News

Top 7 Data Breaches in August 2025 That Made Headlines

  • None--securityboulevard.com
  • published date: 2025-08-29 00:00:00 UTC

None

<p>August 2025 witnessed a series of data breaches across industries, exposing sensitive information and shaking customer trust. From global technology giants to airlines, credit bureaus, and staffing companies, no sector was spared. These incidents highlight how attackers are refining their methods and exploiting weak links in third-party systems, supply chains, and enterprise software.<br> Below is a detailed breakdown of top 7 data breaches in August 2025 which were disclosed in August 2025.</p><h2><b><img fetchpriority="high" decoding="async" class="aligncenter wp-image-10968 size-full" src="https://strobes.co/wp-content/uploads/2025/08/Aug-Data-Breaches-min-1080x1350-1.jpg" alt="Data Breaches in August 2025" width="1080" height="1350" srcset="https://strobes.co/wp-content/uploads/2025/08/Aug-Data-Breaches-min-1080x1350-1.jpg 1080w, https://strobes.co/wp-content/uploads/2025/08/Aug-Data-Breaches-min-1080x1350-1-240x300.jpg 240w, https://strobes.co/wp-content/uploads/2025/08/Aug-Data-Breaches-min-1080x1350-1-819x1024.jpg 819w, https://strobes.co/wp-content/uploads/2025/08/Aug-Data-Breaches-min-1080x1350-1-768x960.jpg 768w" sizes="(max-width: 1080px) 100vw, 1080px"></b></h2><h2><b>1. Google’s Salesforce Breach</b></h2><h3><b>Incident Overview</b></h3><p><span style="font-weight: 400;">In August, Google confirmed that its </span><b>Salesforce-hosted customer database</b><span style="font-weight: 400;"> had been breached by the well-known hacking group </span><b>ShinyHunters</b><span style="font-weight: 400;">. Investigators later revealed the campaign began in </span><b>June 2025</b><span style="font-weight: 400;"> but went undetected for weeks. The breach was part of a larger attack wave targeting Salesforce CRM environments across multiple enterprises.</span></p><h3><b>What Data Was Exposed</b></h3><p><span style="font-weight: 400;">The stolen information mainly comprised business contact records, and they included:</span></p><div class="code-block code-block-12 ai-track" data-ai="WzEyLCIiLCJCbG9jayAxMiIsIiIsMV0=" style="margin: 8px 0; clear: both;"> <style> .ai-rotate {position: relative;} .ai-rotate-hidden {visibility: hidden;} .ai-rotate-hidden-2 {position: absolute; top: 0; left: 0; width: 100%; height: 100%;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback, .ai-list-block, .ai-list-block-ip, .ai-list-block-filter {visibility: hidden; position: absolute; width: 50%; height: 1px; top: -1000px; z-index: -9999; margin: 0px!important;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback {min-width: 1px;} </style> <div class="ai-rotate ai-unprocessed ai-timed-rotation ai-12-1" data-info="WyIxMi0xIiwxXQ==" style="position: relative;"> <div class="ai-rotate-option" style="visibility: hidden;" data-index="1" data-name="VGVjaHN0cm9uZyBHYW5nIFlvdXR1YmU=" data-time="MTA="> <div class="custom-ad"> <div style="margin: auto; text-align: center;"><a href="https://youtu.be/Fojn5NFwaw8" target="_blank"><img src="https://securityboulevard.com/wp-content/uploads/2024/12/Techstrong-Gang-Youtube-PodcastV2-770.png" alt="Techstrong Gang Youtube"></a></div> <div class="clear-custom-ad"></div> </div></div> </div> </div><ul> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Names</span><span style="font-weight: 400;"><br> </span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Email addresses</span><span style="font-weight: 400;"><br> </span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Phone numbers</span><span style="font-weight: 400;"><br> </span></li> </ul><p><span style="font-weight: 400;">Financial data and credentials were not included in the disclosure, but even contact information (e.g. contact details) can be used in phishing, impersonation, and social engineering attacks.</span></p><h3><b>Number of Affected Individuals</b></h3><p><span style="font-weight: 400;">Google has not published exact numbers, but reports estimate </span><b>millions of contacts</b><span style="font-weight: 400;"> were exposed.</span></p><div class="code-block code-block-15" style="margin: 8px 0; clear: both;"> <script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-2091799172090865" crossorigin="anonymous" type="d51aef63e83f5252b4c551c9-text/javascript"></script> <!-- SB In Article Ad 1 --> <ins class="adsbygoogle" style="display:block" data-ad-client="ca-pub-2091799172090865" data-ad-slot="8723094367" data-ad-format="auto" data-full-width-responsive="true"></ins> <script type="d51aef63e83f5252b4c551c9-text/javascript"> (adsbygoogle = window.adsbygoogle || []).push({}); </script></div><h3><b>Business Impact</b></h3><p><span style="font-weight: 400;">The hack called into question the safety of SaaS ecosystems and risks of cloud dependency. In the case of a company of this magnitude as Google, the image of weak vendor controls can affect the business relationship and regulatory oversight.</span></p><h3><b>Company Response</b></h3><p><span style="font-weight: 400;">In early August, Google started to alert affected business customers and collaborated with Salesforce to limit the exposure. The company wrote that it is improving SaaS monitoring and strengthening vendor-specific security checks.</span></p><h3><b>Key Lesson</b></h3><p><span style="font-weight: 400;">Even highly resourced enterprises are not immune when </span><b>third-party SaaS platforms are compromised</b><span style="font-weight: 400;">. Stronger vendor governance, continuous monitoring, and proactive breach detection are crucial in today’s interconnected environments.</span></p><p><span style="font-weight: 400;"> Sources:</span><a href="https://www.brightdefense.com/resources/recent-data-breaches/" rel="nofollow noopener"> <span style="font-weight: 400;">BrightDefense</span></a><span style="font-weight: 400;">,</span><a href="https://news.trendmicro.com/2025/08/26/google-data-breach-gmail/" rel="nofollow noopener"> <span style="font-weight: 400;">TrendMicro</span></a><span style="font-weight: 400;">,</span><a href="https://economictimes.indiatimes.com/news/international/global-trends/us-news-2-5-billion-gmail-accounts-warned-scammers-using-us-650-area-code-to-trick-millions-what-should-you-do/articleshow/123473376.cms" rel="nofollow noopener"> <span style="font-weight: 400;">Economic Times</span></a></p><h2><b>2. Air France and KLM Data Breach</b></h2><h3><b>Incident Overview</b></h3><p><span style="font-weight: 400;">On August 7, 2025, Air France and KLM announced a data breach that was associated with a third-party customer support system. The attackers used the vendor system to gain access to passenger records and information in the loyalty program.</span></p><h3><b>What Data Was Exposed</b></h3><ul> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Passenger names</span><span style="font-weight: 400;"><br> </span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Contact information (emails, phone numbers)</span><span style="font-weight: 400;"><br> </span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Flying Blue loyalty numbers</span><span style="font-weight: 400;"><br> </span></li> </ul><p><span style="font-weight: 400;">While no payment card or passport data was reported, loyalty points are frequently targeted by fraud rings and sold in underground markets.</span></p><h3><b>Number of Affected Individuals</b></h3><p><span style="font-weight: 400;">The airlines have not disclosed exact numbers, but industry reports suggest the breach could cover </span><b>hundreds of thousands of travelers</b><span style="font-weight: 400;">.</span></p><h3><b>Business Impact</b></h3><p><span style="font-weight: 400;">For airlines, breaches create </span><b>operational disruption</b><span style="font-weight: 400;"> and </span><b>reputational damage</b><span style="font-weight: 400;">. Customer trust is especially fragile in travel, where personal details are closely linked to identity verification, booking, and financial accounts.</span></p><h3><b>Company Response</b></h3><p><span style="font-weight: 400;">Both airlines assured customers that they had locked down the affected vendor system and initiated an investigation. They also rolled out alerts to help customers track suspicious account activity.</span></p><h3><b>Key Lesson</b></h3><p><span style="font-weight: 400;">Airlines rely heavily on third-party systems for ticketing, loyalty programs, and customer service. Without rigorous vendor risk management, these integrations can become entry points for attackers.</span></p><p><span style="font-weight: 400;"> Source:</span> <a href="https://www.forbes.com/sites/suzannerowankelleher/2025/08/08/5-airlines-hacked-air-france-klm-latest-victims/" rel="nofollow noopener"><span style="font-weight: 400;">Forbes</span></a></p><h2><b>3. Workday Data Breach</b></h2><h3><b>Incident Overview</b></h3><p><b>Workday</b><span style="font-weight: 400;">, a global provider of HR and finance software, announced on </span><b>August 18, 2025</b><span style="font-weight: 400;"> that it too was targeted in the </span><b>Salesforce exploitation campaign</b><span style="font-weight: 400;">. Attackers leveraged weaknesses in Salesforce integrations to extract data.</span></p><h3><b>What Data Was Exposed</b></h3><ul> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Names</span><span style="font-weight: 400;"><br> </span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Email addresses</span><span style="font-weight: 400;"><br> </span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Business phone numbers of Workday contacts</span><span style="font-weight: 400;"><br> </span></li> </ul><p><span style="font-weight: 400;">While this breach did not involve employee HR records, exposing professional contact information puts enterprises at risk of </span><b>targeted spear-phishing</b><span style="font-weight: 400;"> attacks.</span></p><h3><b>Number of Affected Individuals</b></h3><p><span style="font-weight: 400;">The company has not revealed specific numbers, but analysts suggest the exposure is significant given Workday’s global customer base.</span></p><h3><b>Business Impact</b></h3><p><span style="font-weight: 400;">As an HR SaaS leader, Workday faces heightened scrutiny when its own systems or integrations are exploited. The incident risks undermining confidence in cloud-based HR solutions.</span></p><h3><b>Company Response</b></h3><p><span style="font-weight: 400;">Workday confirmed the breach but emphasized that no payroll or HR data was impacted. The company said it is strengthening its monitoring of third-party integrations and expanding threat detection.</span></p><h3><b>Key Lesson</b></h3><p><span style="font-weight: 400;">This incident reinforces the </span><b>domino effect of SaaS supply chain risks</b><span style="font-weight: 400;">. When a platform as widely used as Salesforce is compromised, it cascades across numerous organizations.</span></p><p><span style="font-weight: 400;"> Sources:</span> <a href="https://www.websiteplanet.com/news/workday-data-breach-2025/" rel="nofollow noopener"><span style="font-weight: 400;">Website Planet</span></a></p><h2><b>4. TransUnion Data Breach</b></h2><h3><b>Incident Overview</b></h3><p><span style="font-weight: 400;">On </span><b>August 28, 2025</b><span style="font-weight: 400;">, credit reporting agency </span><b>TransUnion</b><span style="font-weight: 400;"> revealed a breach that started in July and was traced to a </span><b>third-party application compromise</b><span style="font-weight: 400;">. The attackers accessed highly sensitive personal records of millions of individuals.</span></p><h3><b>What Data Was Exposed</b></h3><ul> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Full names</span><span style="font-weight: 400;"><br> </span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Personally identifiable information (PII)</span><span style="font-weight: 400;"><br> </span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Social Security Numbers</span><span style="font-weight: 400;"><br> </span></li> </ul><h3><b>Number of Affected Individuals</b></h3><p><span style="font-weight: 400;">The breach impacted </span><b>4.4 million people</b><span style="font-weight: 400;">, making it one of the largest exposures of August.</span></p><h3><b>Business Impact</b></h3><p><span style="font-weight: 400;">Credit bureaus hold vast databases of identity information used for financial verification, loans, and credit checks. A breach of this nature can lead to </span><b>identity theft, fraud, and regulatory investigations</b><span style="font-weight: 400;">, significantly harming brand credibility.</span></p><h3><b>Company Response</b></h3><p><span style="font-weight: 400;">TransUnion confirmed the breach and is working with regulators, offering credit monitoring and identity theft protection services to affected individuals.</span></p><h3><b>Key Lesson</b></h3><p><span style="font-weight: 400;">Organizations that store critical identity data must maintain </span><b>continuous third-party risk assessments</b><span style="font-weight: 400;">, </span><b>robust encryption</b><span style="font-weight: 400;">, and </span><b>real-time exposure monitoring</b><span style="font-weight: 400;">.</span></p><p><span style="font-weight: 400;"> Source:</span><a href="https://therecord.media/transunion-data-breach-4-million" rel="nofollow noopener"> <span style="font-weight: 400;">The Record</span></a></p><h2><b>5. Connex Credit Union Data Breach</b></h2><h3><b>Incident Overview</b></h3><p><span style="font-weight: 400;">On </span><b>August 11, 2025</b><span style="font-weight: 400;">, </span><b>Connex Credit Union</b><span style="font-weight: 400;"> in Connecticut disclosed a breach that impacted approximately </span><b>172,000 customers</b><span style="font-weight: 400;">.</span></p><h3><b>What Data Was Exposed</b></h3><p><span style="font-weight: 400;">The bank confirmed that </span><b>customer personal data</b><span style="font-weight: 400;"> was exposed, though details on the exact categories (financial vs. PII) remain under review.</span></p><h3><b>Number of Affected Individuals</b></h3><p><span style="font-weight: 400;">About </span><b>172,000 customers</b><span style="font-weight: 400;"> were impacted.</span></p><h3><b>Business Impact</b></h3><p><span style="font-weight: 400;">Smaller financial institutions often lack the depth of cybersecurity resources available to large banks. As a result, breaches of this scale can create </span><b>outsized reputational and compliance challenges</b><span style="font-weight: 400;">, particularly around </span><b>FDIC and state banking regulations</b><span style="font-weight: 400;">.</span></p><h3><b>Company Response</b></h3><p><span style="font-weight: 400;">Connex confirmed the breach to regulators and began notifying customers. An internal review and security upgrades are underway.</span></p><h3><b>Key Lesson</b></h3><p><span style="font-weight: 400;">Even regional banks are attractive targets. Investment in </span><b>continuous vulnerability management, penetration testing, and customer notification planning</b><span style="font-weight: 400;"> is essential.</span></p><p><span style="font-weight: 400;"> Source:</span> <a href="https://www.bleepingcomputer.com/news/security/connex-credit-union-discloses-data-breach-impacting-172-000-people/" rel="nofollow noopener"><span style="font-weight: 400;">Bleepingcomputer</span></a></p><h2><b>6. Manpower RansomHub Attack</b></h2><h3><b>Incident Overview</b></h3><p><span style="font-weight: 400;">On </span><b>August 12, 2025</b><span style="font-weight: 400;">, staffing giant </span><b>Manpower</b><span style="font-weight: 400;"> confirmed it was attacked by the </span><b>RansomHub ransomware group</b><span style="font-weight: 400;">. The attackers exfiltrated a massive </span><b>500GB of data</b><span style="font-weight: 400;"> before demanding a ransom.</span></p><h3><b>What Data Was Exposed</b></h3><ul> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Corporate files</span><span style="font-weight: 400;"><br> </span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Employee and candidate records</span><span style="font-weight: 400;"><br> </span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Sensitive personal information</span><span style="font-weight: 400;"><br> </span></li> </ul><h3><b>Number of Affected Individuals</b></h3><p><span style="font-weight: 400;">The breach impacted </span><b>144,189 individuals</b><span style="font-weight: 400;">.</span></p><h3><b>Business Impact</b></h3><p><span style="font-weight: 400;">The attack disrupted </span><b>talent management operations</b><span style="font-weight: 400;"> and raised concerns among corporate clients who depend on Manpower for staffing services. Beyond financial loss, the reputational hit may affect long-term client confidence.</span></p><h3><b>Company Response</b></h3><p><span style="font-weight: 400;">Manpower confirmed the attack, engaged incident response teams, and is working with regulators. However, leaked data on the dark web suggests that extortion attempts may continue.</span></p><h3><b>Key Lesson</b></h3><p><span style="font-weight: 400;">The case demonstrates the </span><b>evolution of ransomware</b><span style="font-weight: 400;"> toward double-extortion tactics, where both encryption and data leaks maximize pressure on victims.</span></p><p><span style="font-weight: 400;">Source:</span> <a href="https://www.bleepingcomputer.com/news/security/manpower-staffing-agency-discloses-data-breach-after-attack-claimed-by-ransomhub/" rel="nofollow noopener"><span style="font-weight: 400;">Bleepingcomputer</span></a></p><h2><b>7. Orange SA Data Leak</b></h2><h3><b>Incident Overview</b></h3><p><span style="font-weight: 400;">French telecom provider </span><b>Orange SA</b><span style="font-weight: 400;"> was hacked in early August by the ransomware group </span><b>Warlock</b><span style="font-weight: 400;">. Attackers stole around </span><b>4GB of sensitive business data</b><span style="font-weight: 400;"> and published it on the dark web.</span></p><h3><b>What Data Was Exposed</b></h3><ul> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Confidential business user information</span><span style="font-weight: 400;"><br> </span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Internal corporate documents</span><span style="font-weight: 400;"><br> </span></li> </ul><h3><b>Number of Affected Individuals</b></h3><p><span style="font-weight: 400;">Exact counts remain unclear, but leaked datasets suggest significant exposure among Orange’s </span><b>enterprise clients</b><span style="font-weight: 400;">.</span></p><h3><b>Business Impact</b></h3><p><span style="font-weight: 400;">Telecom providers are high-value targets due to their role in </span><b>critical infrastructure</b><span style="font-weight: 400;">. Public leaks of corporate data can harm relationships with business customers, create compliance issues, and erode trust.</span></p><h3><b>Company Response</b></h3><p><span style="font-weight: 400;">Orange confirmed the incident and said it is cooperating with French authorities. The company also initiated additional monitoring to identify misuse of leaked data.</span></p><h3><b>Key Lesson</b></h3><p><span style="font-weight: 400;">Telecom firms must prioritize </span><b>ransomware resilience, vendor oversight, and rapid incident disclosure</b><span style="font-weight: 400;"> to protect business users and maintain trust.</span></p><p><span style="font-weight: 400;"> Source:</span><a href="https://timesofindia.indiatimes.com/technology/tech-news/orange-sa-hacked-user-data-released-on-dark-web-what-one-of-worlds-leading-telecom-companies-has-to-say/articleshow/123482151.cms" rel="nofollow noopener"> <span style="font-weight: 400;">Times of India</span></a></p><h2><b>Bottomline</b></h2><p><span style="font-weight: 400;">The </span><b>August 2025 data breaches</b><span style="font-weight: 400;"> confirm recurring security challenges:</span></p><ul> <li style="font-weight: 400;" aria-level="1"><b>Supply chain compromises</b><span style="font-weight: 400;"> (Google, Workday, Air France/KLM)</span><span style="font-weight: 400;"><br> </span></li> <li style="font-weight: 400;" aria-level="1"><b>Critical data theft at scale</b><span style="font-weight: 400;"> (TransUnion, Connex Credit Union)</span><span style="font-weight: 400;"><br> </span></li> <li style="font-weight: 400;" aria-level="1"><b>Ransomware with public leaks</b><span style="font-weight: 400;"> (Manpower, Orange SA)</span><span style="font-weight: 400;"><br> </span></li> </ul><p><span style="font-weight: 400;">Organizations must move from reactive security to </span><b>continuous threat exposure management (CTEM)</b><span style="font-weight: 400;">, supported by </span><b>risk-based vulnerability management (RBVM)</b><span style="font-weight: 400;">. </span><b>Strobes Security</b><span style="font-weight: 400;"> enables enterprises to:</span></p><ul> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Continuously identify exposures across SaaS, cloud, and on-prem environments</span><span style="font-weight: 400;"><br> </span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Prioritize based on business risk, not just CVSS scores</span><span style="font-weight: 400;"><br> </span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Automate workflows for faster remediation</span><span style="font-weight: 400;"><br> </span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Validate exposures through </span><b>Pentesting as a Service (PTaaS)</b><b><br> </b></li> </ul><p><a href="https://strobes.co/get-started/"><span style="font-weight: 400;"> </span><span style="font-weight: 400;">Schedule a demo with Strobes</span></a><span style="font-weight: 400;"> to see how our unified platform can reduce your breach risk.</span></p><p>The post <a rel="nofollow" href="https://strobes.co/blog/top-7-data-breaches-in-august-2025-that-made-headlines/">Top 7 Data Breaches in August 2025 That Made Headlines</a> appeared first on <a rel="nofollow" href="https://strobes.co/">Strobes Security</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/08/top-7-data-breaches-in-august-2025-that-made-headlines/" data-a2a-title="Top 7 Data Breaches in August 2025 That Made Headlines"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Ftop-7-data-breaches-in-august-2025-that-made-headlines%2F&amp;linkname=Top%207%20Data%20Breaches%20in%20August%202025%20That%20Made%20Headlines" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Ftop-7-data-breaches-in-august-2025-that-made-headlines%2F&amp;linkname=Top%207%20Data%20Breaches%20in%20August%202025%20That%20Made%20Headlines" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Ftop-7-data-breaches-in-august-2025-that-made-headlines%2F&amp;linkname=Top%207%20Data%20Breaches%20in%20August%202025%20That%20Made%20Headlines" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Ftop-7-data-breaches-in-august-2025-that-made-headlines%2F&amp;linkname=Top%207%20Data%20Breaches%20in%20August%202025%20That%20Made%20Headlines" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Ftop-7-data-breaches-in-august-2025-that-made-headlines%2F&amp;linkname=Top%207%20Data%20Breaches%20in%20August%202025%20That%20Made%20Headlines" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://strobes.co">Strobes Security</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Likhil Chekuri">Likhil Chekuri</a>. Read the original post at: <a href="https://strobes.co/blog/top-7-data-breaches-in-august-2025-that-made-headlines/">https://strobes.co/blog/top-7-data-breaches-in-august-2025-that-made-headlines/</a> </p>