A new report from managed security services provider LevelBlue, titled "2025 Spotlight Report: Aligning Cyber Resilience and Business Goals in Retail," paints a concerning picture of the retail industry's cybersecurity posture. The study, which surveyed 220 retail executives, reveals that retailers are facing a higher volume and complexity of attacks, largely driven by threat actors' adoption of Artificial Intelligence (AI). Key findings indicate that 44% of retailers have seen a surge in attacks and 34% suffered a data breach in the last year. Most alarmingly, the report exposes a significant 'preparedness deficit': while executives anticipate sophisticated AI-driven attacks like deepfakes, few feel their organizations are equipped to handle them. This, combined with poor supply chain visibility, puts the entire sector at heightened risk.
The report highlights several key trends and statistics that define the current threat landscape for retailers:
These findings suggest that while retailers are aware of emerging threats, their defensive capabilities and strategic priorities are not keeping pace.
The consequences of this preparedness gap are severe. A successful AI-powered phishing campaign or a supply chain attack could lead to:
To counter these advanced threats, retailers must evolve their security operations:
User Behavior Analysis.URL Analysis.M0952 - Supply Chain Risk Management): Retailers must move beyond simple contractual assurances. Mandate security assessments and a 'right to audit' for all critical suppliers. Require suppliers to provide a Software Bill of Materials (SBOM) for any software integrated into the retailer's environment.M1017 - User Training): Standard phishing training is no longer sufficient. Train employees, especially those in finance and HR, to recognize the signs of sophisticated deepfake audio/video and AI-generated text. Use simulations to test their awareness.M1030 - Network Segmentation): Assume that a breach will occur. Implement network segmentation to limit an attacker's ability to move laterally from a compromised system (e.g., a supplier's portal) to critical systems like payment processing or customer databases.M1032 - Multi-factor Authentication): Enforce phishing-resistant MFA for all employees and, critically, for all third-party and supplier accounts that have access to the retailer's network or data. This is a foundational control against credential-based attacks.Directly addresses the finding that 47% of retailers have poor visibility into supplier security.
Crucial for defending against more sophisticated AI-driven phishing and deepfake attacks.
A foundational control to protect against credential theft, regardless of how the credentials were obtained.
Mapped D3FEND Techniques:
To combat AI-driven threats that may lead to account takeover, retailers must move beyond static rules and analyze behavior. By implementing a User and Entity Behavior Analytics (UEBA) solution, security teams can establish a baseline of normal activity for each user and role. The system can then detect anomalies, such as an accountant suddenly trying to access product development servers or a store manager logging in from an unusual country. This technique is effective against AI-powered attacks because even if an attacker creates a perfect replica of a legitimate communication, their post-compromise behavior will likely deviate from the real user's established pattern. Alerting on such deviations provides a high-fidelity signal of a potential breach.
Given that nearly half of retailers lack visibility into their supply chain, formalizing an SCRM program is no longer optional. Retailers must create an inventory of all third-party suppliers with access to their data or networks. Implement a tiered system to classify suppliers based on risk and conduct security assessments proportional to that risk. For high-risk suppliers, mandate security questionnaires, penetration test results, and evidence of a mature security program. Write security requirements, including breach notification timelines, directly into contracts. This programmatic approach is the only way to manage the systemic risk identified in the LevelBlue report and protect the business from a breach originating outside its own walls.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats