The article discusses the data breach that occurred in popular website application Zomato, highlighting the vulnerabilities of online data. It provides information on the sources of data breach, leak of personalized information, and human error or planned conspiracy. The article emphasizes the need for adequate security measures to ensure the safety and security of the personalized data of the users.