Company Details
victoria's-secret
29,040
705,186
43
victoriassecret.com
0
VIC_1226201
In-progress


Victoria’s Secret & Co. Vendor Cyber Rating & Cyber Score
victoriassecret.comVictoria’s Secret & Co. (NYSE: VSCO) is a specialty retailer of modern, fashion-inspired collections including signature bras, panties, lingerie, casual sleepwear, athleisure and swim, as well as award-winning prestige fragrances and body care. VS&Co is comprised of market leading brands, Victoria’s Secret and Victoria’s Secret PINK, that share a common purpose of supporting women in all they do, and Adore Me, a technology-led, digital-first innovative intimates brand serving women of all sizes and budgets at all phases of life. We are committed to empowering our nearly 30,000 associates across a global footprint of more than 1,350 retail stores in nearly 70 countries. We strive to provide the best products to help women express their confidence, sexiness and power and use our platform to create connection and community while celebrating the extraordinary diversity of women’s experiences.
Company Details
victoria's-secret
29,040
705,186
43
victoriassecret.com
0
VIC_1226201
In-progress
Between 600 and 649

VSC Global Score (TPRM)XXXX

Description: In early August 2025, the cybercrime collective Scattered Spider publicly exposed screenshots of console access to Victoria's Secret systems, indicating unauthorized access and potential data exfiltration. The group, collaborating with other extortion factions like ShinyHunters and Lapsus$, shared partial customer data samples, suggesting a breach of sensitive information. The attack involved spear-phishing and exploited VPN credentials, followed by in-memory execution of malicious payloads to evade detection. The incident highlights the group's shift toward real-time data theft and extortion, posing significant risks to the company's customer data and operational security.
Description: Retail Cyberattacks Surge: Victoria’s Secret, The North Face, and Cartier Among Latest Victims A wave of cyberattacks has targeted major retailers in recent weeks, disrupting operations and exposing customer data. Victoria’s Secret, The North Face, and Cartier are among the latest brands to report security breaches, highlighting the growing threat to the retail sector. Victoria’s Secret Hit by Undisclosed Cyberattack Victoria’s Secret experienced a security incident in late May, forcing the company to shut down its website and pause some in-store services from May 26 to May 29, 2025. While stores remained open, the outage delayed the company’s fiscal Q1 earnings report, though financial results released on June 11 showed net sales of $1.35 billion, exceeding expectations. However, the breach is projected to cost the company $20 million in Q2 net sales due to service disruptions. The North Face and Cartier Report Separate Breaches The North Face, owned by VF Corp., disclosed a "small-scale" credential-stuffing attack in April 2025, where hackers used leaked login details from other breaches to access customer accounts. No financial data was compromised, but names and emails were exposed. Luxury brand Cartier also confirmed a breach, revealing that an unauthorized party accessed customer data, including purchase history, shipping addresses, birth dates, and phone numbers. The company did not specify when the attack occurred. Retail Sector Under Siege These incidents follow a string of attacks on other retailers this month, including Marks & Spencer, Dior, Harrods, and Adidas. The Adidas breach, linked to a third-party customer service provider, underscored the risks of supply chain vulnerabilities. Cybersecurity experts warn that retailers are prime targets due to the vast amounts of sensitive customer data they handle, with 46% of retail security professionals reporting data loss from attacks in the past year. The financial and reputational toll is significant companies face network outages, customer account compromises, and long-term trust erosion, with some losing over 10% of annual revenue after breaches. While details of the Victoria’s Secret attack remain undisclosed, the incident reflects a broader trend of coordinated or opportunistic attacks on the retail industry.
Description: Victoria’s Secret experienced a cyber attack in late May 2025, forcing the company to shut down its website and pause some in-store services from May 26 to May 29. The incident disrupted operations, delayed Q1 financial reporting, and resulted in an estimated $20 million loss in Q2 net sales due to service outages. While no customer data breach was explicitly confirmed in the article, the attack caused significant operational disruption, including halted online transactions, paused customer care services, and extended return/reward windows to mitigate customer impact. The company’s restoration efforts delayed financial reporting, highlighting the attack’s severity in terms of business continuity and financial repercussions. The incident aligns with a broader trend of targeted retail cyber attacks, emphasizing vulnerabilities in e-commerce and in-store systems.
Description: The breach notification was reported by Victoria's Secret on May 13, 2021, regarding unauthorized access to certain personal information in customer online accounts between April 13, 2021, and April 14, 2021. The compromised information included names, email addresses, postal addresses, birthdays (month and day), telephone numbers, and linked gift card details. The company has advised customers to change their passwords and monitor their accounts for suspicious activity.


No incidents recorded for Victoria’s Secret & Co. in 2026.
No incidents recorded for Victoria’s Secret & Co. in 2026.
No incidents recorded for Victoria’s Secret & Co. in 2026.
VSC cyber incidents detection timeline including parent company and subsidiaries

Victoria’s Secret & Co. (NYSE: VSCO) is a specialty retailer of modern, fashion-inspired collections including signature bras, panties, lingerie, casual sleepwear, athleisure and swim, as well as award-winning prestige fragrances and body care. VS&Co is comprised of market leading brands, Victoria’s Secret and Victoria’s Secret PINK, that share a common purpose of supporting women in all they do, and Adore Me, a technology-led, digital-first innovative intimates brand serving women of all sizes and budgets at all phases of life. We are committed to empowering our nearly 30,000 associates across a global footprint of more than 1,350 retail stores in nearly 70 countries. We strive to provide the best products to help women express their confidence, sexiness and power and use our platform to create connection and community while celebrating the extraordinary diversity of women’s experiences.


Wegmans Food Markets is a family-owned regional supermarket chain and one of the largest private companies in the US. Recognized as an industry leader and innovator, the company was founded in 1916 and employs over 53,000 people. Wegmans has been named one of the “100 Best Companies to Work For” by

Anpacker. Durchstarter. Möglichmacher. Alle reden vom Kundenfokus, Customer first, dem Kunden als König. Wir finden, das ist zu kurz gedacht und würden es so formulieren: Der Mensch ist Dreh- und Angelpunkt unseres Erfolgs. Dazu gehört neben einer Kunden- auch die Mitarbeiterfokussierung. Und genau

The cooperatively organized REWE Group is one of the leading trade and tourism groups in Germany and Europe. In 2024, the company generated a total external turnover of more than 96 billion euros. Founded in 1927, REWE Group operates with around 380,000 employees in 21 European countries. The sales
Company Overview Headquartered in Knoxville, Tennessee, Pilot Flying J is the largest operator of travel centers in North America with more than 750 locations throughout the United States and Canada and employs more than 24,000 Team Members. Pilot Flying J services over a million guests every day.

For over five decades, Landmark Group has shaped the region’s retail and hospitality landscape-growing from a single store in Bahrain to one of the largest and most successful omnichannel and hospitality groups across the Middle East, Asia and Africa. Rooted in purpose and powered by innovation, we
Dollarama was founded by third-generation retailer and Canadian entrepreneur, Larry Rossy. It all started with one store, in Matane, Quebec, in 1992, and quickly grew over the next two decades to become a household name and shopping destination for Canadians from coast to coast. Dollarama today is

We are the leading retailer of home improvement and outdoor living products in Australia & New Zealand and a major supplier to project builders, commercial tradespeople and the housing industry. Our ambition is to provide our customers with the widest range of home improvement products in accordanc
At Chewy, our mission is to be the most trusted and convenient destination for pet parents and partners, everywhere. We view pets and pet parents as family and are obsessed with meeting their needs and exceeding customer expectations through every interaction. Behind the scenes, our talented teams

Somos a RD Saúde, um ecossistema de saúde integral, com mais de 3 mil farmácias em todo o Brasil e negócios em saúde que dividem o mesmo propósito: contribuir para uma sociedade mais saudável. Nossa jornada começou em novembro de 2011, fruto da união entre Droga Raia e Drogasil, crescendo até se tor
.png)
Karlie Kloss has been in the spotlight for a long time but plastic surgery rumors are getting increasingly hard to ignore given her...
The Vanguard Group filed Amendment No. 4 to a Schedule 13G/A reporting 0% beneficial ownership of Victoria's Secret & Co common stock.
A 39-year-old New Jersey man admitted he exposed himself at two stores in Atlantic City — Victoria's Secret and an H&M — last year.
TZR chats with supermodel Candice Swanepoel about her go-to beauty products.
Clothing / Best Sellers / VICTORIAS SECRET SWIM SUIT SET BIKINI TOP SMALL + BIKINI BOTTOM SMALL NWT Top Sellers.
In March 2026, Lulu's Fashion Lounge announced a new online wholesale partnership with Victoria's Secret, launching an online-only Lulus...
PRNewswire/ -- Pomerantz LLP is investigating claims on behalf of investors of Victoria's Secret & Co. ("Victoria's Secret" or the...
Wall Street is overwhelmingly bullish on the stocks in this article, with price targets suggesting significant upside potential.
All great brands stand for something and in the case of Victoria's Secret, it stands for sexy, glamorous and luxurious," said Super.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Victoria’s Secret & Co. is http://careers.victoriassecret.com.
According to Rankiteo, Victoria’s Secret & Co.’s AI-generated cybersecurity score is 640, reflecting their Poor security posture.
According to Rankiteo, Victoria’s Secret & Co. currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Victoria’s Secret & Co. has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Victoria’s Secret & Co. is not certified under SOC 2 Type 1.
According to Rankiteo, Victoria’s Secret & Co. does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Victoria’s Secret & Co. is not listed as GDPR compliant.
According to Rankiteo, Victoria’s Secret & Co. does not currently maintain PCI DSS compliance.
According to Rankiteo, Victoria’s Secret & Co. is not compliant with HIPAA regulations.
According to Rankiteo,Victoria’s Secret & Co. is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Victoria’s Secret & Co. operates primarily in the Retail industry.
Victoria’s Secret & Co. employs approximately 29,040 people worldwide.
Victoria’s Secret & Co. presently has no subsidiaries across any sectors.
Victoria’s Secret & Co.’s official LinkedIn profile has approximately 705,186 followers.
Victoria’s Secret & Co. is classified under the NAICS code 43, which corresponds to Retail Trade.
Yes, Victoria’s Secret & Co. has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/victoria-secret.
Yes, Victoria’s Secret & Co. maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/victoria's-secret.
As of April 02, 2026, Rankiteo reports that Victoria’s Secret & Co. has experienced 4 cybersecurity incidents.
Victoria’s Secret & Co. has an estimated 15,730 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack and Breach.
Total Financial Loss: The total financial loss from these incidents is estimated to be $20 million.
Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with advised customers to change their passwords and monitor their accounts for suspicious activity, and victorias secret with yes (website shutdown, containment measures), the north face with none, cartier with none, and victorias secret with ['website shutdown', 'pause of some in-store services'], the north face with none, cartier with none, and victorias secret with ['system restoration', 'extended return/coupon windows'], the north face with none, cartier with none, and victorias secret with ['website restored by 2025-05-30', 'financial reporting delayed to 2025-06-11'], the north face with none, cartier with none, and victorias secret with ['public statement (2025-05-30)', 'faq page for customers', 'delayed earnings announcement'], the north face with ['customer email notification'], cartier with ['customer email notification'], and containment measures with shut down website, containment measures with paused in-store services..
Title: Victoria's Secret Data Breach
Description: Unauthorized access to certain personal information in customer online accounts between April 13, 2021, and April 14, 2021.
Date Detected: 2021-04-13
Date Publicly Disclosed: 2021-05-13
Type: Data Breach
Attack Vector: Unauthorized Access
Title: Scattered Spider Cybercrime Collective Resurfaces with New Telegram Channel
Description: In early August 2025, a previously quiet cybercrime collective known as Scattered Spider resurfaced with a striking new Telegram channel that aggregates proof of its intrusions and data exfiltration operations. The channel name fuses ShinyHunters, Scattered Spider, and Lapsus$, signaling a collaboration—or at least a shared brand—among several prolific extortion groups. Within hours of its launch, the channel published screenshots of console access to Victoria’s Secret, a 100-entry customer data sample from Gucci, and lists of sellable databases from Neiman Marcus and Chanel.
Date Detected: Early August 2025
Date Publicly Disclosed: Early August 2025
Type: Data Exfiltration, Ransomware, Extortion
Attack Vector: Spear-phishing, Exploited VPN credentials
Vulnerability Exploited: Windows kernel vulnerabilities
Threat Actor: Scattered Spider, ShinyHunters, Lapsus$
Motivation: Financial gain, Extortion
Title: Retail Cyberattacks Surge: Victoria’s Secret, The North Face, and Cartier Among Latest Victims
Description: A wave of cyberattacks has targeted major retailers in recent weeks, disrupting operations and exposing customer data. Victoria’s Secret, The North Face, and Cartier are among the latest brands to report security breaches, highlighting the growing threat to the retail sector.
Type: Data Breach
Attack Vector: Credential StuffingUnauthorized Access
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Spear-phishing and Exploited VPN credentials.

Data Compromised: Names, Email addresses, Postal addresses, Birthdays (month and day), Telephone numbers, Linked gift card details

Data Compromised: Customer data, Corporate documents, Server listings, Court filings
Operational Impact: High alarm across industries
Brand Reputation Impact: Significant due to public exposure
Identity Theft Risk: High

Financial Loss: $20 million in Q2 net sales (projected for Victoria’s Secret)
Data Compromised: Customer data including names, emails, purchase history, shipping addresses, birth dates, and phone numbers
Systems Affected: WebsitesIn-store services
Downtime: May 26 to May 29, 2025 (Victoria’s Secret)
Operational Impact: Delayed fiscal Q1 earnings report, paused in-store services
Brand Reputation Impact: Long-term trust erosion
Average Financial Loss: The average financial loss per incident is $5.00 million.
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information, , Customer data, Corporate documents, Server listings, Court filings, Victorias Secret: None, The North Face: ['Names', 'Emails'], Cartier: ['Names', 'Emails', 'Products purchased', 'Shipping addresses', 'Birth dates', 'Telephone numbers'], , Names, Emails, Purchase History, Shipping Addresses, Birth Dates, Phone Numbers and .

Entity Name: Victoria's Secret
Entity Type: Retail
Industry: Fashion

Entity Name: Victoria’s Secret
Entity Type: Retail
Industry: Fashion

Entity Name: Gucci
Entity Type: Retail
Industry: Fashion
Customers Affected: 100-entry customer data sample

Entity Name: Neiman Marcus
Entity Type: Retail
Industry: Fashion

Entity Name: Chanel
Entity Type: Retail
Industry: Fashion

Entity Name: Disney
Entity Type: Entertainment
Industry: Media

Entity Name: S&P Global
Entity Type: Financial Services
Industry: Finance

Entity Name: T-Mobile
Entity Type: Telecommunications
Industry: Technology

Entity Name: Nvidia
Entity Type: Technology
Industry: Semiconductors

Entity Name: Otelier

Entity Name: Coinbase
Entity Type: Financial Services
Industry: Cryptocurrency

Entity Name: Burger King Brazil
Entity Type: Food Service
Industry: Restaurant
Location: Brazil

Entity Name: Adidas
Entity Type: Retail
Industry: Sportswear

Entity Name: Cisco
Entity Type: Technology
Industry: Networking

Entity Name: U.S. Department of Homeland Security
Entity Type: Government
Industry: Public Sector
Location: United States

Entity Name: U.K. Ministry of Justice
Entity Type: Government
Industry: Public Sector
Location: United Kingdom

Entity Name: Victoria’s Secret
Entity Type: Retailer
Industry: Retail (Lingerie/Apparel)

Entity Name: The North Face
Entity Type: Retailer
Industry: Retail (Outdoor Apparel)

Entity Name: Cartier
Entity Type: Retailer
Industry: Retail (Luxury Goods)

Entity Name: Marks & Spencer
Entity Type: Retailer
Industry: Retail

Entity Name: Dior
Entity Type: Retailer
Industry: Retail (Luxury Goods)

Entity Name: Harrods
Entity Type: Retailer
Industry: Retail (Department Store)

Entity Name: Adidas
Entity Type: Retailer
Industry: Retail (Sportswear)

Remediation Measures: Advised customers to change their passwords and monitor their accounts for suspicious activity

Containment Measures: Shut down websitePaused in-store services
Incident Response Plan: The company's incident response plan is described as victorias_secret: Yes (website shutdown, containment measures), .

Type of Data Compromised: Personal information
Personally Identifiable Information: namesemail addressespostal addressesbirthdays (month and day)telephone numbers

Type of Data Compromised: Customer data, Corporate documents, Server listings, Court filings
Sensitivity of Data: High
Data Exfiltration: Yes
Personally Identifiable Information: Yes

Type of Data Compromised: Names, Emails, Purchase history, Shipping addresses, Birth dates, Phone numbers
Sensitivity of Data: High (Personally Identifiable Information)
Personally Identifiable Information: Yes
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Advised customers to change their passwords and monitor their accounts for suspicious activity, , victorias_secret: ['System restoration', 'extended return/coupon windows'], .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by victorias_secret: ['website shutdown', 'pause of some in-store services'], , shut down website, paused in-store services and .

Data Exfiltration: Yes
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through victorias_secret: ['Website restored by 2025-05-30', 'financial reporting delayed to 2025-06-11'], .

Lessons Learned: Retailers are prime targets due to vast amounts of sensitive customer data; supply chain vulnerabilities pose significant risks.
Key Lessons Learned: The key lessons learned from past incidents are Retailers are high-value targets for cyber attacks due to vast customer data repositories.,Third-party vendor risks (e.g., Adidas’ customer service provider breach) underscore the need for supply chain cybersecurity oversight.,Credential stuffing remains a persistent threat, emphasizing the need for multi-factor authentication (MFA) and password hygiene.,Proactive incident response plans and customer communication strategies are critical to mitigating reputational and financial damage.,Coordinated attacks on the retail sector suggest potential campaign-style threats requiring industry-wide collaboration.Retailers are prime targets due to vast amounts of sensitive customer data; supply chain vulnerabilities pose significant risks.

Source: Victoria's Secret Breach Notification
Date Accessed: 2021-05-13

Source: DataBreaches.net

Source: Cyber Incident Description
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Victoria's Secret Breach NotificationDate Accessed: 2021-05-13, and Source: DataBreaches.net, and Source: Retail TouchPointsDate Accessed: 2025-06-13, and Source: Victoria’s Secret Corporate FAQDate Accessed: 2025-06-11, and Source: The Guardian (Marks & Spencer attack coverage), and Source: Fastly Research (Retail Cybersecurity Report), and Source: Cyber Incident Description.
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Victorias Secret: ['Public statement (2025-05-30)', 'FAQ page for customers', 'delayed earnings announcement'], The North Face: ['Customer email notification'] and Cartier: ['Customer email notification'].

Customer Advisories: Advised customers to change their passwords and monitor their accounts for suspicious activity
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Advised Customers To Change Their Passwords And Monitor Their Accounts For Suspicious Activity, , Victoria’S Secret Delayed Q1 2025 Earnings Announcement (2025-06-11) With Disclosure Of $20M Q2 Impact., Extended Return And Coupon Redemption Windows For Affected Customers., Victorias Secret: ['Website outage notifications (2025-05-26–29)', 'FAQ page with extended policies'], The North Face: ["Email notification to customers about 'small-scale' attack and stolen data (names/emails)"], Cartier: ['Email notification about unauthorized access and compromised PII (names, addresses, etc.)'] and .

Entry Point: Spear-phishing, Exploited VPN credentials
High Value Targets: Victoria’s Secret, Gucci, Neiman Marcus, Chanel, Disney, S&P Global, T-Mobile, Nvidia, Otelier, Coinbase, Burger King Brazil, Adidas, Cisco, U.S. Department of Homeland Security, U.K. Ministry of Justice
Data Sold on Dark Web: Victoria’s Secret, Gucci, Neiman Marcus, Chanel, Disney, S&P Global, T-Mobile, Nvidia, Otelier, Coinbase, Burger King Brazil, Adidas, Cisco, U.S. Department of Homeland Security, U.K. Ministry of Justice

Root Causes: Spear-phishing, Exploited VPN credentials, Windows kernel vulnerabilities
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Victorias Secret: ['System restoration', 'financial reporting delays', 'customer policy extensions'], The North Face: None, Cartier: None, .
Last Attacking Group: The attacking group in the last incident were an Scattered Spider, ShinyHunters and Lapsus$.
Most Recent Incident Detected: The most recent incident detected was on 2021-04-13.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on {'victorias_secret': '2025-05-30', 'the_north_face': '2025-06-04', 'cartier': '2025-06-04'}.
Most Recent Incident Resolved: The most recent incident resolved was on [{'victorias_secret': '2025-05-30 (website restored)', 'the_north_face': None, 'cartier': None}].
Most Significant Data Compromised: The most significant data compromised in an incident were names, email addresses, postal addresses, birthdays (month and day), telephone numbers, linked gift card details, , Customer data, Corporate documents, Server listings, Court filings, The North Face: Customer names and emails, Cartier: Customer names, emails, products purchased, shipping addresses, birth dates, telephone numbers, , Customer data including names, emails, purchase history, shipping addresses, birth dates and and phone numbers.
Most Significant System Affected: The most significant system affected in an incident were V, i, c, t, o, r, i, a, s, , S, e, c, r, e, t, :, , W, e, b, s, i, t, e, ,, , C, u, s, t, o, m, e, r, , C, a, r, e, , S, e, r, v, i, c, e, s, ,, , s, o, m, e, , i, n, -, s, t, o, r, e, , s, y, s, t, e, m, s, ,, T, h, e, , N, o, r, t, h, , F, a, c, e, :, , W, e, b, s, i, t, e, ,, C, a, r, t, i, e, r, :, , I, n, t, e, r, n, a, l, , s, y, s, t, e, m, s, , (, t, e, m, p, o, r, a, r, y, , a, c, c, e, s, s, ), ,, and WebsitesIn-store services.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Victorias Secret: ['Website shutdown', 'pause of some in-store services'], and Shut down websitePaused in-store services.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Customer data including names, emails, purchase history, shipping addresses, birth dates, and phone numbers, Customer data, Corporate documents, Server listings, Court filings, The North Face: Customer names and emails, , telephone numbers, email addresses, birthdays (month and day), postal addresses, Cartier: Customer names, emails, products purchased, shipping addresses, birth dates, telephone numbers, , linked gift card details and names.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Coordinated attacks on the retail sector suggest potential campaign-style threats requiring industry-wide collaboration., Retailers are prime targets due to vast amounts of sensitive customer data; supply chain vulnerabilities pose significant risks.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Implement MFA and passwordless authentication to combat credential stuffing., Prioritize transparency in post-incident communications to maintain customer trust., Develop and test incident response plans, including website takedown procedures and customer notification templates., Conduct third-party cybersecurity audits for vendors with access to customer data., Invest in adaptive security measures (e.g., behavioral WAFs and network segmentation) to detect and contain breaches early..
Most Recent Source: The most recent source of information about an incident are Victoria's Secret Breach Notification, Cyber Incident Description, Victoria’s Secret Corporate FAQ, Fastly Research (Retail Cybersecurity Report), The Guardian (Marks & Spencer attack coverage), Retail TouchPoints and DataBreaches.net.
Current Status of Most Recent Investigation: The current status of the most recent investigation is [{'victorias_secret': 'Ongoing (root cause not disclosed)', 'the_north_face': 'Completed (attributed to credential stuffing)', 'cartier': 'Ongoing (limited details shared)'}].
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Victoria’s Secret delayed Q1 2025 earnings announcement (2025-06-11) with disclosure of $20M Q2 impact., Extended return and coupon redemption windows for affected customers., .
Most Recent Customer Advisory: The most recent customer advisory issued were an Advised customers to change their passwords and monitor their accounts for suspicious activity, victorias_secret: ['Website outage notifications (2025-05-26–29)', 'FAQ page with extended policies'], the_north_face: ["Email notification to customers about 'small-scale' attack and stolen data (names/emails)"], cartier: ['Email notification about unauthorized access and compromised PII (names, addresses, etc.)'] and .
Most Recent Entry Point: The most recent entry point used by an initial access broker were an Spear-phishing and Exploited VPN credentials.
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Spear-phishing, Exploited VPN credentials, Windows kernel vulnerabilities, the_north_face: Credential stuffing due to reused customer passwords from prior breaches, cartier: Unauthorized system access (method unspecified), .
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was victorias_secret: ['System restoration', 'financial reporting delays', 'customer policy extensions'], .
.png)
A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.