❌

Normal view

There are new articles available, click to refresh the page.
Yesterday β€” 24 January 2026Main stream
Before yesterdayMain stream

Justice Department Opens Criminal Probe Into Silicon Valley Spy Allegations

By: BeauHD
23 January 2026 at 19:45
The U.S. Department of Justice has opened a criminal investigation into Deel over allegations that it recruited a spy inside rival Rippling, according to documents seen by The Wall Street Journal. From the report: An Ireland-based Rippling employee, Keith O'Brien, alleged in an affidavit filed in April that Deel Chief Executive Alex Bouaziz recruited him and gave him instructions for what information to take from Rippling. O'Brien alleged that other executives were involved in the spying plot, including Bouaziz's father, who is Deel's executive chairman and chief strategy officer. A spokeswoman for Deel said the company isn't aware of a criminal investigation but is willing to cooperate with authorities. The company has previously said: "We deny all legal wrongdoing and look forward to asserting our counterclaims." Unsealed court documents allege that an entity tied to Deel transferred $6,000 to an account owned by the wife of Chief Operating Officer Dan Westgarth, and that the same amount was forwarded from the account to O'Brien seconds later.

Read more of this story at Slashdot.

Toronto Man Posed as Pilot To Rack Up Hundreds of Free Flights, Prosecutors Say

By: msmash
23 January 2026 at 13:00
A Toronto man posed as a pilot for years in order to fool airlines into giving him hundreds of free flights, prosecutors have alleged, in a case that has prompted comparisons to the Hollywood thriller Catch Me If You Can. From a report: Authorities in Hawaii announced this week that Dallas Pokornik, 33, had been charged with wire fraud after he allegedly fooled three major US carriers into giving him free tickets over a span of four years. Airlines typically offer standby tickets to their own staff and those with rival airlines as a way of ensuring the broader industry can effectively move employees across continents. According to court documents, Pokornik was a flight attendant for a Toronto-based airline from 2017 to 2019, but then used an employee identification from that carrier to obtain tickets, "which he in fact knew to be fraudulent at the time it was so presented." The only Toronto-based airline, Porter, told reporters it was "unable to verify any information related to this story." On one occasion, Pokornik is alleged to have requested a jumpseat in an aircraft's cockpit, which are normally reserved for off-duty pilots, even though he was not a pilot and did not have an airman's certificate. Federal rules prohibit the cockpit jumpseats from being used for leisure travel.

Read more of this story at Slashdot.

Okta Uncovers Custom Phishing Kits Built for Vishing Callers

23 January 2026 at 09:50

They can intercept user credentials while providing real-time context that helps attackers convince victims to approve MFA challenges during phone calls..

The post Okta Uncovers Custom Phishing Kits Built for Vishing Callers appeared first on TechRepublic.

Okta Uncovers Custom Phishing Kits Built for Vishing Callers

23 January 2026 at 09:50

They can intercept user credentials while providing real-time context that helps attackers convince victims to approve MFA challenges during phone calls..

The post Okta Uncovers Custom Phishing Kits Built for Vishing Callers appeared first on TechRepublic.

Hacker who stole 120,000 bitcoins wants a second chanceβ€”and a security job

22 January 2026 at 17:23

On Thursday, Ilya Lichtenstein, who was at the center of a massive 2016 crypto heist worth billions at the time, wrote online that he is now out of prison and has changed his ways.

β€œTen years ago, I decided that I would hack the largest cryptocurrency exchange in the world,” Lichtenstein wrote on LinkedIn, detailing a time when his startup was barely making money and he decided to steal some instead.

β€œThis was a terrible idea. It was the worst thing I had ever done,” he added. β€œIt upended my life, the lives of people close to me, and affected thousands of users of the exchange. I know I disappointed a lot of people who believed in me and grossly misused my talents.”

Read full article

Comments

Β© Getty Images | seksan Mongkhonkhamsao

4 years later, polarizing true crime movie with a shocking murder is now a streaming hit

20 January 2026 at 16:57

True crime might be Netflix's most consistent genre in terms of hit rate. True-crime documentaries, including The Perfect Neighbor and Amy Bradley Is Missing, dominated the Netflix algorithm last year. The sentiment also includes scripted true crime, and Suitcase Killer: The Melanie McGuire Story is the latest hit for the streamer.

One Identity Unveils Major Upgrade to Identity Manager, Strengthening Enterprise Identity Security

20 January 2026 at 09:20

One Identity, a trusted leader inΒ identity security, today announces aΒ major upgrade to One Identity Manager, a top-rated IGA solution, strengtheningΒ identity governanceΒ as a critical security control for modern enterprise environments.Β 

One Identity Manager 10.0 introduces security-driven capabilities for risk-based governance,Β identity threat detection and response (ITDR), and AI-assisted insight, helping organizations better anticipate, contain, and manage identity-driven attacks across their complex IT ecosystems.Β 

For more than a decade, Identity Manager has served as a proven foundation for securing and governing identities at scale across some of the world’s largest and most complex environments. Version 10.0 builds on that foundation with a modernized experience, deeper integrations, and embedded intelligence that gives security teams clear visibility, stronger control, and more efficient execution across governance workflows.Β Β 

New capabilities includeΒ enhanced risk managementΒ integrations that allow organizations to ingest and act on user risk scores from third-party analytics andΒ UEBA tools. Newly introduced ITDR playbooks automate key remediation actions such as disabling accounts, flagging security incidents, and launching targeted attestation. Together, these capabilities help organizations shorten the window between detection and action when identity threats emerge.Β 

The release also introduces a modern, browser-based interface that delivers full administrative functionality without desktop installation.Β AI-assisted reporting, powered by a secure, customer-controlled large language model, enables authorized users to query identity data in natural language, reducing reliance on complex SQL and accelerating insights for audits, reviews, and compliance.Β Β 

EnhancedΒ SIEM compatibilityΒ through standards-based Syslog CEF formatting improves interoperability with modern security monitoring platforms. This helps security teams connect identity governance more seamlessly into broader security operations.Β 

β€œOne Identity Manager 10.0 is a major upgrade that strengthens identity governance as a critical security component for protecting enterprise environments,” said Praerit Garg, CEO of One Identity. β€œOrganizations today face relentless identity-driven threats. This release combines a proven governance foundation with intelligence, automation, and usability that help security teams detect risk earlier, take decisive action, and operate at scale with confidence.”

β€œOne Identity Manager 10.0 represents a significant change in identity governance for large-scale use,” said Ciro Guariglia, CTO of Intragen by Nomios. β€œThe platform improves the data model and automation engine, while bringing in a more scalable, policy-driven method for attestations. This change makes large certification campaigns easier to manage, instead of burdening administrators and the system.”  

With Identity Manager 10.0, One Identity continues advancing identity security as a central pillar of enterprise defense, helping organizations strengthen protection, reduce exposure, and support secure business operations in complex environments.Β 

About One IdentityΒ 

One Identity delivers trusted identity security for enterprises worldwide to protect and simplify access to digital identities. With flexible deployment options and subscription terms – from self-managed to fully managed – our solutions integrate seamlessly into your identity fabric to strengthen your identity perimeter, protect against breaches and ensure governance and compliance. Trusted by more than 11,000 organizations managing over 500 million identities, One Identity is a leader in identity governance and administration (IGA), privileged access management (PAM), and access management (AM) for security without compromise.

Users can learn more atΒ www.oneidentity.com.Β 

Contact

Liberty Pike

One Identity LLC

liberty.pike@oneidentity.com

MakinaFi hit by $4.1M Ethereum hack as MEV tactics suspected

20 January 2026 at 04:04
  • Funds were split between two wallets holding $3.3 million and $880,000.
  • The exploit involved MEV-linked addresses and preemptive transaction timing.
  • MakinaFi has not released a technical statement or mitigation plan.

A major crypto breach has struck MakinaFi, draining millions in Ethereum from the decentralised finance platform.

The incident resulted in the loss of 1,299 ETH, valued at roughly $4.13 million at the time of the attack.

PeckShieldAlert flagged the theft on X, where it traced the movement of the stolen assets across Ethereum wallets.

The breach quickly gained traction online as blockchain analysts and on-chain trackers pieced together the flow of funds.

It became evident that the attacker moved fast, using tools and tactics that suggest a high level of technical precision.

Makinafi loses millions in ether

The exploit saw a sudden outflow of Ethereum from MakinaFi, although the platform has not yet issued a public explanation or technical breakdown.

Users and observers are left to rely on data from Etherscan and posts from security firms to understand what happened.

The total 1,299 ETH was siphoned off through a set of carefully timed transactions.

While MakinaFi has yet to share how the vulnerability was exploited, the timing and transaction order suggest that the attack wasn’t random.

There was no immediate freeze or recovery attempt reported from MakinaFi’s side.

Two wallets hold the stolen funds

On-chain data shows the stolen ETH was split between two addresses.

The first wallet, marked as 0xbed2…dE25, currently holds an estimated $3.3 million. The second, 0xE573…f905, contains around $880,000.

These wallets have not yet moved the funds further, but blockchain analysts are keeping a close eye on them.

The attacker has so far avoided sending the ETH to known mixing services or exchanges, but watchers remain alert to any shift in movement patterns.

Builder activity reveals exploit timing

Further investigation revealed links to an MEV Builder address (0xa6c2…).

This detail points to a transaction ordering strategy often used to exploit timing advantages within the blockchain.

PeckShieldAlert noted that some of the activity involved preemptive execution, a hallmark of MEV exploitation.

The use of builder-side execution implies a high degree of automation and planning.

The attacker likely used MEV tools to front-run or reorder transactions, increasing their chances of success and reducing the likelihood of detection during the transfer.

Community tracks next steps

MakinaFi has not issued any official response or update since the incident was flagged.

Without a public statement or action plan, it’s unclear whether the platform is investigating, attempting to recover the funds, or planning to compensate users.

Meanwhile, the blockchain community continues to track the stolen ETH.

Any attempt to combine the funds or offload them through exchanges could offer a chance for intervention.

Analysts are watching for token mixing, wallet consolidations, or transfers to centralised platforms, which may trigger alerts or freezes.

The lack of communication from MakinaFi leaves open questions around security readiness and risk management.

Until a full breakdown is shared, the technical details behind the breach remain largely speculative.

For now, the stolen ETH sits idle but visible β€” and the crypto world watches to see what happens next.

The post MakinaFi hit by $4.1M Ethereum hack as MEV tactics suspected appeared first on CoinJournal.

❌
❌