Third-party data breaches have grown increasingly common, highlighting the vital role of cybersecurity programs encompassing third-party cyber risk management, such as merchants, vendors and subsidiaries. The origins of these breaches trace back to the internet’s early days when rising online transactions prompted companies to accumulate extensive customer data, including names, addresses, and payment particulars.
In today’s landscape, businesses heavily depend on third-party vendors for diverse services like payment processing, cloud infrastructure, API integrations, customer support, and marketing. These vendors possess greater access to sensitive customer data, thus becoming prime targets for cybercriminals, prime targets that are hit badly.
Ponemon institute points out that 54% of the companies experienced data breaches resulting from their third parties, while 61% of the companies do not have a comprehensive inventory of their third parties.

In recent years, notable data breaches have unfolded, encompassing entities like SolarWinds and Marriott. These breaches exposed critical data like credit card specifics, Social Security IDs, and personal identification, fueling identity theft, financial manipulation, and cyber malfeasance.
From late 2022 to mid-2023, numerous additional third-party data breaches have emerged, jeopardizing the personal data of countless individuals, and resulting in unmeasurable cost and reputational damage.
Below are highlights of some of the latest prominent third-party data breaches.
August
Discord, an instant messaging and VoIP social platform, suffered a third-party data breach from Discord.io, a service allowing server owners to create custom invites to their channels.
The leak exposed the information of 760,000 members. The leaked information includes a member’s username, email address, billing address (small number of people), salted and hashed password (small number of people), and Discord ID.
Discord.io confirmed the data breach and shut down its services in response.





