Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Google’s Agent2Agent protocol finds new home at the Linux Foundation

      June 23, 2025

      Decoding The SVG path Element: Curve And Arc Commands

      June 23, 2025

      This week in AI dev tools: Gemini 2.5 Pro and Flash GA, GitHub Copilot Spaces, and more (June 20, 2025)

      June 20, 2025

      Gemini 2.5 Pro and Flash are generally available and Gemini 2.5 Flash-Lite preview is announced

      June 19, 2025

      Best early Prime Day Nintendo Switch deals: My 17 favorite sales live now

      June 23, 2025

      How I use VirtualBox to run any OS on my Mac – including Linux

      June 23, 2025

      Apple will give you a free pair of AirPods when you buy a MacBook or iPad for school – here’s who’s eligible

      June 23, 2025

      How Apple’s biggest potential acquisition ever could perplex AI rivals like Google

      June 23, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Music Streaming Platform using PHP and MySQL

      June 23, 2025
      Recent

      Music Streaming Platform using PHP and MySQL

      June 23, 2025

      Solutions That Benefit Everyone – Why Inclusive Design Matters for All

      June 23, 2025

      Reducing Barriers Across Industries Through Inclusive Design

      June 23, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Windows 11 Installation Assistant Download: 2025 Guide

      June 23, 2025
      Recent

      Windows 11 Installation Assistant Download: 2025 Guide

      June 23, 2025

      Didn’t Receive Gears of War: Reloaded Code? Explainer

      June 23, 2025

      Fix Vibrant Visuals Greyed Out in Minecraft Bedrock

      June 23, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Harrods Hit by Cyberattack, Marking Third UK Retailer Targeted in Recent Wave

    Harrods Hit by Cyberattack, Marking Third UK Retailer Targeted in Recent Wave

    May 2, 2025

    Harrods cyberattack

    Harrods, the iconic British luxury department store, has confirmed that it was recently targeted in a cybersecurity incident, becoming the third major UK retailer in just a few days to report a cyber incident. The Harrods cyberattack follows similar breaches at Marks & Spencer and the Co-op.  

    The cyberattack on Harrods prompted the department store to take precautionary steps, including limiting online access while assuring customers that its physical stores and online shopping were still operational. 

    The incident, which occurred in late April 2025, saw hackers attempt to gain unauthorized access to Harrods’ systems. The UK retailer restricted internet access at its sites as a precautionary measure but assured customers that its flagship Knightsbridge store, H Beauty branches, and airport outlets remained open. Additionally, online shopping services continued without interruption. 

    Response to the Harrods Cyberattack

    Harrods cyberattack

    In a statement provided to The Cyber Express, the company confirmed the incident, stating, “We recently experienced attempts to gain unauthorized access to some of our systems. Our seasoned IT security team immediately took proactive steps to keep systems safe, and as a result, we have restricted internet access at our sites today. Currently, all sites, including our Knightsbridge store, H beauty stores, and airport stores, remain open to welcome customers. Customers can also continue to shop via harrods.com.” 

    Harrods has not yet provided additional details on the scale or potential consequences of the breach, including whether customer data was affected. Customers were reassured that no action was needed on their part at this time, with the retailer promising to provide updates as the situation evolves. 

    Rising Concerns in the Retail Sector

    The Harrods cyberattack comes on the heels of similar incidents that recently disrupted operations at Marks & Spencer and the Co-op. Marks & Spencer, for example, revealed a cyberattack linked to the hacking group “Scattered Spider” that caused widespread disruptions to online ordering systems and stock shortages in some physical stores. The attack, which reportedly involved the deployment of DragonForce ransomware, has cost Marks & Spencer millions in lost sales. Online orders were suspended for several days, and authorities are still investigating the incident. 

    Meanwhile, the Co-op also reported an attempted network breach, prompting it to take precautionary measures such as shutting down parts of its IT systems and requiring staff to verify their identities during remote meetings. These measures were implemented to mitigate the risk of eavesdropping by cybercriminals. 

    The National Cyber Security Centre (NCSC), which oversees the UK’s cybersecurity efforts, has expressed concern over the growing number of attacks targeting the retail sector. Richard Horne, the NCSC’s CEO, emphasized that these incidents should serve as a wake-up call for retailers to bolster their defenses against cyber threats. He confirmed that the NCSC was collaborating closely with all affected companies to fully understand the nature of these attacks and to offer expert advice to the wider retail sector. 

    Conclusion  

    The ongoing investigations into the recent attacks on Harrods, Marks & Spencer, and the Co-op highlight the advancements of cybercriminals targeting high-profile UK retailers. While no direct link between the incidents has been established, experts speculate that shared vulnerabilities or common suppliers may be involved. This is an ongoing story, and The Cyber Express will be closely monitoring the situation. We’ll update this post once we have more information on the incident and or any new statement from the retailer. 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleGraph-powered authorization: Relationship based access control for access management
    Next Article TikTok Slammed With €530 Million GDPR Fine for Sending E.U. Data to China

    Related Posts

    Development

    Learn Embedded Systems Firmware Basics – A Handbook for Developers

    June 23, 2025
    Artificial Intelligence

    Introducing Gemma 3

    June 23, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-43845 – VITS Voice Changing Framework Remote Code Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    A Brief History of JavaScript

    Web Development

    A Coding Guide to Build an Agentic AI‑Powered Asynchronous Ticketing Assistant Using PydanticAI Agents, Pydantic v2, and SQLite Database

    Machine Learning

    CVE-2025-4156 – PHPGurukul Boat Booking System SQL Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2025-5374 – PHPGurukul Online Birth Certificate System SQL Injection Vulnerability

    May 31, 2025

    CVE ID : CVE-2025-5374

    Published : May 31, 2025, 10:15 a.m. | 3 hours, 28 minutes ago

    Description : A vulnerability was found in PHPGurukul Online Birth Certificate System 2.0 and classified as critical. This issue affects some unknown processing of the file /admin/all-applications.php. The manipulation of the argument del leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

    Severity: 6.3 | MEDIUM

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    New to Linux? Don’t try these 7 distros (yet)

    April 22, 2025

    CVE-2025-23107 – Samsung Exynos Out-of-Bounds Write Vulnerability

    June 3, 2025

    CVE-2025-2238 – Vikinger WordPress Privilege Escalation Vulnerability

    April 25, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.