Top Risks

Black Friday, Cyber Monday and the Seasonal E-Commerce Onslaught

The holiday shopping season is a bonanza for both shoppers and attackers. F5 Labs' David Warburton writes for ITProPortal, discussing the most commonly seen seasonal threats and how annual trends are shifting.
January 09, 2020
1 min. read

Black Friday, Cyber Monday and the seasonal ecommerce feeding frenzy are always big news.

Hyperactive online activity and potentially compromised purchasing, promotion and sales behaviours are like a red rag to a bull for enterprising cybercriminals.

From denial of service (DoS) attacks shutting down retailers in their revenue-generating prime to ransomware campaigns extorting your hard-earned spending money, there’s a world of banana skins out there.

Formjacking is one of this years’ most notable threats and is, according to the F5 Labs 2019 Application Protection Report, now one of the most common web attack tactics in play. It was responsible for 71 per cent of F5 Labs-analysed, web-related data breaches in 2018.

As more web applications connect to critical components such as shopping carts, card payments, advertising and analytics, vendors become an outsized target. Code can be delivered from a wide range of sources – almost all of which are beyond the boundaries of usual enterprise security controls. Since many websites make use of the same third-party resources, attackers know that they just need to compromise a single component to skim data from a huge pool of potential victims.

Read the full article published November 29, 2019 here: https://www.itproportal.com/features/black-friday-cyber-monday-and-the-seasonal-ecommerce-onslaught/ by ITProPortal.

Join the Discussion
Authors & Contributors
David Warburton (Author)
Director, F5 Labs

More from Learning Center

What Is Zero Trust Architecture (ZTA)?
What Is Zero Trust Architecture (ZTA)?
article 13 min. read
What Is Access Control?
What Is Access Control?
article 15 min. read
What is Multi-Cloud and How Does It Affect Security?
What is Multi-Cloud and How Does It Affect Security?
article 13 min. read