The release of the Black Kite Wholesale Retail TPRM Report 2026 provides an assessment of the cybersecurity landscape facing the commerce sector. As retailers continue to digitize operations and expand their vendor ecosystems, the attack surface has grown exponentially. One of the most alarming findings is that most major companies have had their credentials exposed by infostealers.
The report highlights that third-party risk management (TPRM) in retail is no longer a backend compliance exercise but a frontline defense necessity. Retailers are increasingly interconnected with logistics providers, payment processors, and cloud services, creating a complex web of dependencies.Â
The report underscores that visibility into these fourth-party and Nth-party relationships remains a significant blind spot for many organizations.
A key focus of the 2026 analysis is the wholesale sector's specific vulnerability, where cybersecurity risks have intensified as threat actors pivot toward targets that possess high-volume transaction data and time-sensitive logistical operations.Â
The report details how attackers are exploiting unpatched vulnerabilities and weak access controls within the vendor network to infiltrate wholesale environments.
Exposed credentials affect over 70% of major retailers, nearly 60% of wholesalers, and 52% of the supply chain, as stealer logs and leaked credentials currently pose a prominent risk.
Also, among ransomware targets, 17% of retail victims had over $1 billion in revenue, and 39% of wholesale victims had mid-market revenue of $20–$100 million, indicating that attackers focus on fewer high-value retail targets and more mid-size wholesale companies.Â
Looking ahead, the report outlines essential TPRM trends for 2026 that security leaders must address. There is a clear shift away from periodic assessments toward continuous, automated monitoring of vendor risks.Â
Report recommendations include:
In a different report this month, security researchers announced that dozens of global companies were breached using infostealer credentials, including in aviation, defense, and engineering.