Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Tenable updates Vulnerability Priority Rating scoring method to flag fewer vulnerabilities as critical

      July 24, 2025

      Google adds updated workspace templates in Firebase Studio that leverage new Agent mode

      July 24, 2025

      AI and its impact on the developer experience, or ‘where is the joy?’

      July 23, 2025

      Google launches OSS Rebuild tool to improve trust in open source packages

      July 23, 2025

      EcoFlow’s new portable battery stations are lighter and more powerful (DC plug included)

      July 24, 2025

      7 ways Linux can save you money

      July 24, 2025

      My favorite Kindle tablet just got a kids model, and it makes so much sense

      July 24, 2025

      You can turn your Google Photos into video clips now – here’s how

      July 24, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Blade Service Injection: Direct Service Access in Laravel Templates

      July 24, 2025
      Recent

      Blade Service Injection: Direct Service Access in Laravel Templates

      July 24, 2025

      This Week in Laravel: NativePHP Mobile and AI Guidelines from Spatie

      July 24, 2025

      Retrieve the Currently Executing Closure in PHP 8.5

      July 24, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      FOSS Weekly #25.30: AUR Poisoned, Linux Rising, PPA Explained, New Open Source Grammar Checker and More

      July 24, 2025
      Recent

      FOSS Weekly #25.30: AUR Poisoned, Linux Rising, PPA Explained, New Open Source Grammar Checker and More

      July 24, 2025

      How to Open Control Panel in Windows 11

      July 24, 2025

      How to Shut Down Windows 11

      July 24, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Marks & Spencer Confirms Cybersecurity Incident After Days of Service Disruptions

    Marks & Spencer Confirms Cybersecurity Incident After Days of Service Disruptions

    April 23, 2025

    Marks & Spencer data breach

    UK retail giant Marks & Spencer has confirmed it is managing a cybersecurity incident, following several days of service disruption that affected store operations and customer experiences. The company disclosed the Marks & Spencer data breach incident in a filing to the London Stock Exchange on April 22, 2025, and reassured customers that while some operations were temporarily adjusted, its stores remain open and both its website and app are currently functional. 

    The Marks & Spencer data breach incident has raised concerns about cybersecurity preparedness in large retail chains. According to the official filing released at 14:14 BST on Monday, Marks & Spencer took quick action after detecting the breach. The company stated: 

    “As soon as we became aware of the incident, it was necessary to make some minor, temporary changes to our store operations to protect customers and the business, and we are sorry for any inconvenience experienced.” 

    Details of the Marks & Spencer Data Breach

    While the full extent of the cyberattack on Marks & Spencer remains unclear, the retailer emphasized that it has engaged external cybersecurity experts to assist with the investigation and mitigation efforts. Additionally, the incident has been reported to the National Cyber Security Centre (NCSC) and relevant data protection authorities. 

    So far, Marks & Spencer has not confirmed whether customer data has been compromised, a key detail eagerly awaited by both the public and cybersecurity observers. The company has promised further updates should the situation evolve. 

    This data breach at Marks & Spencer has already impacted some in-store services, including its popular Click & Collect function. On the social media platform X (formerly Twitter), customers have expressed frustration with ongoing technical issues. 

    Social Media Users Share New Stories

    Marks & Spencer data breach
    Marks & Spencer on X (Source: X)

    One user, @JohnWH79, posted on April 19: 

    “Do companies even have business continuity plans anymore? Computers go down and even the basics seem impossible. ‘Sorry sir, finding parcels is what the computer does.’” 

    In response, Marks & Spencer’s official X account acknowledged the disruption and issued an apology: 

    “… is now back up and running. Please accept my sincere apologies that at the time you visited your local store, this issue directly affected you, as well as other customers.” 

    However, further comments from customers suggest the issues are not entirely resolved. As of April 22, Click & Collect services in some stores remain down, prompting more concern. 

    M&S replied to one such comment: 

    “We are working hard to resolve some technical issues in our stores, and we are not able to process click and collect orders in some stores at this time. Apologies for the inconvenience – Amelia.” 

    Customers also questioned the absence of basic contingency plans. One post asked why no manual system, like “paper and pen,” was in place during the downtime. 

    Conclusion  

    The Marks & Spencer cyberattack comes at a pivotal moment for the retailer, with its financial year having ended on March 29, 2025, and full-year results set for release on May 21. As analysts closely monitor the potential impact on customer confidence and company performance, Marks & Spencer has yet to issue further statements beyond official filings and social media responses.  

    While representatives such as Fraser Ramzan and the Corporate Press Office remain available for inquiries, no new information has emerged regarding the nature or scope of the data breach at Marks & Spencer. This is an ongoing story, and The Cyber Express will be closely monitoring the situation, and we’ll update this post once we have more information on the attack.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleRussian Hackers Exploit Microsoft OAuth to Target Ukraine Allies via Signal and WhatsApp
    Next Article Ripple’s xrpl.js npm Package Backdoored to Steal Private Keys in Major Supply Chain Attack

    Related Posts

    Development

    Blade Service Injection: Direct Service Access in Laravel Templates

    July 24, 2025
    Development

    This Week in Laravel: NativePHP Mobile and AI Guidelines from Spatie

    July 24, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    AMD’s Ryzen 7 7800X3D hits the lowest price of the year — Why wait for Prime Day?

    News & Updates

    CVE-2025-5366 – Zohocorp ManageEngine Exchange Reporter Plus Stored Cross-Site Scripting

    Common Vulnerabilities and Exposures (CVEs)

    “Let’s amp up everything” — Directive 8020 is Alien meets The Thing, and it’s introducing these huge changes for Supermassive’s cinematic horror games

    News & Updates

    JsonTree v4.7.1 – Added new UI control options!

    Development

    Highlights

    CVE-2025-45617 – Production SSM User List Unrestricted Access

    May 5, 2025

    CVE ID : CVE-2025-45617

    Published : May 5, 2025, 8:15 p.m. | 3 hours, 19 minutes ago

    Description : Incorrect access control in the component /user/list of production_ssm v0.0.1-SNAPSHOT allows attackers to access sensitive information via a crafted payload.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CVE-2025-4060 – PHPGurukul Notice Board System SQL Injection Vulnerability

    April 29, 2025

    CVE-2025-32462 – Sudo Privilege Escalation

    June 30, 2025

    AMD’s new Radeon graphics driver is ready for DOOM: The Dark Ages and delivers FSR 4 upscaling support to Frostpunk 2, more

    May 10, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.