United States
Allianz Life
Allianz Life Insurance Company of North America confirmed a major data breach affecting the personal information of the majority of its 1.4 million U.S. customers.
The breach, discovered on July 17, was traced back to a cyberattack the previous day. According to the company, the attacker used social engineering tactics to infiltrate an unspecified third-party, cloud-based CRM platform used by Allianz Life.
In addition to customer data, the breach exposed information related to financial professionals and a number of Allianz Life employees. The company emphasized that its internal systems were not compromised.
This incident impacts only Allianz Life’s U.S. operations and does not extend to other parts of the global Allianz Group.
Allianz Life is currently investigating the breach and working with cybersecurity experts to assess the full scope and secure affected systems.
SourceHow it could affect your business
Zero Trust principles matter. Don’t automatically trust internal or partner systems. Verify every request, every time.
United States
Tea
Tea, the app designed to let women anonymously discuss the men they’re dating, confirmed a significant data breach that exposed approximately 72,000 private user images.
The company disclosed that hackers gained unauthorized access to one of its data storage systems. In total, about 13,000 selfies and photo IDs users submitted to verify their identities were leaked, along with an additional 59,000 images that were already publicly viewable on the platform. No phone numbers or email addresses were compromised.
According to Tea, the breach affects only those who signed up for the app before February 2024. The incident stemmed from a vulnerability tied to an old identifier link.
Tea has not yet disclosed how many users were directly impacted. They said they are working to strengthen data protections and notify affected individuals.
SourceHow it could affect your business
Outdated data practices and legacy storage links can become security liabilities even after policies change.
European Union
France Travail
France Travail, the French national public employment agency, has suffered another data breach, this time exposing hundreds of thousands of workers.
Attackers allegedly accessed the personal details of numerous job seekers via the employment portal used by a France Travail partner.
According to the French National Agency for the Security of Information Systems (ANSSI), attackers accessed the data through Kairos, an app that monitors job seekers’ training progress.
An estimated 340,000 individuals had data exposed. Attackers may have accessed job seekers’ names, postal addresses, email addresses, phone numbers and France Travail ID numbers.
In March 2024, France Travail suffered from a much larger data breach that exposed 43 million individuals, or over two-thirds of the European nation’s total population.
SourceHow it could affect your business
Third-party systems must be treated as part of your attack surface. Any app that touches sensitive data must meet the same security standards as your core systems.
United States
Crumbl
Popular dessert chain Crumbl Cookies reportedly become the latest victim of the Everest ransomware group, which is threatening to leak sensitive data on over 29,000 employees unless the company makes contact within the week.
The threat was posted on Everest’s dark web leak site, where the group shared file samples allegedly from Crumbl’s employee database, including store ID numbers, employee user IDs, corporate vs. franchise designations and FCM authentication token IDs.
In a twist on typical ransomware tactics, the gang did not leave the usual plaintext ransom note. Instead, they claim to have left a voice message for Crumbl’s incident response team and posted a countdown deadline, urging company representatives to make contact before time runs out.
Crumbl has not yet publicly responded to the claims or confirmed the breach.
SourceHow it could affect your business
Early detection of your brand or data appearing on leak sites gives you a head start on incident containment and communication.
United States
Blue Shield of California
Blue Shield of California (BSC) reported a HIPAA breach following unauthorized access to member information linked to a deceased insurance broker.
According to BSC, the incident came to light on May 22, 2025, when the insurer learned that a broker from Harmon Insurance Services passed away. After her death, her husband and another employee of the firm allegedly accessed her online client list and asked another broker to assist those clients. Upon discovery, BSC revoked the login credentials to prevent further access.
The incident impacted 1,543 individuals. A separate breach involving email access reportedly affected an additional 673 individuals. The potentially exposed data includes names, member ID numbers, Social Security numbers, dates of birth, addresses, phone numbers, group ID numbers and Medicare numbers.
SourceHow it could affect your business
Delays in deactivating employee or partner accounts in a company’s network can open the door to accidental or unauthorized access.
European Union
The AMEOS Group
The AMEOS Group, a leading healthcare provider operating in Austria, Germany and Switzerland, confirmed a cyberattack that recently compromised its IT systems. The breach may have exposed sensitive data belonging to patients, employees and business partners.
The company stated that despite extensive security measures, unauthorized access to its IT infrastructure occurred for a short time. AMEOS has not disclosed the exact timing of the breach, the method of intrusion or whether any ransom demands were issued.
In response, AMEOS says it swiftly disconnected all internal and external networks and shut down affected systems. IT and forensic experts were brought in to analyze the incident which remains under investigation.
SourceHow it could affect your business
Swift shutdown of systems and network isolation likely minimized the breach's impact, highlighting the importance of an actionable incident response plan.