personalization with privacy. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101147</guid>
      <pubDate>Mon, 28 Oct 2024 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101147-risks-and-rewards-managing-loyalty-program-privacy-and-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/10/21/Woman-at-cash-register-UNSPLASH.webp?t=1730494641" type="image/png" length="489127"/>
    </item>
    <item>
      <title>Navigating the new terrain: Pioneering smart solutions in retail</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">In the dynamic world of retail, the pace of change has accelerated dramatically, driven by technological innovation and a shared commitment to exceeding customer expectations. </span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101142</guid>
      <pubDate>Mon, 21 Oct 2024 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101142-navigating-the-new-terrain-pioneering-smart-solutions-in-retail</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/10/18/Rack-of-clothes-UNSPLASH.webp?t=1729262556" type="image/png" length="639182"/>
    </item>
  </channel>
</rss>
