The Double-Edged Sword of Non-Human Identities

0

Cyber Sword

In a sweeping analysis conducted in late 2025, Flare researchers uncovered more than 10,000 Docker Hub container images leaking secrets (including production API keys, cloud tokens, CI/CD credentials, and even AI model access tokens) all pushed into public repositories, often unintentionally by developers.

Non-human identities (NHIs): tokens, API keys, service accounts, and workload identities, are the machine-to-machine credentials that power modern software development and cloud infrastructure.

Unlike human users who authenticate with passwords and MFA, these identities authenticate applications, build pipelines, and automated services continuously, often with broad privileges and indefinite lifespans.

When people read about findings like this, the instinctive reaction is often, “They’ll learn the hard way,” or “These must be small companies or inexperienced developers — not serious enterprises or Fortune 500 firms.”

But the reality is far more complex and far more troubling than a shallow headline suggests. These exposures are not edge cases, but are structural failures of how modern software is built and operated.

To understand why, take a look at these real-world nightmares from recent years involving the exposure of non-human identities.

The Snowflake Breach: 165 Organizations Compromised Through Leaked Credentials

One of the most prominent cases that drew widespread media attention was the 2024 Snowflake incident. It was not driven by a software exploit, but by the silent abuse of long-lived credentials that had been leaking into the criminal ecosystem for years.

The threat actor cluster UNC5537 authenticated into approximately 165 Snowflake customer environments using exposed credentials harvested from historical infostealer malware dumps and cybercrime marketplaces.

These credentials (API-like accounts, automation users, and data-access identities) often lacked multi-factor authentication and were designed to persist indefinitely. The data accessed included highly sensitive corporate and customer information belonging to organizations such as AT&T, Ticketmaster, Santander, and others, which was later advertised for sale or used in extortion campaigns. 

One leaked token can expose your entire infrastructure for years.

Flare scans public code repositories for exposed non-human identities—API keys, cloud credentials, service accounts—and alerts you before attackers find and exploit them.

Scan For Leaked Secrets

Home Depot’s Year-Long Exposure: When a Single GitHub Token Outlasts Its Creator

In late 2025, it was observed that Home Depot’s internal systems remained accessible for over a year due to a single leaked GitHub access token belonging to an employee, which had been inadvertently published in early 2024 and exposed on a public platform.

Automated scanning telemetry showed that this token granted broad rights, including read and write access to hundreds of private source code repositories, as well as entry into connected cloud infrastructure, order-fulfillment systems, inventory management platforms, and developer pipelines.

Effectively treating the token as a valid non-human identity capable of authenticating without challenge. Despite multiple attempts by an external security researcher to alert Home Depot’s security team, the token remained active and publicly accessible for months, only being revoked after third-party media engagement forced action. 

The prolonged exposure underscores a systemic gap in credential governance and automated secret detection: long-lived machine identities without rotation, expiration, or proactive monitoring allowed a static access token to function as a persistent authentication vector across critical internal systems.

This incident did not involve a software vulnerability in the platform itself, but rather the continued validity of a leaked identity token, illustrating how unmanaged non-human credentials can inadvertently open significant attack surfaces in mature enterprise environments. 

Red Hat GitLab Breach: Consulting Repositories Become Unintentional Credential Stores

In October 2025, a Red Hat GitLab instance used by its consulting organization was compromised by the group calling itself “Crimson Collective,” resulting in the exfiltration of tens of thousands of private repositories and hundreds of Customer Engagement Reports (CERs).

These artifacts contained architectural diagrams, deployment configurations, and crucially embedded credentials such as tokens, database URIs, and service keys that had flowed into the repository over time as part of consulting engagements.

By mixing contextual data with static secrets inside GitLab, what should have been neutral code storage effectively became an unintentional credential store and access map, exposing sensitive material that could be used as valid authentication vectors across customer environments. 

The risks of NHI can’t be ignored.

Let’s go back to the Flare research that uncovered over 10,000 container images related to over 100 organizations and contained thousands of live keys. Below, you can see a further breakdown of the secrets found:

Category Docker Hub Accounts Meaning
AI 191 AI API’s Grok/Gemini, etc.
CLOUD 127 AWS/Azure/GCP/Cosmos/RDS secrets
DATABASE 89 Mongo / Postgres / Neon / ODBC / SQL creds
ACCESS 103 JWT / SECRET_KEY / APP_KEY / encryption
API_TOKEN 157 Generic 3rd-party API keys
SCM_CI 44 GitHub / Bitbucket / NPM / Docker
COMMUNICATION 31 SMTP / Sendgrid / Brevo / Slack / Telegram
PAYMENTS 21 Stripe / Razorpay / Cashfree / SEPAY

So why do container images contain keys in the first place? Because to function, build, and operate, they must authenticate to many different environments – cloud platforms, APIs, databases, CI/CD systems, and internal services.

Since this access is performed by software rather than people, it relies on non-human identities such as tokens, API keys, and service accounts. These machine identities are now deeply embedded in the modern software development lifecycle and production infrastructure, powering everything from code builds to application runtimes behind the everyday technology we all use.

Non-human identities have become one of the most critical (and least understood) pillars of the modern software development lifecycle. Every build, test, deployment, and production workflow now runs on machine-to-machine authentication: CI runners pulling code, pipelines pushing containers, cloud services provisioning infrastructure, applications calling APIs, and models querying data. 

These processes do not log in with usernames and passwords, instead they rely on tokens, API keys, service accounts, OAuth apps, and workload identities that operate continuously, often with broad and persistent privileges.

Unlike human users, these identities don’t change jobs, don’t get phished, and don’t forget passwords, which is exactly what makes them dangerous when exposed. In a paradoxical way, a non-human identity can far outlive the human who created it.

The admin-level super key issued by a senior DevOps engineer five years ago (who may now be the CTO of a fast-growing startup) is often still alive, fully privileged, and quietly waiting in the shadows.

Unlike people, these machine identities don’t change roles, leave the company, or get deprovisioned unless someone explicitly remembers to do so, making them some of the most persistent and dangerous artifacts in modern infrastructure.

If a non-human identity leaks into a repository, container image, or log file, it can grant attackers silent, durable, and legitimate access deep into an organization’s software development lifecycle (SDLC), often bypassing detection entirely because everything looks like normal automation.

In today’s cloud-native world, controlling non-human identities is no longer a hygiene task – it is the security boundary of the SDLC itself.

What This Means for Security Teams and Incident Response

The key takeaway from this incident is simple: Attackers are already authenticating with leaked secrets found in public container registries. This isn’t a theoretical risk – it’s happening now.

We ought to treat non-human identities as human identities and monitor their behavior, limit their access, and delete them when they are no longer needed.

For defenders, the imperative is clear:

  • Treat container images like code AND credentials. They are no longer just deployable artifacts — they are potential leak vectors for sensitive keys.

  • Integrate automated secret scanning at every stage of the SDLC. Catch leaks before images are pushed anywhere public.

  • Adopt short-lived, ephemeral credentials backed by identity federation rather than long-lived tokens baked into images.

  • Monitor for exposed keys in public registries and revoke them proactively – don’t wait for an attacker to misuse them.

Fortunately, the security industry has responded with specialized tooling. Platforms designed for Threat Exposure Management—such as Flare and similar solutions—continuously scan public registries and code repositories for exposed credentials, map them to real attack surfaces, and enable rapid remediation.

For organizations managing thousands of non-human identities across their SDLC, automated detection and revocation capabilities are no longer optional.

Learn more by signing up for our free trial.

Sponsored and written by Flare.



Source link

King must feel vindicated for cutting off Andrew by latest Epstein files release | Andrew Mountbatten-Windsor

0

When King Charles stripped Andrew Mountbatten-Windsor of his titles and announced he would be booted out of Royal Lodge, Buckingham Palace said the “censures are deemed necessary, notwithstanding the fact that he continues to deny the allegations against him”.

Four months and more than 3m documents later, Charles must surely feel vindicated on his tough approach. For while there is nothing to suggest the king nor any other senior royals knew then what was to come in the release of the Jeffrey Epstein files, what has emerged has been truly shocking.

The position of Mountbatten-Windsor, and that of his ex-wife, Sarah Ferguson, appears even more grave, and the shadow cast over the royal family and institution, even darker.

With government pressure mounting on the former prince to testify to the US Congress on what he knew about Epstein, royal sources can only indicate that it is “ultimately a matter for Andrew Mountbatten-Windsor and his conscience”.

From Mountbatten-Windsor himself, we have heard nothing. He has always denied any wrongdoing in relation to Epstein; in particular he has denied the allegation he had sex with Virginia Giuffre when she was 17 and was trafficked by the US financier.

Nothing in the documents recently disgorged by the US Department of Justice shows legal wrongdoing on the part of the ex-prince. But they can be said to raise questions over his judgment at a time when he was a working royal and UK trade envoy globe-trotting to represent the nation’s interests.

Recently released undated images appearing to show him crouching on all fours over an unidentified clothed woman and touching her abdomen are disturbing given they were taken at Epstein’s New York City mansion.

His unequivocal assertion that he broke off his friendship with Epstein in New York in December 2010 is challenged. After that trip, he appears to have written to Epstein: “It was great to spend time with my US family. Looking forward to joining you all again soon.”

In January 2011, he appears to thank Epstein for sorting out a financial problem for his ex-wife and reveals he is going on his annual retreat. “This week is all about me. Time to put something back into me before the rest of the world starts sucking it out in all their greed and demands,” an account named “The Duke” writes.

One particularly grubby allegation, contained in a 2011 legal document, is that Epstein and the then prince asked an exotic dancer for a threesome at the financier’s Florida home in “early 2006”, with the woman’s lawyer accusing the two of having “prevailed upon her to engage in various sex acts” during the alleged encounter. Lawyers also claimed the party at Epstein’s West Palm Beach home included girls “as young as 14 years old” who were “dressed provocatively”.

The unnamed woman claimed “she was hired to dance, not to have sex” and “she was working as an exotic dancer, but she was treated like a prostitute”. “After the men had satisfied themselves, they invted [sic] my client to take a trip with them to the Virgin Islands. She declined their invitation. She was then chauffeured back to the strip club,” the legal letter continues. It says the woman would be content to keep the alleged encounter confidential “in exchange for a payment of 250,000 dollars”.

In tandem, Thames Valley police, which covers Windsor, are assessing claims made by a US lawyer that a second woman was sent to the UK by Epstein for a sexual encounter with Mountbatten-Windsor. It allegedly occurred at the former prince’s residence, Royal Lodge, in 2010, with the woman described as not British and in her 20s at the time. The force said on Tuesday: “We take any reports of sexual crimes extremely seriously and encourage anyone with information to come forward.”

These are untested allegations to which Mountbatten-Windsor has yet to respond. Even so, they are discomfiting for the royal family. The only senior royal to have commented so far is the Duke of Edinburgh, who, when asked about the documents by a journalist, said: “I think it’s all really important, always, to remember the victims and who are the victims in all this.”

As to the former Duchess of York, also now titleless, the emails suggest a relationship with Epstein in which she often appears to have been in need of money – including £20,000 for rent on one occasion. She called him her “pillar”, offered to “organise your houses”, and jokingly told him “just marry me”, the documents suggest.

She appears to have had lunch with him, and her daughters, in July 2009, days after he was released from prison, where he was serving a sentence for child sex offences. She appears to have been bereft on finally concluding in 2011 it was “crystal clear to me that you were only friends with me to get to Andrew. And that really hurt me deeeply [sic]. More than you will know.”

The timing of Mountbatten-Windsor’s move from Royal Lodge, under the cover of darkness on Monday night to the king’s Sandringham estate in Norfolk, may have been coincidence. He will temporarily stay at Wood Farm Cottage – where his father, the late Duke of Edinburgh, retired to – before moving permanently to the five-bedroomed Marsh Farm, still undergoing renovation, it is understood.

The optics of him horse riding in Windsor Great Park or cheerily waving to passersby as he drove around this week were not good. He may still be seen at Windsor on occasion, it is understood, as the full move may take some time to complete. But, by and large, he will be geographically distanced from the royal hub, from where the rest of his family will attempt to carry on business as usual.



Source link

Sky News nominated for nine Royal Television Society TV journalism awards | UK News

0

Sky News has been nominated for nine Royal Television Society TV journalism awards, including for news channel of the year.

A number of Sky News journalists have been acknowledged for outstanding work in their field, including Yalda Hakim, who hosts the international news show, The World With Yalda Hakim, and has been recognised in the network presenter of the year category.

Special correspondent Alex Crawford and Africa correspondent Yousra Elbagir take two of the three slots in the network television journalist of the year group,

Inside Libya’s migrant detention centres

Crawford, who travels the world covering major stories, often from war zones, reported from countries including Syria, Libya and Somalia in 2025. She stars in our Hotspots series, which takes viewers straight into some of the world’s most hostile environments.

Elbagir has reported extensively on the war in Sudan, including an investigation into the “killing fields where thousands have been targeted.

Investigating thousands missing in Sudan’s war

Elsewhere, data and forensics correspondent Tom Cheshire is nominated for specialist journalist of the year, deputy political editor Sam Coates is shortlisted in the politics category, and news correspondent Mollie Malone is recognised in the emerging talent shortlist.

Cheshire’s work in 2025 included reporting from a far-right “whites only” settlement in Arkansas, while Malone has reported on a number of exclusives on UK prisons.

Inside ‘whites only’ settlement

As well as exclusive interviews and analysis from Westminster, Coates is also co-host of our Politics At Sam And Anne’s podcast, alongside Politico’s Anne McElvoy.

In the news channel of the year category, Sky News – which has won the award for eight consecutive years – is up against BBC News and Al Jazeera English.

Our international coverage has been recognised in multiple categories – as well as nods to Hakim, Crawford amd Elbagir, international correspondent John Sparks is up for a digital award for 24 Hours In The Kill Zone – for which he joined Ukrainian troops in an area targeted by explosive-carrying drones.

He is up against BBC News’ reporting on militia in Sudan, and ITV’s political coverage on TikTok.

24 hours in Ukraine’s ‘kill zone’

Our reporting on life in Syria following the downfall of Bashar al Assad is in the running for the RTS international news coverage award, alongside Channel 4 News, which has also been recognised for its coverage on Syria, and Associated Press’ reporting on famine in Gaza.

Adrian Wells, chair of the RTS Television Journalism Awards, said it had been “an exceptional year of very high-quality submissions”.

He continued: “UK-based broadcasters and content producers have demonstrated their skill, endeavour and bravery in pursuing the most important stories both on domestic and international fronts.

“Despite many other challenges in the media industry, the calibre of journalism demonstrated across the news categories has been extraordinary.”

The RTS awards will take place on 4 March, hosted by journalist and broadcaster Jeremy Vine.

There will also be an outstanding contribution award and an RTS special award, which will also be presented during the ceremony.



Source link

Gronk says Tom Brady will be a ‘fourth-ballot’ Hall of Famer after Kraft’s snub

0

NEWYou can now listen to Fox News articles!

Just days after it was reported that Bill Belichick was not voted into the Hall of Fame, it was revealed that another pillar of the New England Patriots dynasty will also miss out.

Robert Kraft has reportedly not received enough votes to be inducted into Canton, despite six Super Bowl titles and, including this year, 11 appearances.

When asked by Fox News Digital on radio row in San Francisco ahead of Super Bowl LX if anyone from the Patriots dynasty days will get in, Rob Gronkowski, who won three with New England, joked, “I don’t think so.”

CLICK HERE FOR MORE SPORTS COVERAGE ON FOXNEWS.COM 

Rob Gronkowski at New England Patriots game

Rob Gronkowski sits on the bench during an NFL game. (Jim Rogash/Getty Images)

“I think Tom Brady now is going to be a fourth-ballot Hall of Famer,” he continued.

“RKK, I mean, how has he not been in yet? I mean, this is his 10th Super Bowl (it is his 11th). He’s in the Super Bowl again this year. He was in Super Bowls before even the Belichick-Brady era. I mean, guy’s the best owner in the league.”

Gronkowski also praised Kraft’s ability to grow the game off the field, as well.

“Not just his resume with the New England Patriots, but his resume for the game of football as well, just dealing with the TV rights contracts, with the NFL and NFLPA and with all the owners. This guy has a voice for the NFL. He has helped expand the game.

Robert Kraft sends the team to the Super Bowl

New England Patriots owner Robert Kraft speaks to the crowd, Sunday, Feb. 1, 2026, during a Patriots NFL football Send Off rally in Foxborough, Massachusetts, for Super Bowl LX. (AP Photo/Steven Senne)

AMERICA250 JOINS NFL AT SUPER BOWL TO MARK NATION’S 250TH BIRTHDAY IN RED, WHITE AND BLUE

“RKK, you know, with just his resume alone as well with the New England Patriots, and what he has done as a whole for the NFL, I mean, he needs to be in the Pro Football Hall of Fame. He will be, but he should have already been.”

In a separate interview with Fox News Digital last week, Gronk said Belichick’s snub was “asinine.”

“This guy not only has a great resume, but he has also touched so many lives in the game of football in very positive way. From players to coaches, he gave so many people opportunities and fair opportunities as well to succeed in life. And that’s what he sure has done. And it’s just unbelievable that he wasn’t selected. He’s obviously going to be a Pro Football Hall of Famer, but it was just absurd it wasn’t the first ballot.”

Robert Kraft and Bill Belichick

New England Patriots head coach Bill Belichick and Patriots owner Robert Kraft watch the field during the warm-up period before a game against the Kansas City Chiefs at Gillette Stadium.  (Eric Canha/USA TODAY Sports)

CLICK HERE TO GET THE FOX NEWS APP

Belichick and Kraft have combined for 14 Lombardi Trophy victories, but it has been widely speculated that Belichick is serving a de facto punishment for Spygate and Deflategate. Perhaps Kraft is now getting the same treatment.

Follow Fox News Digital’s sports coverage on X, and subscribe to the Fox News Sports Huddle newsletter.



Source link

Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm

0

Ravie LakshmananFeb 02, 2026Developer Tools / Malware

Cybersecurity researchers have disclosed details of a supply chain attack targeting the Open VSX Registry in which unidentified threat actors compromised a legitimate developer’s resources to push malicious updates to downstream users.

“On January 30, 2026, four established Open VSX extensions published by the oorzc author had malicious versions published to Open VSX that embed the GlassWorm malware loader,” Socket security researcher Kirill Boychenko said in a Saturday report.

“These extensions had previously been presented as legitimate developer utilities (some first published more than two years ago) and collectively accumulated over 22,000 Open VSX downloads prior to the malicious releases.”

The supply chain security company said that the supply chain attack involved the compromise of the developer’s publishing credentials, with the Open VSX security team assessing the incident as involving the use of either a leaked token or other unauthorized access. The malicious versions have since been removed from the Open VSX.

The list of identified extensions is below –

  • FTP/SFTP/SSH Sync Tool (oorzc.ssh-tools — version 0.5.1)
  • I18n Tools (oorzc.i18n-tools-plus — version 1.6.8)
  • vscode mindmap (oorzc.mind-map — version 1.0.61)
  • scss to css (oorzc.scss-to-css-compile — version 1.3.4)

The poisoned versions, Socket noted, are designed to deliver a loader malware associated with a known campaign called GlassWorm. The loader is equipped to decrypt and run embedded at runtime, uses an increasingly weaponized technique called EtherHiding to fetch command-and-control (C2) endpoints, and ultimately run code designed to steal Apple macOS credentials and cryptocurrency wallet data.

At the same time, the malware is detonated only after the compromised machine has been profiled, and it has been determined that it does not correspond to a Russian locale, a pattern commonly observed in malicious programs originating from or affiliated with Russian-speaking threat actors to avoid domestic prosecution.

The kinds of information harvested by the malware include –

  • Data from Mozilla Firefox and Chromium-based browsers (logins, cookies, internet history, and wallet extensions like MetaMask)
  • Cryptocurrency wallet files (Electrum, Exodus, Atomic, Ledger Live, Trezor Suite, Binance, and TonKeeper)
  • iCloud Keychain database
  • Safari cookies
  • Data from Apple Notes
  • user documents from Desktop, Documents, and Downloads folders
  • FortiClient VPN configuration files
  • Developer credentials (e.g., ~/.aws and ~/.ssh)

The targeting of developer information poses severe risks as it exposes enterprise environments to potential cloud account compromise and lateral movement attacks.

“The payload includes routines to locate and extract authentication material used in common workflows, including inspecting npm configuration for _authToken and referencing GitHub authentication artifacts, which can provide access to private repositories, CI secrets, and release automation,” Boychenko said.

A significant aspect of the attack is that it diverges from previously observed GlassWorm indicators in that it makes use of a compromised account belonging to a legitimate developer to distribute the malware. In prior instances, the threat actors behind the campaign have leveraged typosquatting and brandjacking to upload fraudulent extensions for subsequent propagation.

“The threat actor blends into normal developer workflows, hides execution behind encrypted, runtime-decrypted loaders, and uses Solana memos as a dynamic dead drop to rotate staging infrastructure without republishing extensions,” Socket said. “These design choices reduce the value of static indicators and shift defender advantage toward behavioral detection and rapid response.”

Update

Secure Annex researcher John Tuckner told The Hacker News that three of the aforementioned extensions were still available for download as of February 2, 2026, 6:30 a.m. UTC. They have since been removed from Open VSX as of writing –

  • oorzc.mind-map@1.0.61
  • oorzc.i18n-tools-plus@1.6.8
  • oorzc.scss-to-css-compile@1.3.4

“This is also tricky because victims will have to wait until the real developer publishes a new higher version in order for an auto update to be triggered,” Tuckner said. “Even if the extensions are removed from the marketplace, they won’t uninstall from editors.”

(The story was updated after publication to include details of the extension status.)



Source link

Russian shelling kills seven in Ukrainian market, clouding Abu Dhabi talks | Russia-Ukraine war News

0

Donetsk Governor Vadym Filashkin accused Moscow of carrying out ‘another targeted war crime’.

Russian forces have shelled Ukraine’s eastern city of Druzhkivka, killing at least seven people at a crowded market, according to the regional governor.

The attack, using cluster munitions, targeted the market during a typically busy time on Wednesday morning, Donetsk governor Vadym Filashkin said.

Recommended Stories

list of 3 itemsend of list

In addition to the seven killed, 15 others were injured, he said. The eldest victim was 81.

Separately, Russia’s military dropped two aerial bombs on the city, which advancing Russian forces are seeking to capture, damaging several homes and buildings, said Filashkin.

The attacks came as Russian and Ukrainian officials took part in a second round of United States-brokered negotiations in Abu Dhabi, further angering Ukrainian officials who claimed Moscow had already violated a one-week pledge to cease attacks on its energy facilities.

“This is another targeted war crime and further proof that all Russian statements about a ‘truce’ are worthless,” said Filashkin.

Elsewhere, Russian strikes hammered the central Dnipropetrovsk region, killing a 68-year-old woman and a 38-year-old man in a residential area, as well as the southern city of Odesa, damaging some 20 residential buildings, according to local officials.

On the ground, Russia’s military also claimed its forces seized control of Ukraine’s eastern settlements of Staroukrainka ​and ‌Stepanivka, adding to a slow, bloody advance that Moscow feels can boost its position in negotiations.

European Commission spokesperson Anitta Hipper accused Russian ‍President Vladimir Putin of abusing the negotiations in the United Arab Emirates by ⁠continuing attacks on Ukraine’s civilian infrastructure.

“Putin ⁠can end this war right now. He doesn’t show any signs of ​wanting ‌to do so. He misuses even the discussions ‌on the ceasefire to ‌continuously attack ⁠the civilian infrastructure and kill innocent people,” said Hipper.

While Russia hopes it can outlast and outgun Kyiv’s stretched army, Ukraine’s President Volodymyr Zelenskyy has been pushing his Western backers to boost their own weapons supplies and heap economic and political pressure on the Kremlin to halt its invasion.



Source link

Lucy Letby: Inquests into five babies murdered by nurse opened and adjourned | UK News

0

Inquests into deaths of five babies murdered by Lucy Letby have been opened and adjourned.

They are looking into the deaths of Baby C, Baby E, Baby I, Baby O and Baby P. They all died at Countess of Chester Hospital in 2015 and 2016 when Letby worked as a nurse in the neo-natal unit.

A brief summary of the circumstances of each death was read out during the 20-minute hearing in Warrington.

Senior coroner for Cheshire Jacqueline Devonish said that she was satisfied each child needed an inquest, and provisionally scheduled the hearings for September, dependent on the outcome of the Thirlwall Inquiry.

The public inquiry into how Letby was able to commit the murders is due to be published after Easter.

Ms Devonish suspended each of the five inquests until a review date on 5 May.

Baby D’s inquest, which was opened in January 2016, was suspended until the same date.

Another inquest – into the death of Baby A – was held in October 2016, and reached a narrative conclusion, stating it could not be determined what caused the death and whether it was due to a natural or unnatural event.

Letby, 36, is serving multiple whole-life sentences for murdering seven babies, and trying to kill seven more.

No further criminal charges for Letby

Prosecutors decided last month that she wouldn’t face further charges after police submitted evidence related to nine other children, two of whom died.

The Crown Prosecution Service said the evidential test hadn’t been met in any of the cases.

Read more from Sky News:
Murder investigation after student stabbed in Leicester

Snooker legend John Virgo dies aged 79

Letby, from Hereford, has twice been denied permission to appeal against her 2024 convictions.

However, the Criminal Cases Review Commission, which investigates potential miscarriages of justice, is considering evidence submitted on her behalf by medical experts that suggests poor care and natural causes were to blame for the deaths.



Source link

Ex-Washington Post chief Marty Baron blasts ‘gutless’ Bezos amid major layoffs

0

NEWYou can now listen to Fox News articles!

Marty Baron, the former executive editor of The Washington Post, took direct aim at its owner Jeff Bezos on Wednesday as the paper announced sweeping layoffs.

“This ranks among the darkest days in the history of one of the world’s greatest news organizations,” Baron said in a statement posted to social media. “The Washington Post’s ambitions will be sharply diminished, its talented and brave staff will be further depleted, and the public will be denied the ground-level, fact-based reporting in our communities and around the world that is needed more than ever.”

Baron acknowledged “acute business problems” and the “severely disruptive” period of the media landscape, saying “radical innovation is required.”

WASHINGTON POST CLOSES SPORTS DEPARTMENT AS PART OF SWEEPING LAYOFFS

The exterior of The Washington Post building is shown with its signage visible.

The Washington Post announced sweeping layoffs, impacting a third of the company, Fox News Digital has learned. (Andrew Harnik/Getty Images)

“The Post’s challenges, however, were made infinitely worse by ill-conceived decisions that came from the very top —from a gutless order to kill a presidential endorsement 11 days before the 2024 election to a remake of the editorial page that now stands out only for its moral infirmity,” Baron wrote. “Loyal readers, livid as they saw owner Jeff Bezos betraying the values he was supposed to uphold, fled The Post. In truth, they were driven away, by the hundreds of thousands.”

He continued, “The owner, in a note to readers, wrote that he aimed to boost trust in The Post. The effect was something else entirely: Subscribers lost trust in his stewardship and, notwithstanding the newsroom’s stellar journalism, The Post overall. Similarly, many leading journalists at The Post lost confidence in Bezos, and jumped to other news organizations. They also, in effect, were driven away. Bezos’s sickening efforts to curry favor with President Trump have left an especially ugly stain of their own. This is a case study in near-instant, self-inflicted brand destruction.”

WASHINGTON POST STAFFERS FEELING ‘BETRAYED’ AS TURMOIL, LOOMING LAYOFFS ROCK BILLIONAIRE JEFF BEZOS’ NEWSROOM

Marty Baron, Jeff Bezos

Former Washington Post executive editor Marty Baron took aim at the paper’s billionaire owner Jeff Bezos in a scathing response to major layoffs. (Henry NicholsAFP via Getty Images; Eva Marie Uzcategui/Bloomberg via Getty Images)

Baron went on to say he was grateful for Bezos’ “steadfast support” when he led the paper as its executive editor from 2013-2021, saying Bezos “came under brutal pressure from Trump” but “spoke forcefully and eloquently of a free press and The Post’s mission.”

“I wish I detected the same spirit today. There is no sign of it,” Baron said. “Like many others, I’d like to hear the owner and the publisher he appointed articulate a contemporary vision that offers the prospect of financial stability and growth, demonstrates imagination and creativity, honors the heritage of The Post, shows appreciation for its remarkable staff and signals a firm sense of purpose. It is years overdue.”

The Washington Post did not immediately respond to Fox News Digital‘s request for comment.

EX-WASHINGTON POST STAFFERS ACCUSES JEFF BEZOS OF TRYING TO ‘SURVIVE’ TRUMP RATHER THAN SAVE PAPER

Jeff Bezos waving to photographers in Venice.

Washington Post staffers have resorted to directly addressing billionaire owner Jeff Bezos amid widespread speculation that significant layoffs are on the horizon.  (Stefano Rellandini/AFP via Getty Images)

The “Democracy Dies in Darkness” paper announced sweeping layoffs Wednesday with entire departments being shuttered in what the company is calling a “significant restructuring.”

The Post is shuttering the sports desk in its current form, dialing back its international footprint, making its Metro section more “nimble and focused” and eliminating its Books section. A third of the company has been affected, Fox News Digital has learned. 

Fox News’ Brian Flood contributed to this report.

CLICK HERE TO GET THE FOX NEWS APP



Source link

Patna: What has happened so far in the investigation of NEET student’s death case? Police gave details

0

Patna Police held a press conference on Wednesday (February 4) on the death of NEET student in Patna. Patna IG Jitendra Rana said that the case is now with CBI. There will be a CBI investigation. SSP Karthikeyan Sharma said that the SHO of Chitragupt Nagar police station was negligent after which action was taken against the station in-charge Roshni Kumari and she was suspended. At the initial stage, the family members were not in favor of registering an FIR but on the basis of information received from Prabhat Memorial Hospital, a case was registered.

CCTV footage was secured and analyzed – SSP

He further said that the CCTV footage of the hostel premises and surrounding areas has been secured and scrutinized. Investigation has also been done by FSL. Statements of Shambhu Hostel Guard, Warden, girl students, doctors and medical staff have been recorded. A medicine has been recovered from the victim’s room. The medicine was purchased from near Alwar turn in Jehanabad. Five clothes of the victim were given by the family for examination. During forensic investigation, matching sperm was found in the clothes. The victim had gone to her hostel room on January 5. After that, she came out of the room for a few minutes twice that night. Then the room closed. Next day the room was opened by the hostel guard.

DNA samples of suspects were taken – DSP

DSP Anu said that during the investigation, Lama report has been seized from the hospital, which has been made a part of the case diary. Male sperm has been confirmed in the girl’s clothes. DNA samples of the suspects have been taken. Matching will be done.

The student was at her home on January 5 – police

According to the police, the NEET student was at her home in Jehanabad from December 27 to January 5. The investigation is being carried forward on the basis of scientific and technical evidence and all aspects are being thoroughly investigated.

The student died on January 11

Let us tell you that now CBI will investigate the case. CM Nitish has recommended a CBI investigation to the central government. The family members are alleging rape and murder. The student was found unconscious in her hotel room on January 6. He was taken to the hospital for treatment but died during treatment on January 11.

Fractal Analytics IPO 2026: ₹857-900 Price Band, 35% Funds for AI and R&D

0

Fractal plans to leverage its Cogentic platform to expand margins and enhance AI solutions for industries like healthcare, BFSI, and consumer goods. The IPO will be open from February 9 to 11, with anchor investor bids starting February 6.

Fractal plans to leverage its Cogentic platform to expand margins and enhance AI solutions for industries like healthcare, BFSI, and consumer goods. The IPO will be open from February 9 to 11, with anchor investor bids starting February 6.

Announcing the launch of its initial public offering (IPO) on Monday at a price band of ₹857-900 per equity share of face value ₹1 each, Fractal Analytics said it will allocate over a third of the capital raised to AI and research and development.

On Tuesday, the company reduced its IPO size from ₹4,900 crore to around ₹2,834 crore. Speaking to businessline, Fractal said it lowered pricing in line with stronger investor confidence.

“Based on a lot of good advice from some of the top funds in the country, we agreed on the ₹857 to ₹900 price range. Then some of the selling shareholders wanted to stay on instead of selling at that price, because saying they are pretty confident on where Fractal is going,” said Co-Founder, Group Chief Executive & Executive Vice-Chairman, Fractal Analytics.

About ₹355 crore, or 35 per cent of the capital raised from this IPO, is earmarked for AI revenue, R&D, and alpha-related investments. According to Velamakanni, AI revenue and R&D are crucial for Fractal’s future success, as the space is evolving and “only the most innovative companies willing to invest in AI, R&D have a strong chance of success.” The rest of the IPO proceeds will be used for loan repayment and some basic capex.

The anchor investor bidding date is February 6. The offer will be open from February 9 to February 11. Bids can be made for a minimum of 16 Equity Shares of face value of ₹ 1 each, and multiples of 16 thereafter.

Margin expansion plans

Fractal will primarily focus on the homegrown Cogentic platform to build AI solutions for margin expansion, such as an invoice-to-cash solution, customer experience, and revenue growth, and to make the platform a greater contributor to company revenue. Cogentic revenues have a significantly higher margin than the rest of the business, thereby improving our overall margin.

“We have a long way to go in terms of making people understand AI and AI companies, and having a few public AI companies is going to help market understanding,” he said.

India AI Mission

With regard to the India AI Mission, Fractal is planning to build an AI system for the healthcare sector by releasing a model that matches and exceeds global healthcare AI benchmarks, and then use that to launch healthcare AI for all. However, those expenses will not be budgeted in the IPO proceedings. Currently, consumer products and goods contribute to 37.5 per cent of the revenue, followed by telecommunication and media (27.2 per cent) followed by healthcare at 17 per cent. BFSI only contributes 12.2 per cent.

Macroeconomics

When asked, Velamakanni said he viewed the US-India trade developments as a positive for companies like Fractal, since the settling of trade wars means less inflationary pressure and less uncertainty for companies.

“This is good for Fractal specifically because it has direct impact on our potential growth,” he said, adding how the favorable macro-environment encourages client companies on discretionary spending.

Published on February 4, 2026