logo
Massachusetts cops close off popular public beach over ‘dead body' that ended up being a crumpled blanket

Massachusetts cops close off popular public beach over ‘dead body' that ended up being a crumpled blanket

New York Post3 days ago
It's no 'Weekend at Bernie's.'
Massachusetts police spent Wednesday morning roping off parts of a popular public beach after receiving reports of an 'unattended death' that turned out to be a crumpled-up blanket, authorities said.
Massachusetts State Police arrived at Revere Beach, a summer hotspot just 6 miles northwest of Boston, around 10:30 a.m. Wednesday to probe the grim report.
Massachusetts State Police reported finding a dead body on a beach outside of Boston, but it was just a blanket.
Google
Video captured by a passerby showed five officials standing on the beach cordoning off a large section of the three-mile shore with yellow caution tape while a sixth person waded into the sea.
A police boat was also further out off the shore, according to the footage.
Police originally described the situation as an 'unattended death.' They said they found what they believed to be a dead body on the beach wrapped in a sheet, according to Boston 25.
But when officers opened the bulky, corpse-shaped blanket — expecting to make a grisly discovery, it was empty, cops later corrected.
'It's been confirmed that the item in question is a large blanket rolled up. There has been no body of any type recovered,' Sergeant Gregory Jones confirmed in a statement to the local outlet.
It's unclear how the corpse-shaped blanket wound up on the beach.
Wangkun Jia – stock.adobe.com
It's unclear how the blanket turned up on the shore in the first place, or if it was left by a spacey beachgoer the night before.
The hasty authorities turned all further questions over to the Massachusetts district attorney's office.
In a similarly odd case in Idaho earlier this month, cops there spent three hours searching for a reported corpse in a river, only to find a life-sized sex doll floating downstream.
The team spared no expense and even rolled out a full drone search while looking for what was nothing more than an inflatable plaything.
Still, authorities had no regrets, noting how disastrous the situation could've been if a real person had fallen into the water and they'd opted not to go 'all out.'
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Google confirms data stolen in breach by known hacker group
Google confirms data stolen in breach by known hacker group

Fox News

time2 hours ago

  • Fox News

Google confirms data stolen in breach by known hacker group

When a hospital or nonprofit falls victim to a cyberattack, it's hard to place blame. Cybersecurity isn't their strength, and many lack the budget for a dedicated security team, let alone a chief technology officer. But when a tech giant like Google experiences a data breach, it raises serious questions. Is data security slipping down the company's priority list? Or are today's cybercriminals so advanced that even Google's top engineers are struggling to keep up? Here's what happened: Google recently confirmed that hackers stole customer data by breaching one of its internal databases. The breach targeted a system that used Salesforce, a popular cloud-based platform companies use to manage customer relationships, store business contact information and track interactions. The attack has been linked to a known threat group. Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide — free when you join my Google has confirmed that a hacking group known as ShinyHunters stole customer data from one of its internal Salesforce databases used to manage business client relationships. The company disclosed the breach in a blog post published in early August, noting that the stolen data included "basic and largely publicly available business information, such as business names and contact details." The breach was carried out by ShinyHunters, a well-known cybercriminal group formally tracked as UNC6040. The group has recently been linked to a string of high-profile incidents involving companies such as AT&T, Ticketmaster, Allianz Life and Pandora. In this case, the attackers targeted Google's corporate Salesforce system, which the company uses to store contact information and notes about small and medium-sized businesses. According to Google's Threat Intelligence Group, the attackers relied on voice phishing, or "vishing," impersonating company employees in phone calls to IT support and persuading them to reset login credentials. This technique has proven effective against multiple organizations in recent months. Google did not specify how many customers were affected by the breach. When asked for comment, a company spokesperson pointed CyberGuy back to the blog post and declined to elaborate. It is also unclear whether Google has received any sort of ransom demand from the group. Cisco, Qantas and Pandora have all reported similar breaches in recent months, which now appear to be part of a broader campaign targeting cloud-based customer relationship management tools. In its blog post, Google warned that ShinyHunters may be preparing a public leak site. Ransomware gangs often use this tactic to extort companies, threatening to publish stolen data. The group reportedly shares infrastructure and personnel with other cybercriminal collectives, including The Com, which runs extortion campaigns and has, in some cases, issued threats of physical violence. While organizations like Google may be prime targets, individuals are often the weakest link that attackers exploit. But with a few smart practices, you can dramatically reduce your risk. The Google breach happened because employees gave up sensitive information over a phone call. No legitimate IT team will ever ask you to share your password or 2FA codes over the phone. If someone does, it's a major red flag. If someone claims to be from your company's IT department or a service provider, hang up and call back using an official number. Never trust the number displayed on caller ID. Even if credentials are compromised, two-factor authentication (2FA) can block unauthorized access by adding an extra layer of security. It ensures that a password alone isn't enough to break into your accounts. Phishing emails and messages often include links that take you to fake websites designed to steal your login credentials or personal information. These messages usually create a sense of urgency, asking you to verify an account, reset a password or claim a reward. Instead of clicking the link, take a moment to inspect the message. The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Attackers are able to carry out phishing, smishing and vishing attacks because your personal data is readily available online. The less of it that's publicly accessible, the harder it becomes for them to craft convincing scams. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting a free scan to find out if your personal information is already out on the web: Attackers often exploit outdated software with known vulnerabilities. Make sure your operating system, browsers, plugins and apps are always running the latest version. Enable auto updates wherever possible to avoid missing critical patches. A good password manager doesn't just store strong, unique passwords; it can also alert you if you're on a suspicious site. If your password manager refuses to autofill your login, it could mean the site is fake. Check out the best expert-reviewed password managers of 2025 at If you suspect a breach, watch your accounts for unauthorized logins, password reset emails or other suspicious behavior. Set up alerts when possible. Many online services offer login notifications or dashboards that show recent access history. If you receive a vishing or phishing attempt, report it to your organization's IT/security team or the appropriate government agency (like in the U.S.). Reporting helps shut down these scams faster and can protect others. While the data exposed in Google's case may be limited, the breach highlights a persistent vulnerability in corporate systems: people. ShinyHunters seems to be getting more effective at exploiting that weakness. What's even more concerning is the rise of vishing, also known as voice phishing. Vishing isn't new, but its growing success shows just how fragile even well-defended systems can be when human error is involved. How confident are you in your company's cybersecurity awareness training? Let us know by writing to us at Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide — free when you join my Copyright 2025 All rights reserved.

Massachusetts cops close off popular public beach over ‘dead body' that ended up being a crumpled blanket
Massachusetts cops close off popular public beach over ‘dead body' that ended up being a crumpled blanket

New York Post

time3 days ago

  • New York Post

Massachusetts cops close off popular public beach over ‘dead body' that ended up being a crumpled blanket

It's no 'Weekend at Bernie's.' Massachusetts police spent Wednesday morning roping off parts of a popular public beach after receiving reports of an 'unattended death' that turned out to be a crumpled-up blanket, authorities said. Massachusetts State Police arrived at Revere Beach, a summer hotspot just 6 miles northwest of Boston, around 10:30 a.m. Wednesday to probe the grim report. Massachusetts State Police reported finding a dead body on a beach outside of Boston, but it was just a blanket. Google Video captured by a passerby showed five officials standing on the beach cordoning off a large section of the three-mile shore with yellow caution tape while a sixth person waded into the sea. A police boat was also further out off the shore, according to the footage. Police originally described the situation as an 'unattended death.' They said they found what they believed to be a dead body on the beach wrapped in a sheet, according to Boston 25. But when officers opened the bulky, corpse-shaped blanket — expecting to make a grisly discovery, it was empty, cops later corrected. 'It's been confirmed that the item in question is a large blanket rolled up. There has been no body of any type recovered,' Sergeant Gregory Jones confirmed in a statement to the local outlet. It's unclear how the corpse-shaped blanket wound up on the beach. Wangkun Jia – It's unclear how the blanket turned up on the shore in the first place, or if it was left by a spacey beachgoer the night before. The hasty authorities turned all further questions over to the Massachusetts district attorney's office. In a similarly odd case in Idaho earlier this month, cops there spent three hours searching for a reported corpse in a river, only to find a life-sized sex doll floating downstream. The team spared no expense and even rolled out a full drone search while looking for what was nothing more than an inflatable plaything. Still, authorities had no regrets, noting how disastrous the situation could've been if a real person had fallen into the water and they'd opted not to go 'all out.'

New Gmail Security Alert For All 2.5 Billion Users — Steps To Take Now
New Gmail Security Alert For All 2.5 Billion Users — Steps To Take Now

Forbes

time4 days ago

  • Forbes

New Gmail Security Alert For All 2.5 Billion Users — Steps To Take Now

Update, August 12, 2025: This story, originally published on August 11, has been updated with additional mitigation advice following the new wave of Gmail security alerts as users warn of a hybrid attack employing email and phone calls in an attempt at account takeover. Google has already admitted that it is under attack from hackers thought to be part of the ShinyHunters extortion group, confirming a data breach that followed a successful compromise of a Google Salesforce database. Users of Google Cloud do not escape the security warnings either, with an advisory posting providing details of an attack path using what are known as dangling buckets to steal data and distribute malware. Gmail users cannot relax either, as they are also firmly in the hacker crosshairs. This triad of cybersecurity incidents is completed as Gmail users take to online support forums to report a wave of new attacks. This time, the attackers are adopting a hybrid approach that includes phone calls and email messages, all purporting to be from official Google support staff. As convincing as they are dangerous, here's what 2.5 billion Gmail users need to know and do about the security scams. Gmail Security Alert For All 2.5 Billion Users With an estimated 2.5 billion users, or around 30% of the world's total population, it's hardly surprising that cybercriminals are interested in hacking Gmail. After all, your email is a treasure trove of useful data that can be employed in further attacks. All email platforms are vulnerable to hacking, but Gmail, like Microsoft Windows, stands out due to its massive user base. The latest round of attack warnings comes courtesy of postings to the Gmail subreddit, which describe in detail how scammers are impersonating Google in attempts to initiate an account password reset and take over your email inbox. I have reported on such attacks before, and the recent spike appears to follow the same methodology. The victims first receive a phone call from someone claiming to be from Google support, warning them that an unknown party has attempted to hack their Google account. The caller advises that a password reset is required to stop the so-called attack and protect the user from harm. This is where the second part of the hybrid scheme comes into play, sending an account reset email to the user. The con itself is a simple one: that password reset email to your Gmail account includes a security verification code to prove it's you trying to change the password. The attacker encourages the victim to read the code out over the telephone so that 'Google support' can reset the victim's account and protect them from the consequences of the 'ongoing attack.' Of course, all they are really doing is hacking your account in real time, while on the phone with you. Google itself has said that the number of password-stealing threats delivered by email increased by 84% last year, a trend that it confirmed has 'only intensified in 2025.' 'We encourage all users to remain vigilant,' a Google spokesperson said, 'please reiterate to your readers that Google will not call you to reset your password or troubleshoot account issues.' Mitigating The Latest Gmail Account Attacks Google has published a helpful guide with advice on how to tell if a Google security alert is genuine, but users are also advised to implement the following three account attack mitigation steps as a matter of some urgency. The Google Security Checkup is, in my never humble opinion, the most efficient and effective way to ensure that the right security protections are in place to defend your account. It does this by checking what you have activated, and advising about issues that could leave you at risk. It is a fully automatic process, at least as far as checking your account is concerned, but you will need to follow the provided links to change settings as recommended. Google's Advanced Protection Program ensures that additional checks are made to help prevent even the most determined hackers from gaining access to your Gmail account. Checks such as blocking potential harmful downloads, restricting non-Google apps from accessing data from your Gmail account, and imposing additional steps into the account recovery process to prevent sophisticated attackers to stop hackers taking control. And finally, using a Google passkey really can stop most account takeover attacks stone dead. 'Google research has shown that security keys provide a stronger protection against automated bots, bulk phishing attacks, and targeted attacks than SMS, app-based one-time passwords, and other forms of traditional two-factor authentication,' Google's Gmail spokesperson, Ross Richendrfer, told me.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store