The U.S. Department of Justice has opened a criminal investigation into Deel over allegations that it recruited a spy inside rival Rippling, according to documents seen by The Wall Street Journal. From the report: An Ireland-based Rippling employee, Keith O'Brien, alleged in an affidavit filed in April that Deel Chief Executive Alex Bouaziz recruited him and gave him instructions for what information to take from Rippling. O'Brien alleged that other executives were involved in the spying plot, including Bouaziz's father, who is Deel's executive chairman and chief strategy officer.
A spokeswoman for Deel said the company isn't aware of a criminal investigation but is willing to cooperate with authorities. The company has previously said: "We deny all legal wrongdoing and look forward to asserting our counterclaims." Unsealed court documents allege that an entity tied to Deel transferred $6,000 to an account owned by the wife of Chief Operating Officer Dan Westgarth, and that the same amount was forwarded from the account to O'Brien seconds later.
A Toronto man posed as a pilot for years in order to fool airlines into giving him hundreds of free flights, prosecutors have alleged, in a case that has prompted comparisons to the Hollywood thriller Catch Me If You Can. From a report: Authorities in Hawaii announced this week that Dallas Pokornik, 33, had been charged with wire fraud after he allegedly fooled three major US carriers into giving him free tickets over a span of four years.
Airlines typically offer standby tickets to their own staff and those with rival airlines as a way of ensuring the broader industry can effectively move employees across continents. According to court documents, Pokornik was a flight attendant for a Toronto-based airline from 2017 to 2019, but then used an employee identification from that carrier to obtain tickets, "which he in fact knew to be fraudulent at the time it was so presented."
The only Toronto-based airline, Porter, told reporters it was "unable to verify any information related to this story." On one occasion, Pokornik is alleged to have requested a jumpseat in an aircraft's cockpit, which are normally reserved for off-duty pilots, even though he was not a pilot and did not have an airman's certificate. Federal rules prohibit the cockpit jumpseats from being used for leisure travel.
They can intercept user credentials while providing real-time context that helps attackers convince victims to approve MFA challenges during phone calls..
They can intercept user credentials while providing real-time context that helps attackers convince victims to approve MFA challenges during phone calls..
On Thursday, Ilya Lichtenstein, who was at the center of a massive 2016 crypto heist worth billions at the time, wrote online that he is now out of prison and has changed his ways.
βTen years ago, I decided that I would hack the largest cryptocurrency exchange in the world,β Lichtenstein wrote on LinkedIn, detailing a time when his startup was barely making money and he decided to steal some instead.
βThis was a terrible idea. It was the worst thing I had ever done,β he added. βIt upended my life, the lives of people close to me, and affected thousands of users of the exchange. I know I disappointed a lot of people who believed in me and grossly misused my talents.β
Lead Analysts: Jeewan Singh Jalal, Prabhakaran Ravichandhiran and Anand Bodke
KnowBe4 Threat Labs recently examined a sophisticated dual-vector campaign that demonstrates the real-world exploitation chain following credential compromise.
True crime might be Netflix's most consistent genre in terms of hit rate. True-crime documentaries, including The Perfect Neighbor and Amy Bradley Is Missing, dominated the Netflix algorithm last year. The sentiment also includes scripted true crime, and Suitcase Killer: The Melanie McGuire Story is the latest hit for the streamer.
Scammers stole an estimated $17 billion worth of cryptocurrency in 2025, according to a new report from Chainalysis.Β Notably, the report found that AI-assisted scams stole 4.5 times more money than scams that didnβt leverage AI.
One Identity, a trusted leader inΒ identity security, today announces aΒ major upgrade to One Identity Manager, a top-rated IGA solution, strengtheningΒ identity governanceΒ as a critical security control for modern enterprise environments.Β
One Identity Manager 10.0 introduces security-driven capabilities for risk-based governance,Β identity threat detection and response (ITDR), and AI-assisted insight, helping organizations better anticipate, contain, and manage identity-driven attacks across their complex IT ecosystems.Β
For more than a decade, Identity Manager has served as a proven foundation for securing and governing identities at scale across some of the worldβs largest and most complex environments. Version 10.0 builds on that foundation with a modernized experience, deeper integrations, and embedded intelligence that gives security teams clear visibility, stronger control, and more efficient execution across governance workflows.Β Β
New capabilities includeΒ enhanced risk managementΒ integrations that allow organizations to ingest and act on user risk scores from third-party analytics andΒ UEBA tools. Newly introduced ITDR playbooks automate key remediation actions such as disabling accounts, flagging security incidents, and launching targeted attestation. Together, these capabilities help organizations shorten the window between detection and action when identity threats emerge.Β
The release also introduces a modern, browser-based interface that delivers full administrative functionality without desktop installation.Β AI-assisted reporting, powered by a secure, customer-controlled large language model, enables authorized users to query identity data in natural language, reducing reliance on complex SQL and accelerating insights for audits, reviews, and compliance.Β Β
EnhancedΒ SIEM compatibilityΒ through standards-based Syslog CEF formatting improves interoperability with modern security monitoring platforms. This helps security teams connect identity governance more seamlessly into broader security operations.Β
βOne Identity Manager 10.0 is a major upgrade that strengthens identity governance as a critical security component for protecting enterprise environments,β said Praerit Garg, CEO of One Identity. βOrganizations today face relentless identity-driven threats. This release combines a proven governance foundation with intelligence, automation, and usability that help security teams detect risk earlier, take decisive action, and operate at scale with confidence.β
βOne Identity Manager 10.0 represents a significant change in identity governance for large-scale use,β said Ciro Guariglia, CTO of Intragen by Nomios. βThe platform improves the data model and automation engine, while bringing in a more scalable, policy-driven method for attestations. This change makes large certification campaigns easier to manage, instead of burdening administrators and the system.βΒ Β
With Identity Manager 10.0, One Identity continues advancing identity security as a central pillar of enterprise defense, helping organizations strengthen protection, reduce exposure, and support secure business operations in complex environments.Β
About One IdentityΒ
One Identity delivers trusted identity security for enterprises worldwide to protect and simplify access to digital identities. With flexible deployment options and subscription terms β from self-managed to fully managed β our solutions integrate seamlessly into your identity fabric to strengthen your identity perimeter, protect against breaches and ensure governance and compliance. Trusted by more than 11,000 organizations managing over 500 million identities, One Identity is a leader in identity governance and administration (IGA), privileged access management (PAM), and access management (AM) for security without compromise.
Funds were split between two wallets holding $3.3 million and $880,000.
The exploit involved MEV-linked addresses and preemptive transaction timing.
MakinaFi has not released a technical statement or mitigation plan.
A major crypto breach has struck MakinaFi, draining millions in Ethereum from the decentralised finance platform.
The incident resulted in the loss of 1,299 ETH, valued at roughly $4.13 million at the time of the attack.
PeckShieldAlert flagged the theft on X, where it traced the movement of the stolen assets across Ethereum wallets.
The breach quickly gained traction online as blockchain analysts and on-chain trackers pieced together the flow of funds.
It became evident that the attacker moved fast, using tools and tactics that suggest a high level of technical precision.
Makinafi loses millions in ether
The exploit saw a sudden outflow of Ethereum from MakinaFi, although the platform has not yet issued a public explanation or technical breakdown.
Users and observers are left to rely on data from Etherscan and posts from security firms to understand what happened.
The total 1,299 ETH was siphoned off through a set of carefully timed transactions.
While MakinaFi has yet to share how the vulnerability was exploited, the timing and transaction order suggest that the attack wasnβt random.
There was no immediate freeze or recovery attempt reported from MakinaFiβs side.
Two wallets hold the stolen funds
On-chain data shows the stolen ETH was split between two addresses.
The first wallet, marked as 0xbed2β¦dE25, currently holds an estimated $3.3 million. The second, 0xE573β¦f905, contains around $880,000.
These wallets have not yet moved the funds further, but blockchain analysts are keeping a close eye on them.
The attacker has so far avoided sending the ETH to known mixing services or exchanges, but watchers remain alert to any shift in movement patterns.
Builder activity reveals exploit timing
Further investigation revealed links to an MEV Builder address (0xa6c2β¦).
This detail points to a transaction ordering strategy often used to exploit timing advantages within the blockchain.
PeckShieldAlert noted that some of the activity involved preemptive execution, a hallmark of MEV exploitation.
The use of builder-side execution implies a high degree of automation and planning.
The attacker likely used MEV tools to front-run or reorder transactions, increasing their chances of success and reducing the likelihood of detection during the transfer.
Community tracks next steps
MakinaFi has not issued any official response or update since the incident was flagged.
Without a public statement or action plan, itβs unclear whether the platform is investigating, attempting to recover the funds, or planning to compensate users.
Meanwhile, the blockchain community continues to track the stolen ETH.
Any attempt to combine the funds or offload them through exchanges could offer a chance for intervention.
Analysts are watching for token mixing, wallet consolidations, or transfers to centralised platforms, which may trigger alerts or freezes.
The lack of communication from MakinaFi leaves open questions around security readiness and risk management.
Until a full breakdown is shared, the technical details behind the breach remain largely speculative.
For now, the stolen ETH sits idle but visible β and the crypto world watches to see what happens next.