The week in breach news

This week: Companies face third-party data security woes, 72,000 user images were stolen from dating app Tea and France Travail has another big data breach.


United States

Allianz Life

Industry: Insurance Exploit: Third-Party Data Breach

Allianz Life Insurance Company of North America confirmed a major data breach affecting the personal information of the majority of its 1.4 million U.S. customers.

The breach, discovered on July 17, was traced back to a cyberattack the previous day. According to the company, the attacker used social engineering tactics to infiltrate an unspecified third-party, cloud-based CRM platform used by Allianz Life.

In addition to customer data, the breach exposed information related to financial professionals and a number of Allianz Life employees. The company emphasized that its internal systems were not compromised.

This incident impacts only Allianz Life’s U.S. operations and does not extend to other parts of the global Allianz Group.

Allianz Life is currently investigating the breach and working with cybersecurity experts to assess the full scope and secure affected systems.

Source

How it could affect your business

Zero Trust principles matter. Don’t automatically trust internal or partner systems. Verify every request, every time.

United States

Tea

Industry: Technology Exploit: Hacking

Tea, the app designed to let women anonymously discuss the men they’re dating, confirmed a significant data breach that exposed approximately 72,000 private user images.

The company disclosed that hackers gained unauthorized access to one of its data storage systems. In total, about 13,000 selfies and photo IDs users submitted to verify their identities were leaked, along with an additional 59,000 images that were already publicly viewable on the platform. No phone numbers or email addresses were compromised.

According to Tea, the breach affects only those who signed up for the app before February 2024. The incident stemmed from a vulnerability tied to an old identifier link.

Tea has not yet disclosed how many users were directly impacted. They said they are working to strengthen data protections and notify affected individuals.

Source

How it could affect your business

Outdated data practices and legacy storage links can become security liabilities even after policies change.

European Union

France Travail

Industry: Government & Public Sector Exploit: Hacking

France Travail, the French national public employment agency, has suffered another data breach, this time exposing hundreds of thousands of workers.

Attackers allegedly accessed the personal details of numerous job seekers via the employment portal used by a France Travail partner.

According to the French National Agency for the Security of Information Systems (ANSSI), attackers accessed the data through Kairos, an app that monitors job seekers’ training progress.

An estimated 340,000 individuals had data exposed. Attackers may have accessed job seekers’ names, postal addresses, email addresses, phone numbers and France Travail ID numbers.

In March 2024, France Travail suffered from a much larger data breach that exposed 43 million individuals, or over two-thirds of the European nation’s total population.

Source

How it could affect your business

Third-party systems must be treated as part of your attack surface. Any app that touches sensitive data must meet the same security standards as your core systems.

United States

Crumbl

Industry: Agriculture & Food Exploit: Ransomware & Malware

Popular dessert chain Crumbl Cookies reportedly become the latest victim of the Everest ransomware group, which is threatening to leak sensitive data on over 29,000 employees unless the company makes contact within the week.

The threat was posted on Everest’s dark web leak site, where the group shared file samples allegedly from Crumbl’s employee database, including store ID numbers, employee user IDs, corporate vs. franchise designations and FCM authentication token IDs.

In a twist on typical ransomware tactics, the gang did not leave the usual plaintext ransom note. Instead, they claim to have left a voice message for Crumbl’s incident response team and posted a countdown deadline, urging company representatives to make contact before time runs out.

Crumbl has not yet publicly responded to the claims or confirmed the breach.

Source

How it could affect your business

Early detection of your brand or data appearing on leak sites gives you a head start on incident containment and communication.

United States

Blue Shield of California

Industry: Insurance Exploit: Third-Party Data Breach

Blue Shield of California (BSC) reported a HIPAA breach following unauthorized access to member information linked to a deceased insurance broker.

According to BSC, the incident came to light on May 22, 2025, when the insurer learned that a broker from Harmon Insurance Services passed away. After her death, her husband and another employee of the firm allegedly accessed her online client list and asked another broker to assist those clients. Upon discovery, BSC revoked the login credentials to prevent further access.

The incident impacted 1,543 individuals. A separate breach involving email access reportedly affected an additional 673 individuals.  The potentially exposed data includes names, member ID numbers, Social Security numbers, dates of birth, addresses, phone numbers, group ID numbers and Medicare numbers.

Source

How it could affect your business

Delays in deactivating employee or partner accounts in a company’s network can open the door to accidental or unauthorized access.

European Union

The AMEOS Group

Industry: Healthcare Exploit: Hacking

The AMEOS Group, a leading healthcare provider operating in Austria, Germany and Switzerland, confirmed a cyberattack that recently compromised its IT systems. The breach may have exposed sensitive data belonging to patients, employees and business partners.

The company stated that despite extensive security measures, unauthorized access to its IT infrastructure occurred for a short time. AMEOS has not disclosed the exact timing of the breach, the method of intrusion or whether any ransom demands were issued.

In response, AMEOS says it swiftly disconnected all internal and external networks and shut down affected systems. IT and forensic experts were brought in to analyze the incident which remains under investigation.

Source

How it could affect your business

Swift shutdown of systems and network isolation likely minimized the breach's impact, highlighting the importance of an actionable incident response plan.

Like what you're reading?

Subscribe now to get security news and information in your inbox every week

Upcoming webinars

Gain actionable insights into leveraging sophisticated solutions to stay out of cybersecurity trouble and promote business growth.

Modern SAAS Threats Facing Microsoft 365 and How to Stop Them

August 12, 2025 2:00 PM EDT

Discover how to detect and stop emerging Microsoft 365 threats with real-world examples and learn about proven defense strategies.

Register Now

GTM Strategies: Helping MSPs Deliver Network Pentesting Beyond Compliance

August 14, 2025 11:00 AM AEST

Learn how to position automated network pentesting as a proactive, high-value service your clients need before compliance or cyber insurance forces the conversation.

Register Now