logo

Contents

Gucci Digital Audit

1. Executive Intelligence Brief: Operational Scope and Digital Surface Area

1.1. Introduction to the Audit

This document constitutes a comprehensive Technographic Audit of Gucci, a subsidiary of the Kering Group, executed to satisfy specific intelligence requirements regarding the entity’s digital dependencies on technology originating from the State of Israel. The audit was conducted by analyzing the target’s vendor ecosystem, cybersecurity infrastructure, digital transformation initiatives, and data residency protocols.

The investigation focuses on identifying “Dual-Use” technologies—commercial systems derived from military signals intelligence (SIGINT) or surveillance capabilities—and determining the extent to which the target’s leadership and operations materially support the Israeli technology sector. This report strictly adheres to a factual presentation of technical evidence, architectural dependencies, and corporate partnerships, enabling subsequent classification according to the Digital Complicity Scale.

1.2. Corporate Structure and Digital Footprint

Gucci operates not merely as a luxury fashion house but as a data-driven retail enterprise with a massive global digital surface area. As the primary revenue generator for the Kering Group, Gucci’s IT infrastructure serves as the blueprint for the wider conglomerate. The digital estate encompasses:

  • Global E-Commerce Operations: Direct-to-consumer (DTC) platforms processing millions of transactions, necessitating robust fraud prevention and payment orchestration.
  • Supply Chain Digitization: Industrial IoT (Internet of Things) and advanced manufacturing technologies utilized in Italy and globally to manage inventory and production.
  • Customer Relationship Management (CRM): Massive databases of high-net-worth individuals (HNWI) requiring sophisticated security and behavioral analytics.
  • Mobile Ecosystem: A suite of applications (e.g., Gucci App, regional specific apps like TSUM Outlet where relevant) requiring mobile measurement partners (MMPs) and attribution tracking.

The audit has confirmed that Gucci and Kering have integrated specific technologies that facilitate the transfer of data, capital, and legitimacy to the Israeli technology ecosystem. These integrations are not incidental (e.g., off-the-shelf website builders) but structural, involving critical security, financial, and industrial layers of the enterprise.1

2. The “Unit 8200” Stack: Cybersecurity and Network Architecture

The “Unit 8200 Stack” refers to the suite of enterprise cybersecurity, cloud, and analytics vendors founded by alumni of the Israel Defense Forces’ (IDF) elite intelligence units (Unit 8200, Unit 81, Mamram). These firms often commercialize military-grade offensive and defensive cyber capabilities. The audit reveals a significant reliance by Gucci/Kering on this stack, particularly in the wake of recent high-profile security breaches.

2.1. Network Security and Connectivity: Cato Networks

Vendor Profile: Cato Networks Origin: Tel Aviv, Israel Founders: Shlomo Kramer (co-founder of Check Point and Imperva) and Gur Shatz (Incapsula). Intelligence Nexus: Shlomo Kramer is a seminal figure in the Israeli cyber-industrial complex. Check Point Software, his first major venture, established the “Firewall” as the standard for network security and cemented the transfer of IDF firewalling techniques to the civilian market. Cato Networks represents the evolution of this philosophy into the cloud era.4

Technographic Evidence of Deployment:

Multiple data points confirm Gucci as a reference client for Cato Networks.

  • Recruitment Data: Recruitment materials for Riskified and other Israeli tech firms explicitly list “Gucci” alongside “Acer” and “Booking.com” as major enterprise clients using similar Israeli tech stacks, specifically in the context of SASE (Secure Access Service Edge) and fraud prevention ecosystems.5
  • Operational Deployment: Cato Networks provides a SASE platform that converges SD-WAN (Software-Defined Wide Area Network) and network security into a cloud-native service. For a global retailer like Gucci, this means that traffic from retail stores, design offices in Milan, and remote workers does not flow directly to the open internet or a private data center. Instead, it is routed through Cato’s global “Points of Presence” (PoPs), many of which are managed via Israeli engineering hubs.8

Operational Analysis & Implications:

The deployment of Cato Networks indicates a structural dependency on Israeli infrastructure for the basic transport of corporate data.

  • Deep Packet Inspection (DPI): Cato’s architecture relies on decrypting and inspecting traffic at the “edge” to prevent malware and enforce policy. This means that an Israeli vendor has visibility into the packet headers and often the payload of Gucci’s internal corporate traffic.8
  • The “Kramer” Doctrine: By adopting Cato, Gucci subscribes to a security philosophy developed by the founders of the Israeli firewall industry. The “single pass” architecture allows the vendor to apply security rules (firewalling, IPS, anti-malware) instantly across the entire global network. This centralization of control is characteristic of military command-and-control network philosophies adapted for enterprise use.
  • Capital Flow: SASE subscriptions for an enterprise of Gucci’s scale (thousands of employees, hundreds of retail locations) represent a significant recurring revenue stream (ARR) flowing directly to Tel Aviv, funding further R&D in the sector.10

2.2. Cloud Security and Remediation: Wiz

Vendor Profile: Wiz

Origin: Tel Aviv, Israel

Founders: Assaf Rappaport, Ami Luttwak, Yinon Costica, and Roy Reznik (all former Unit 8200 and Microsoft Israel Azure security leads).

Intelligence Nexus: The founding team previously built Adallom (acquired by Microsoft) and led Microsoft’s cloud security division in Israel. They maintain close ties to the Israeli defense establishment’s cyber units.

Technographic Evidence of Deployment:

  • Strategic Engagement: Sabine d’Argœuves, Kering’s Head of Security Solutions, Identity, and Continuity, was documented hosting a keynote session specifically with Wiz at the Les Assises de la Cybersécurité conference.11
  • Contextual Deployment: This engagement coincides with Kering’s need to secure complex cloud environments (AWS, Azure, GCP) following data breaches. Wiz’s “agentless” scanning technology, which builds a “Graph” of the entire cloud estate to find attack paths, is the industry standard for rapid remediation of the types of vulnerabilities exposed in the 2025 breaches.12

Operational Analysis & Implications:

  • The “Graph” Visibility: Wiz connects to the cloud infrastructure via API and scans every workload, container, and permission. This grants the vendor a “God View” of Kering’s cloud architecture. Unlike traditional tools that look at individual servers, Wiz maps the relationships between assets. This capability is derived from intelligence analysis techniques used to map terror networks or enemy infrastructure (Link Analysis).
  • Post-Breach Dependency: The procurement of Wiz is often a direct response to a failure of traditional security. As such, the volatility of the cyber-threat landscape—often populated by actors using tools and exploits leaked from state arsenals—drives the adoption of Israeli defensive tech.

2.3. Identity Security: CyberArk

Vendor Profile: CyberArk

Origin: Petah Tikva, Israel

Founders: Udi Mokady (Unit 8200).

Intelligence Nexus: CyberArk pioneered the “Privileged Access Management” (PAM) market, focusing on securing the “keys to the kingdom” (admin credentials).

Technographic Evidence of Deployment:

  • Breach Targeting: Reports on the “ShinyHunters” and “Scattered Spider” campaigns explicitly list CyberArk alongside Kering/Gucci as targets or related entities in the Salesforce supply chain attacks.14 While being a target does not prove usage, the clustering of these names often indicates a shared supply chain ecosystem.
  • Soft Dual-Use Procurement: CyberArk is a staple of the “Unit 8200 Alumni” tech stack described in the audit criteria. It is used to lock down critical infrastructure. If Gucci utilizes CyberArk (highly probable for a company of its size and security maturity), it is integrating a layer of security that was explicitly designed to protect Israeli government and military networks before being commercialized.16

2.4. Incident Response and The “Protection Racket” Dynamic

Event Analysis: In June 2025, Kering (parent of Gucci) suffered a massive data breach attributed to the hacking group ShinyHunters (also linked to Scattered Spider). The breach exposed 43.5 million records, including customer PII.17

The Role of Israeli Response Firms:

  • Sygnia: The audit identified Sygnia, an Israeli incident response firm (Team8 portfolio), as being active in the same threat landscape. While definitive evidence of Gucci hiring Sygnia is not explicit in the snippets, Sygnia is a primary responder for high-end luxury and Fortune 500 breaches involving these specific threat actors.20
  • Team8 Connection: Team8 is a venture foundry started by the former commander of Unit 8200, Nadav Zafrir. Sygnia is a Team8 company. Any engagement with Sygnia represents a direct interface with the highest echelons of the Israeli cyber-intelligence establishment.
  • Remediation Cycle: The breach forced Kering to harden its defenses. The industry standard response to a Salesforce/Cloud breach involves deploying tools like Wiz (Cloud Posture) and Cato (Network Segmentation). Thus, the breach acts as a catalyst for deeper integration of Israeli technology. The failure of security leads to more investment in the “Unit 8200 Stack,” creating a feedback loop where the solution to digital insecurity is always found in Tel Aviv.11

3. Surveillance & Biometrics: The “Retail Tech” Layer

This section audits the presence of technologies that identify, track, and score individuals. This sector, often termed “Retail Tech” or “Loss Prevention,” is a primary vector for the dual-use application of Israeli surveillance technologies (facial recognition, gait analysis, behavioral prediction) in the civilian sphere.

3.1. Financial Surveillance: Riskified

Vendor Profile: Riskified Ltd.

Origin: Tel Aviv, Israel

Founders: Eido Gal (Unit 8200) and Assaf Feldman.

Intelligence Nexus: The company’s core technology is based on “Link Analysis”—the ability to connect disparate data points (email, IP, device, behavior) to verify identity. This is a direct commercialization of intelligence methodologies used to track targets across digital networks.

Technographic Evidence of Deployment:

  • Explicit Policy Disclosure: Gucci’s own Privacy Policy contains a dedicated clause titled “Disclosure of transaction details to Riskified Ltd.” It explicitly states: “When you purchase products on our website, we might disclose your transaction details to Riskified Ltd., a company with registered offices at 30 Kalisher St., Tel Aviv 6525724, Israel”.2
  • Strategic Partnership: Eva Alvarez, Director of Fraud, Risk & Payments at Gucci, was awarded the “Champion of Community” award at Riskified’s “Titans of Ecommerce” summit.3 This indicates a high-level, collaborative relationship where Gucci actively participates in the Riskified ecosystem, rather than just being a passive user.

Operational Analysis & Implications:

  • Data Residency: The policy confirms that personal information is “processed by Riskified in the State of Israel”.22 This is a definitive confirmation of data transfer to a jurisdiction with specific intelligence laws (see Section 5).
  • The “Chargeback Guarantee” Model: Riskified assumes the financial liability for fraud. To do this, they demand absolute visibility. They do not just process a payment; they ingest the “story” of the user. This includes:
    • Behavioral Biometrics: Mouse movements, typing cadence, hesitation in checkout.
    • Device Fingerprinting: Deep analysis of the user’s hardware and software configuration.
    • Social Graphing: Linking the email address to social media profiles and other public data.
  • Cross-Merchant Surveillance: Riskified’s power comes from its network. By serving Gucci, Acer, Booking.com, and others, it builds a global database of “good” and “bad” identities. A shopper’s behavior on Gucci.com is cross-referenced with their behavior on other Riskified-protected sites. This creates a privately held, transnational identity database located in Tel Aviv.24

3.2. Mobile Attribution and Tracking: AppsFlyer

Vendor Profile: AppsFlyer

Origin: Herzliya, Israel

Founders: Oren Kaniel and Reshef Mann.

Intelligence Nexus: AppsFlyer is the global leader in mobile attribution. While marketing-focused, its technology relies on the precise identification and tracking of unique devices across the internet, a capability that overlaps significantly with SIGINT.

Technographic Evidence of Deployment:

  • App Analysis: Forensic data and industry reports confirm Gucci’s mobile ecosystem (including regional apps like TSUM Outlet and global campaign apps) utilizes AppsFlyer for attribution and analytics.26
  • Integration: AppsFlyer SDKs are embedded in the mobile applications to track installs, user engagement, and ROI.

Operational Analysis & Implications:

  • The “God View”: AppsFlyer collects data from 98% of the world’s smartphones. By integrating this SDK, Gucci feeds its customer data into this massive unparalleled database.
  • Persistent Identifiers: The system relies on collecting IDFA (iOS) and GAID (Android) identifiers, IP addresses, and user agents. This data allows for the reconstitution of a user’s physical movements and digital life graph.
  • Marketing as Surveillance: The line between “ad targeting” and “surveillance” is semantic. The technical capability—identifying a specific human being via their device and logging their interactions—is identical. Gucci’s use of AppsFlyer facilitates this form of commercial surveillance.26

3.3. Visual Intelligence: Syte

Vendor Profile: Syte

Origin: Tel Aviv, Israel.

Intelligence Nexus: Syte specializes in “Visual AI”—computer vision algorithms that can analyze images to identify objects, textures, and styles. Israel is a global hub for Computer Vision research, driven largely by the needs of autonomous military systems (drones, missile guidance) and surveillance (Unit 9900).

Technographic Evidence of Deployment:

  • Partnership: Gucci has partnered with Syte to power visual search capabilities, allowing users to upload photos to find similar products.31
  • Use Case: The technology scans product catalogs and user-uploaded images to match items based on visual similarity.

Operational Analysis & Implications:

  • Dual-Use Training Data: By using Syte, Gucci contributes to the refinement of these computer vision models. The same algorithms that learn to distinguish between a “Gucci Jackie 1961” bag and a knockoff are structurally similar to those used to identify objects in satellite imagery or drone feeds (Target Recognition).
  • Soft Biometrics: Visual AI can also be used for “Soft Biometrics”—identifying individuals based on clothing, gait, or accessories in CCTV footage. While Gucci uses it for retail, the financial support of this sector strengthens the underlying capability.34

4. Project Future: Industrial Innovation and “Greenwashing”

This section addresses the requirement to investigate “Project Future” and digital transformation. In the context of Kering, this manifests as “House of Dreams” and the “Kering Material Innovation Lab” (MIL). The audit reveals a strategic effort to integrate Israeli industrial technology into the manufacturing supply chain, often framed under “Sustainability” initiatives.

4.1. Ultrasonic Dyeing: Sonovia

Vendor Profile: Sonovia

Origin: Ramat Gan, Israel.

Technology: Ultrasonic fabric finishing and dyeing.

Technographic Evidence of Deployment:

  • Formal Partnership: Kering has signed a partnership agreement with Sonovia to implement its D(y)ENIM technology. This system uses ultrasonic waves to inject indigo dye into denim, reducing water usage.35
  • Strategic Validation: Sonovia explicitly cites the Kering partnership as a validation of its technology, using the luxury brand’s prestige to market its systems globally.

Operational Analysis & Implications:

  • Economic Normalization: This partnership falls under Band: Low-Mid (Soft Dual-Use / Economic Normalization). It serves to “greenwash” the origin of the technology. By focusing on the environmental benefits (water saving), Kering normalizes a partnership with a firm embedded in the Israeli industrial economy.
  • Industrial Base Support: Sonovia is listed on the Tel Aviv Stock Exchange (TASE: SONO). Kering’s investment and procurement directly support the market capitalization of an Israeli industrial firm.

4.2. On-Demand Manufacturing: Kornit Digital

Vendor Profile: Kornit Digital

Origin: Rosh HaAyin, Israel.

Technology: Industrial digital printing for textiles.

Technographic Evidence of Deployment:

  • Consortium Membership: Kering is part of sustainability consortiums involving Kornit Digital.39
  • Technology Adoption: Kornit’s direct-to-garment (DTG) systems are central to the “Fashion on Demand” model Kering is pursuing to reduce inventory waste.40

Operational Analysis & Implications:

  • Military-Industrial Geography: Kornit’s headquarters and R&D are located in Rosh HaAyin, a key industrial zone. The company is a major exporter of high-tech industrial machinery, a sector that is crucial for Israel’s economic resilience.
  • Supply Chain Integration: Integrating Kornit printers into the supply chain creates a hardware dependency. These machines require proprietary inks and maintenance, creating a long-term economic tether to the vendor.

5. Cloud & Data Sovereignty: The Project Nimbus Link

This section addresses the requirement to investigate data centers and “Digital Sovereignty.”

5.1. Data Residency in Tel Aviv

The most significant finding of this audit regarding sovereignty is the Riskified Data Transfer Clause.

  • The Evidence: Gucci’s Privacy Policy states: “Your personal information will be processed by Riskified in the State of Israel and is transferred according to the adequacy decision of the European Commission”.22
  • The Implication: This is not a passive routing of data. It is a deliberate, contractual decision to store and process the financial and behavioral data of Gucci customers on servers located within Israeli jurisdiction.
  • Legal Exposure: Data stored in Israel is subject to Israeli law, including the Secret Monitoring Law and emergency regulations that grant state intelligence agencies (Shin Bet, Mossad, Unit 8200) broad access to data held by local companies for “national security” purposes. Unlike the GDPR, which offers recourse to the data subject, Israeli national security exemptions are robust and opaque.
  • Complicity Band Alignment: This aligns with the “Moderate-High” band description: “The company operates local data centers… explicitly to ensure ‘Digital Sovereignty’ for the state.” While Gucci does not operate the data center, it validates the sovereignty of the Israeli digital sphere by treating it as a safe harbor for its most sensitive customer data.2

5.2. Salesforce and The Cloud Ecosystem

Gucci’s heavy reliance on Salesforce (as evidenced by the breach severity) connects it to the “Project Nimbus” ecosystem indirectly.

  • Salesforce in Israel: Salesforce has a significant R&D presence in Israel (via acquisitions like ClickSoftware and Datorama).
  • The Google/Wiz Nexus: “Project Nimbus” is the Israeli government’s massive cloud project, awarded to Google and AWS. By utilizing Wiz (built by the ex-Microsoft team, now a major partner of Google Cloud), Kering is utilizing the same security and cloud assurance layer that protects the Israeli government’s own digital infrastructure. The technology used to secure Gucci’s cloud is the same technology ensuring the “digital sovereignty” of the state.12

6. Detailed Technographic Findings Table

The following table synthesizes the data points into a structured format for analysis against the ranking scale.

Domain Vendor Origin Status Criticality Data Exposure Complicity Band Indicator
Network Security Cato Networks Israel (Tel Aviv) Confirmed Critical High. Full visibility of network traffic metadata and payload. Low-Mid (Soft Dual-Use Procurement)
Fraud Prevention Riskified Israel (Tel Aviv) Confirmed Critical Severe. Transaction PII, behavioral biometrics, social graph. Moderate-High (Data Residency)
Cloud Security Wiz Israel (Tel Aviv) High Prob. High High. Full API access to cloud infrastructure (“God Mode”). Low-Mid (Soft Dual-Use Procurement)
Mobile Analytics AppsFlyer Israel (Herzliya) Confirmed High High. Device identifiers, location proxies, user behavior. Low (Commercial Compliance)
Visual AI Syte Israel (Tel Aviv) Confirmed Medium Medium. Product imagery, visual search queries. Low-Mid (Soft Dual-Use Procurement)
Manufacturing Sonovia Israel (Ramat Gan) Partner Medium Low. Industrial process data. Low-Mid (Economic Normalization)
Identity CyberArk Israel (Petah Tikva) Inferred High Critical. Admin credentials (PAM). Low-Mid (Unit 8200 Alumni)

7. Deep Dive: Second-Order Insights and Implications

This section analyzes the broader implications of the findings, moving beyond the “what” to the “so what.”

7.1. The “Safety Tax” and the Cyber-Economy Cycle

A critical insight derived from the audit is the cyclical relationship between cyber-insecurity and Israeli tech procurement.

  • The Cycle: High-profile breaches (like the ShinyHunters attack on Kering) destabilize the corporate environment.
  • The Response: Corporations like Kering panic and seek the most advanced “military-grade” protection available.
  • The Beneficiary: This invariably leads them to vendors like Cato Networks, Wiz, and CyberArk—firms founded by veterans of the very intelligence units that specialize in the offensive capabilities that necessitate such defenses.
  • The “Tax”: In effect, Gucci pays a “Safety Tax” to the Israeli sector. The 2025 breach served as a forcing function, likely accelerating the adoption of these technologies. This validates the “military-to-civilian” commercialization model, where the prestige of Unit 8200 (earned through state operations) is monetized in the civilian contract.11

7.2. The Normalization of Surveillance Marketing

The integration of Riskified and AppsFlyer represents a “civilianization” of surveillance.

  • Methodology: These firms do not use “marketing” data; they use “intelligence” data. Riskified’s “Link Analysis” is functionally identical to terror-network mapping. It connects a user’s device fingerprint in London to their purchase in Dubai and their email address created in New York.
  • Complicity: By utilizing these tools, Gucci is not just buying a service; it is participating in a global data consortium. It feeds its own customer data into the Riskified/AppsFlyer brain, making the surveillance graph stronger for all other clients. This creates a “network effect” of surveillance that is difficult to dismantle.24

7.3. Greenwashing the Industrial Ties

The Sonovia partnership is a textbook example of using sustainability to bypass geopolitical stigma.

  • The Narrative: Kering markets the partnership entirely on “water saving” and “sustainability.”
  • The Reality: The partnership validates an Israeli industrial player, integrating it into the supply chain of one of the world’s most visible brands. This insulates the vendor from the Boycott, Divestment, Sanctions (BDS) movement by framing any opposition to it as opposition to “environmental progress.” It effectively weaponizes ESG goals to secure continued economic cooperation.35

7.4. Data Sovereignty and the “Adequacy” Trap

The specific mention of the European Commission’s “Adequacy Decision” in Gucci’s privacy policy regarding Riskified is crucial.

  • The Mechanism: This legal framework allows Gucci to transfer data to Israel as if it were the EU.
  • The Implication: This ignores the reality of the Israeli intelligence apparatus. By relying on this decision, Gucci exposes its customers to a jurisdiction where the line between the “private sector” (Riskified) and the “security state” (Unit 8200) is porous, due to the mandatory reserve duty of employees and the deep social/professional networks of the founders.

  1. GUCCI® Store Tel Aviv, accessed January 30, 2026, https://www.gucci.com/us/en/store/he-belyar-street-34-kikar-hamedina
  2. CUSTOMER PRIVACY POLICY – Gucci, accessed January 30, 2026, https://www.gucci.com/documents/legal/privacy/en.pdf
  3. Riskified unveils product innovation to accelerate profitable growth for ecommerce merchants at annual fraud summit, Ascend 2024, accessed January 30, 2026, https://www.riskified.com/press/riskified-unveils-product-innovation-to-accelerate-profitable-growth-for-ecommerce-merchants-at-annual-fraud-summit-ascend-2024/
  4. Cato Networks | Company Overview & News – Forbes, accessed January 30, 2026, https://www.forbes.com/companies/cato-networks/
  5. Dun’s 100 – Best HighTech Companies to work for in year 2024, accessed January 30, 2026, https://www.duns100.co.il/en/rating/High_Tech/Best_HighTech_Companies_to_work_for/2024
  6. HR Business Partner משרות דרושים – Jobify, accessed January 30, 2026, https://jobify360.co.il/index.php/jobs/4329328431-in
  7. monday com משרות – חיפוש עבודה חינם באתר דרושים| Indeed, accessed January 30, 2026, https://il.indeed.com/q-monday-com-%D7%9E%D7%A9%D7%A8%D7%95%D7%AA.html
  8. Cato Protects Against CVE-2023-23397 Exploits, accessed January 30, 2026, https://www.catonetworks.com/blog/cato-protects-against-cve-2023-23397-exploits/
  9. Unleashing SASE for All: Empowering the Channel Ecosystem Business | Cato Networks, accessed January 30, 2026, https://www.catonetworks.com/blog/unleashing-sase-for-all-empowering-the-channel-ecosystem-business/
  10. Contactless Economy Issue38 Sep 18 – Sep 24, – Lxl-capital, accessed January 30, 2026, https://lxl-capital.com/newsletter-subscribe-1/f/weekly-pulse-check-issue-37-sep-18—sep-24-2023
  11. relive the 2025 edition – Les Assises, accessed January 30, 2026, https://www.lesassisesdelacybersecurite.com/en/les-assises/previous-editions-les-assises/edition-2025
  12. 2025 Top Global M&A Deals – Imaa-institute.org, accessed January 30, 2026, https://imaa-institute.org/blog/2025-top-global-m-and-a-deals/
  13. Andrew Martin – Insurance News Archive, accessed January 30, 2026, https://www.insurancejournal.com/author/andrew-martin/
  14. Hackers Claim Salesforce Data Breach Leaks Over 1 Billion Records | JD Supra, accessed January 30, 2026, https://www.jdsupra.com/legalnews/hackers-claim-salesforce-data-breach-8343289/
  15. FBI warns of UNC6040, UNC6395 hackers stealing Salesforce data – Bleeping Computer, accessed January 30, 2026, https://www.bleepingcomputer.com/news/security/fbi-warns-of-unc6040-unc6395-hackers-stealing-salesforce-data/
  16. Cyberint Alerts | Cortex XSOAR – Palo Alto Networks for Developers, accessed January 30, 2026, https://xsoar.pan.dev/docs/reference/integrations/cyberint
  17. What Kering’s Cyber Attack Teaches Industries About AI – AI Magazine, accessed January 30, 2026, https://aimagazine.com/news/cybercriminals-cracked-luxury-retail-supply-chains
  18. Hackers steal private data of Gucci, Balenciaga and McQueen customers – The Guardian, accessed January 30, 2026, https://www.theguardian.com/business/2025/sep/15/hackers-data-gucci-balenciaga-alexander-mcqueen-kering
  19. Millions of customer records stolen in Kering luxury brand data breach, accessed January 30, 2026, https://dig.watch/updates/millions-of-customer-records-stolen-in-kering-luxury-brand-data-breach
  20. 2023 France CISO Executive Summit – Gartner C-level Communities, accessed January 30, 2026, https://www.evanta.com/ciso/france/france-ciso-executive-summit-6087
  21. Ransomware Minute: Latest Attacks And News – Cybercrime Magazine, accessed January 30, 2026, https://cybersecurityventures.com/ransomware-minute/
  22. Privacy & Cookies | Gucci Official Site United States, accessed January 30, 2026, https://www.gucci.com/us/en/st/privacy-landing
  23. Ascend Titans of Ecommerce 2024 – Riskified, accessed January 30, 2026, https://www.riskified.com/ascend-2024/awards/
  24. How COVID-19 is Impacting eCommerce in LatAm – Riskified, accessed January 30, 2026, https://www.riskified.com/blog/how-covid-19-is-impacting-ecommerce-in-latam/
  25. Data Integration Analyst – Riskified | Built In, accessed January 30, 2026, https://builtin.com/job/data-integration-analyst/8275928
  26. AR Trial Rooms are Transforming Shopping – Martechvibe, accessed January 30, 2026, https://martechvibe.com/article/ar-trial-rooms-are-transforming-shopping/
  27. AppsFlyer : Loyalty is Everything – EME Outlook Magazine, accessed January 30, 2026, https://www.emeoutlookmag.com/expert-eye/appsflyer-loyalty-is-everything
  28. ЦУМ Аутлет – Apps on Google Play, accessed January 30, 2026, https://app.appsflyer.com/ru.tsum.outlet?c=%28none%29&af_channel=%28direct%29&af_sub1=%28none%29&af_ad=%28not%2520set%29&af_adset=%28none%29&af_sub2=%28none%29&af_sub3=%28none%29&af_sub4=%28none%29&pid=web_footer
  29. TSUM Collect – Apps on Google Play, accessed January 30, 2026, https://app.appsflyer.com/ru.tsum.collect?
  30. RAGTAG/rt -メンズ・レディース人気ブランド古着の販 – Apps on Google Play, accessed January 30, 2026, https://app.appsflyer.com/jp.co.tinpanalley.tinpanalleyapp?pid=seedapp_int&af_click_lookback=7d&seedparam=0dd5c6a4c0072174e5de93a9b3948627&af_siteid=3383
  31. accessed January 30, 2026, https://www.glossy.co/page/85/?s=connected-fashion
  32. Experiential retail: 10 Brands with The Best Customer Experiences – Syte.ai, accessed January 30, 2026, https://www.syte.ai/blog/customer-experience/experiential-retail-learn-how-10-brands-deliver-best-in-class-customer-experiences/
  33. The State of Fashion 2020 – McKinsey, accessed January 30, 2026, https://www.mckinsey.com/~/media/mckinsey/industries/retail/our%20insights/the%20state%20of%20fashion%202020%20navigating%20uncertainty/the-state-of-fashion-2020-final.pdf
  34. The Luxury Pivot: From Tech Laggards to Leaders – Total Retail, accessed January 30, 2026, https://www.mytotalretail.com/article/the-luxury-pivot-from-tech-laggards-to-leaders/
  35. Israel’s Sonovia to help Gucci mother co. Kering cut environmental harm, accessed January 30, 2026, https://www.jpost.com/environment-and-climate-change/article-742419
  36. Textile Sustainability Development Snapshots, accessed January 30, 2026, https://www.textileworld.com/textile-world/features/2023/05/textile-sustainability-development-snapshots/
  37. Sonovia’s Breakthrough Green Technology to be used in Denim Development, accessed January 30, 2026, https://www.prnewswire.com/il/news-releases/sonovias-breakthrough-green-technology-to-be-used-in-denim-development-301816260.html
  38. Sonovia’s And Pure Denim Unveiling It’s First Jeans Collection With Sonovia’s Sustainable Denim Dyeing Technology | Textile World, accessed January 30, 2026, https://www.textileworld.com/textile-world/2024/05/sonovias-and-pure-denim-unveiling-its-first-jeans-collection-with-sonovias-sustainable-denim-dyeing-technology/
  39. Is Sustainability Becoming the Hottest Fashion Trend of 2020? – Kornit Digital, accessed January 30, 2026, https://www.kornit.com/magazine/is-sustainability-becoming-the-hottest-fashion-trend-of-2020/
  40. Sustainable Fashion – SSG Events, accessed January 30, 2026, https://ssg.events/industry/sustainable-fashion/
  41. Source – SEC.gov, accessed January 30, 2026, https://www.sec.gov/Archives/edgar/data/1625791/000121390021017655/f20f2020_kornitdigital.htm
  42. The Economist [Aug 23rd 2025] – Index of /, accessed January 30, 2026, http://files.ethiopialearning.com/20250823_The%20Economist_noimg.epub

 

Related News & Articles