logo
Suspect sought after alleged assault on woman at Arlington nature preserve, police say

Suspect sought after alleged assault on woman at Arlington nature preserve, police say

CBS News14-05-2025
Police are working to identify a man accused of assaulting a woman while she was walking at a nature preserve in Arlington.
The incident happened around 9:30 a.m. Monday at the 59-acre Sheri Capehart Nature Preserve, located south of Interstate 20 near Bowman Springs Road.
City Of Arlington [Parks And Rec
According to police, the suspect grabbed the woman from behind and pushed her to the ground. She was able to fight him off and call for help.
The suspect is described as a white man in his 30s, about 5 feet 4 inches tall and 200 pounds, with a bald head, pale complexion, and a Hispanic accent. He was last seen wearing a black shirt and blue jeans.
The preserve features three ponds, a fishing pier, picnic areas, and scenic trails, according to the city's website.
Police are reminding the public to stay alert, avoid walking or exercising alone, use only one earbud while walking, and report any suspicious activity to 911.
Anyone with information is asked to contact Arlington police at 817-459-6065 or Kennedale police at 817-985-2168.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

3 arrests and 2 'attacks on police' at 'peaceful' immigration protest
3 arrests and 2 'attacks on police' at 'peaceful' immigration protest

Yahoo

time14 minutes ago

  • Yahoo

3 arrests and 2 'attacks on police' at 'peaceful' immigration protest

TWO police officers were assaulted and three arrests were made at an anti-immigration protest police described as largely 'peaceful'. As previously reported, protesters and counter-protesters gathered outside the Fownes Hotel in City Walls Road on Wednesday evening. Officers attended the planned protest, which involved around 150 protesters and counter protesters, outside the Fownes Hotel on Clare Street. Road closures were put in place. The protest began at 5.30pm and finished at around 9.40pm when protesters dispersed and the roads re-opened. A spokesperson for West Mercia Police said: "Three arrests were made during the evening. A 38-year-old man was arrested on suspicion of assaulting a police officer and a 37-year-old woman was arrested on suspicion of assaulting a police officer and breaching the peace. The 38-year-old man remains in custody as enquiries continue. "The woman has been released under investigation in connection with the assault, but released without charge in connection with the breach of the peace. "A 53-year-old man was arrested on suspicion of breaching the peace and has been released without charge. The two officers who were assaulted are uninjured." RECOMMENDED READING: Fownes Hotel immigration protest clashes in pictures RECOMMENDED READING: Protest and counter-protest in Worcester - recap Superintendent Gareth Morgan said: 'I would like to thank the local community for their understanding and co-operation as we responded to the protest. 'Whilst the protest was overwhelmingly peaceful, there were a small minority who behaved in a way that was disruptive. ' Measures such as the road closures were put in place to protect the public, and to allow those who wished to protest peacefully the right to do so. 'We will also be continuing to review footage of yesterday's protest, to identify any potential further offences.' 'Moving forward we will continue to engage with our local community to provide reassurance.'

The real problem with ransomware isn't encryption—it's the data that walks out the door
The real problem with ransomware isn't encryption—it's the data that walks out the door

Fast Company

time16 minutes ago

  • Fast Company

The real problem with ransomware isn't encryption—it's the data that walks out the door

When ransomware strikes, most organizations spring into action as if they're responding to a classic crime scene: Tape off the perimeter, start the restoration process, and try to regain access to what was lost. The assumption is that this is a temporary disruption, that once systems are decrypted and restored from backup, the business can move on. But that's the wrong script. Today, encryption is no longer the main event, it's just the distraction. The real damage comes from what's quietly exfiltrated before the ransom note even appears on your screen. Sensitive documents, financial data, proprietary designs, employee records, and customer PII all walk out the door while you're still patting yourself on the back for having a solid backup strategy. And the consequences? They don't end when the systems come back online. A DANGEROUS EVOLUTION IN RANSOMWARE The shift in ransomware tactics isn't theoretical, it's happening right now. Today's attacks are highly coordinated, patient, and financially motivated. Attackers no longer need to simply lock files and demand payment for a key. They're realizing that stealing data is far more profitable, and more painful for the victim. Encryption is reversible. You pay the ransom (or don't), restore the backups (if you can), and carry on. But data theft is permanent. Once it leaves your network, there's no clawing it back. It can be sold, leaked, or weaponized, sometimes all three. Even worse, these breaches aren't just about stolen data. They're about stolen trust. Public companies face shareholder scrutiny. Regulated industries face government fines. And everyone faces the wrath of their customers when private information is posted online. WHAT BACKUPS CAN'T PROTECT YOU FROM There's a common misconception in cybersecurity circles: As long as your backup and recovery processes are solid, you're protected. That might've been true a decade ago. But today, it's dangerously naïve. Backups don't stop reputational damage. They don't prevent lawsuits or limit your liability. They won't answer tough questions from regulators, and they certainly won't reassure customers whose personal data just showed up on a dark web forum. What often follows a modern ransomware attack is a period of long, painful discovery. Months may pass before you fully understand what data was taken—if you ever do. Was it encrypted or plaintext? Were customer records compromised? Were you in compliance with HIPAA, GDPR, or other data privacy laws? And perhaps most haunting of all: Could this have been prevented? If your security strategy treats data protection as an afterthought, these are the questions that will keep you up at night. In most boardrooms, ransomware is still talked about in terms of uptime and recovery. But here's the hard truth: Your mean time to recovery won't matter much when the damage is already done. No one's impressed that your servers are back online in 48 hours if, during that time, attackers walked away with terabytes of sensitive information. Regulators certainly won't be. Neither will your customers. This is where many organizations fall into a dangerous trap. They invest heavily in detection and recovery technologies, endpoint protection, backup appliances, and failover solutions, while leaving gaping holes in data governance and access control. They prepare for the encryption event, but not the silent theft that comes first. And make no mistake, attackers know it. They exploit those blind spots with chilling precision. IT'S TIME TO CHANGE THE CONVERSATION If you're only measuring success by how fast you can bounce back, you're missing the bigger picture. Cyber resilience isn't just about recovery, it's about containment, prevention, and visibility. It's about understanding that the real cost of an attack isn't server downtime. It's the legal fees, the customer churn, the fines, and the headlines. Organizations must start thinking in terms of data-first security. That means tightening controls on who can access sensitive files, and under what conditions. It means monitoring for unusual outbound data flows, not just scanning for known malware signatures. And perhaps most importantly, it means treating your data like the crown jewels it is, not just another asset. In this new paradigm, the most important question isn't, 'How fast can we recover?' but, 'Can we prove what was taken, and are we legally, ethically, and operationally prepared for what happens next?' THE STAKES ARE HIGHER THAN EVER The uncomfortable truth is that many companies will do everything 'right' and still get hit. But when the dust settles, your customers won't care how good your endpoint detection software was. They'll want to know why their names, addresses, and credit card numbers were posted online. They'll want to know why their trust in you was misplaced. That's why now is the time to re-evaluate your ransomware posture, not just from a technical lens, but from a business one. Who owns your data protection strategy? Is it siloed in IT, or is it an enterprise-wide priority? Do your vendors understand the sensitivity of the data they touch? Does your response plan include legal, PR, and compliance, not just tech recovery? In a world where ransomware has morphed into data extortion, encryption is just the bait. The real threat is what's already gone by the time you realize anything's wrong.

Fire crews battle blaze at home in North Aurora, Illinois
Fire crews battle blaze at home in North Aurora, Illinois

CBS News

time18 minutes ago

  • CBS News

Fire crews battle blaze at home in North Aurora, Illinois

A fire broke out at a home in west suburban Aurora early Thursday morning. Firefighters responded to the fire around 1 a.m. near Kelly Drive and Leonard Lane, where large balls of fire were seen shooting from the roof of the home. Most of the flames were shooting from the house's attached garage, causing it to cave in. It is unclear what caused the fire or if any injuries were reported. No further information was immediately available. CBS News Chicago will continue to update as information becomes available.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store