Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Hackers Hate This: The New Playbook for Retail Threat Defence

Retailers are facing increasingly targeted, financially driven cyberattacks, from ransomware to supply chain compromise. Yet many remain reactive. Threat intelligence changes the game, enabling earlier detection, faster response, and deeper risk visibility. Our latest CYJAX whitepaper explores the retail sector’s biggest cyber challenges, the value of intelligence-led security, and practical steps to build resilience.

The "So What?" Problem in Threat Intelligence

Defense teams and many others across the organization don’t always understand what intelligence is or how to use it. Scott Scher explains why that second part, how to use it, is what CTI teams often miss. Scott shares why intelligence must go beyond reports and clearly communicate what matters and what to do next. Key Points: Most teams don’t know how to apply raw intelligence CTI must embed the “so what” and “what now” Reports alone are not enough Actionability is what makes intel valuable.

Breaking the Intelligence-Defense Divide with Scott Scher

Cyber threat intelligence is often misunderstood, seen as a niche reporting function instead of the connective tissue that links defenders, leaders, and strategy. In this episode of Data Security Decoded, join Caleb Tolin as he sits down with Scott Scher, a cyber threat intelligence (CTI) expert with an unconventional backstory, to explore how his off‑grid years shaped his view on resilience, why CTI should be seen as “counter‑threat intelligence,” and how intelligence defenders, and policy teams can work as one to turn raw data into actionable security decisions.

Indicators of Compromise in Threat Intelligence: Real-Time Action

Organizations face mounting pressure from cyber threats that exploit detection delays. Industry data shows breach costs averaging $4.45 million per incident, with late detection driving exponential damage. Attackers typically operate undetected for 197 days, establishing deep network presence before discovery. An indicator of compromise is digital evidence or a signal that a network or endpoint has been breached or that malicious activity has occurred.

Webinar Replay - Navigating AI Governance In Retail: Lessons from Real-World Scenarios

As AI continues to innovate the retail industry in areas such as supply chain management, personalizing customer experience and data insights, businesses must navigate the complex challenges of data privacy, secure and compliant AI deployment and ethical use. During this briefing, Kroll experts highlighted the key steps for building a resilient AI Governance program using real-life use cases from the retail industry that will help not only to understand, implement and monitor responsible AI but clear the way for innovation to generate successful return on investment and build consumer trust.

Lionishackers: Analyzing a corporate database seller

Outpost24’s threat intelligence researchers have been analyzing a corporate database seller known as “Lionishackers”. They’re a financially motivated threat actor focused on exfiltrating and selling corporate databases. This post explores how they operate, where their attacks are taking place, and the current level of threat they pose.