January 23, 2020

Attacking the Organism: Retail

1 min. read

My Apple News app recently served up some targeted marketing that really hit home. There before me was the opportunity to purchase a limited-edition 11 Herbs & Spices Firelog from KFC and Envirolog, sold through Walmart.

In addition to the advertising and sales mechanisms that brought me to this point, there are also all of the other logistics, shipping, warehouse, and inventory systems that are involved in any sale. All of this coming together just in time for the holidays to bring me a fried chicken-scented yule log.

Today all these processes are expressed as apps. As industries continue to build out new digital experiences, they are moving very quickly, creating ever-expanding organisms consisting of dozens, hundreds and even thousands of applications spanning this entire landscape of functions.

This means there is risk of malicious actors targeting any given insertion point connecting any app or piece of infrastructure, anywhere. With so much personal information—including high-value targets like financial data and account information—flowing through such dispersed channels, the prime CHEW motivation for attacking the retail organism is of course criminal intent.

Read the full article published January 8, 2020 here: by SecurityWeek.

Join the Discussion


Expertly picked stories on threat intelligence

Hundreds of apps will be attacked by the time you read this.

So, we get to work. We obsess over effective attack methods. We monitor the growth of IoT and its evolving threats. We dive deep into the latest crypto-mining campaigns. We analyze banking Trojan targets. We dissect exploits. We hunt for the latest malware. And then our team of experts share it all with you. For more than 20 years, F5 has been leading the app delivery space. With our experience, we are passionate about educating the security community-providing the intel you need to stay informed so your apps can stay safe.


9 hrs

a critical vulnerability—with the potential for remote code execution—is released.