logo
Michigan State Police investigating shooting in Clyde Township

Michigan State Police investigating shooting in Clyde Township

Yahooa day ago
Michigan State Police confirmed they are investigating a shooting that happened in Clyde Township on July 6.
According to MSP Public Information Officer Lt. Ashley Miller, the incident was reported around 2:50 a.m. The victim of the shooting was taken to an unidentified local hospital. The shooting was not fatal.
Both of the involved parties were interviewed after the incident, according to Miller. No arrests have been made and no charges have been filed as of Friday, July 18.
Some time after the shooting, one of the individuals involved who was not shot was in a vehicle crash, though Miller said she was not sure when of where the crash happened. Miller said she did not know the driver's condition but had not heard anything of it being a fatal crash.
Miller said she could not confirm the identities of those involved as the investigation is ongoing and did not know when the investigation would be complete.
Contact Johnathan Hogan at jhogan@gannett.com.
This article originally appeared on Port Huron Times Herald: Michigan State Police investigating shooting in Clyde Township
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Deadly motorcycle crash shuts down lanes on Route 53 in Arlington Heights, Illinois
Deadly motorcycle crash shuts down lanes on Route 53 in Arlington Heights, Illinois

CBS News

time14 minutes ago

  • CBS News

Deadly motorcycle crash shuts down lanes on Route 53 in Arlington Heights, Illinois

Illinois Route 53 is shut down in both directions after a deadly motorcycle crash in Arlington Heights, Illinois, early Monday morning. According to Illinois State Police, troopers responded to a crash involving a motorcycle and a dump truck near Rand Road just before 1:30 a.m. Kris Habermehl said the motorcycle driver hit a median, and the impact of the crash sent the driver into the southbound lanes. According to state police, the driver of the motorcycle was pronounced dead at the scene. All northbound and southbound lanes are closed. Traffic is being diverted to nearby exit ramps. The cause of the crash is unknown at this time. Police are investigating.

Fashion Entrepreneur Hunsicker On $1 Million Bail Over CaaStle Fraud
Fashion Entrepreneur Hunsicker On $1 Million Bail Over CaaStle Fraud

Forbes

time14 minutes ago

  • Forbes

Fashion Entrepreneur Hunsicker On $1 Million Bail Over CaaStle Fraud

Christine Hunsicker, former CEO of fashion startup CaaStle Inc., leaving Manhattan federal court in ... More New York on Friday, July 18. (AP Photo/Larry Neumeister) Christine Hunsicker, the entrepreneur and founder of fashion platform CaaStle Inc., has been released on a $1 million bail package after being charged by federal prosecutors with defrauding investors out of over $300 million following the collapse of her tech company. The 48-year-old Hunsicker of Lafayette, New Jersey turned herself in to face charges on Friday morning past and pleaded not guilty that afternoon during a court appearance in Manhattan. The Securities and Exchange Commission also filed a lawsuit against her in the same court, claiming that she created and disseminated false financial statements and audit reports to investors while raising more than $250 million for CaaStle. The latest legal moves come months after Hunsicker resigned as CaaStle's CEO over allegations she misled investors about the company's financial success and as a result she now faces a six-count indictment that include wire fraud, securities fraud, money laundering, making false statements to a bank and aggravated identity theft. In the indictment Friday, prosecutors claimed that Hunsicker defrauded investors in CaaStle and Brendan Hoffman's fashion investment platform P180 out of more than $300 million. She allegedly fabricated documents to portray CaaStle as a 'high-growth, private company with substantial available cash' when in reality it faced significant financial stress from February 2019 up to around March 2025, according to the indictment. Earlier this year the board told shareholders that Hunsicker had allegedly handed over financial statements exaggerating CaaStle's revenue to certain investors. As a result, Hunsicker stepped down as CEO and CaaStle sought Chapter 7 protection in Delaware on June 20, declaring $10-$50 million worth of liabilities. Prosecutors allege, however, that Hunsicker once valued the CaaStle business at more than $1.4 billion. Hunsicker Team Says More To Story Lawyers for Hunsicker said that she had fully cooperated with the federal probes, however prosecutors 'nonetheless has chosen to present to the public an incomplete and very distorted picture in today's indictment.' Lawyers Michael Levy and Anna Skotko said in a joint statement: 'There is much more to this story, and we look forward to telling it.' Authorities said Hunsicker falsified CaaStle's financial statements and bank records to raise capital. This included alleged representations that CaaStle earned $66.3 million on revenue of $439.9 million in 2023, when in reality it lost $81 million on revenue of $15.7 million. CaaStle worked wiht a number of major U.S. retailers. (Photo Illustration by Thomas Fuller/SOPA ... More Images/LightRocket via Getty Images) Prosecutors said Hunsicker fraudulently raised more than $275 million for CaaStle and $30 million for a related venture, P180. Beginning as Gwynnie Bee Inc., before changing its name in 2018, CaaStle worked with brands and retailers such as Express, Ann Taylor, Loft and Bloomingdale's to rent clothes to consumers. The business-to-business technology and logistics company enables apparel brands and retailers to offer customers subscription-based rentals of apparel. Hunsicker Sued For P180 Hunsicker has also been sued by some investors and by P180, which she co-founded. P180 accused Hunsicker of fabricating subscribers and revenue and inducing the firm to obtain assets that could be leveraged to continue the CaaStle fraud. The SEC sued Hunsicker on Friday in the same court, alleging that she created and sent to investors false financial statements from February 2019 to at least March while raising more than $250 million through the offer and sale of preferred stock and common warrants. The SEC said that while Hunsicker claimed CaaStle had achieved 'rapid and steady growth' after a rebrand of the business in 2018 and had become profitable by December 2022, its revenues were decreasing, losses were rising and the company never became profitable. The complaint further alleged that Hunsicker misled investors into believing they were buying shares in secondary transactions from earlier investors. However, that chare claims these investors were purchasing original issue shares directly from the company, and investor interests were diluted as a result. Hunsicker also allegedly created and distributed false capitalization tables that omitted the new share issuances.

How To Fight The Threats Targeting Your Employees' Identities
How To Fight The Threats Targeting Your Employees' Identities

Forbes

time14 minutes ago

  • Forbes

How To Fight The Threats Targeting Your Employees' Identities

Damon Fleury is the Chief Product Officer of SpyCloud, a leader in identity threat protection. The cybercrime economy has evolved into a sophisticated marketplace of stolen data, illegally obtained access and enablement services and tools that are readily available at scale. These offerings rely heavily upon data and access stolen with malware, phishing attacks and third-party breaches. For example, this growing industry of underground forums and marketplaces sells pre-built malware tools for less than $10, making it easier for even non-sophisticated cybercriminals to infiltrate organizations. A new generation of resourceful cybercriminals is now efficiently using these darknet resources to target organizations with infostealer malware, advanced phishing attacks, residential proxies that mimic trusted IP addresses from victims' home addresses and more. The impact is eye-opening. According to SpyCloud's 2025 Identity Exposure Report: • About 50% of corporate users were exposed through infostealer malware in the past year. • Seven million credentials were stolen from third-party applications, along with hundreds of thousands of credentials stolen from enterprise AI tools and password managers, exposing sensitive business insights and proprietary data and undermining critical security layers. • As attackers gained access to high-value personal and corporate data, 97% of recaptured phishing data from known breaches contained email addresses, 64% exposed IP addresses and half included location data. These statistics reflect a concerning level of exposure, with massive amounts of sensitive information now in the hands of individuals who lacked the tools or expertise to obtain it just a year ago. To keep up, enterprises must rethink their cybersecurity strategies for a world where anyone can be a threat and every employee a potential target, starting with a clear understanding of what's driving modern cybercrime and where their people are most vulnerable. One-Click Cybercrime: Underground Syndicates And Install Brokers It used to be that actors had to be truly enterprising to be successful, from writing their malware code to developing ways to avoid detection. Now, bad actors can pick up an entire malware kit via a black market site just as easily as the average consumer can make an Amazon purchase. The impacts of these attacks can be devastating. For example, a criminal group known as Scattered Spider recently attacked famed British retailer Marks & Spencer, allegedly using solutions purchased on underground forums. The attack resulted in a drop in the company's share price and millions of dollars in lost revenue. Scattered Spider is one of many groups suspected of using off-the-shelf malware obtained through 'install brokers'—also known as ad brokers or pay-per-install services. These brokers act as intermediaries in the cybercrime supply chain, connecting malware developers with threat actors by distributing malicious software at scale. Install brokers often use advertising networks like Spaxmedia, compromised websites or bundled software to silently install malware on victims' devices. This hands-off infection method allows cybercriminals to steal data, launch phishing campaigns, deploy ransomware and cause widespread damage to an organization's operations, finances and reputation. Any bad actor with a few hundred dollars in crypto can buy access to high-quality, polished, ready-to-install malware and launch it quickly and easily. Criminals can also purchase "malware cryptors'—tools that help evade antivirus software. They can even use install brokers to resell stolen data in bulk for low prices, creating a wholesale club for malicious actors. Holistic Digital Identities: Defending Against Cybercrime Enablement Executives must understand what they're dealing with and shift their perceptions of cybercriminals. So-called "smaller players" like those operating as Scattered Spider can be just as damaging as sophisticated state-sponsored cyberattackers, thanks to their ability to easily purchase readily available, inexpensive, plug-and-play tools. The result is a corporate cyber threat landscape that's more scalable and dangerous than ever before. The problem is that most of the attack methods used by the new wave of cyberattackers leave little to no forensic trail, which makes it hard for businesses to know they've been infiltrated until it's too late. For instance, infostealers leave no trace, allowing criminals to stealthily steal users' identity data like passwords, personally identifiable information (PII) and more. However sly the criminals are, they're generally predictable and almost always go after the same target: an organization's users. Therefore, one of the best defenses against infostealers, PhaaS and other tactics is to use data collected from known breaches and stolen data that's circulating the dark web to build holistic digital identities for your organization's users. I've previously shared insights into the need for digital identity correlation, which enables companies to identify and mitigate threats related to stolen or compromised employee data—everything from social security numbers and emails to phone and credit card numbers. Criminals see exposed users as soft targets they can easily exploit, but this approach helps businesses turn the tables. Piecing together user credentials exposed on the darknet allows businesses to make informed decisions on enabling access, resetting passwords and performing other tasks that protect individuals and the organization. They can effectively harden the soft targets against cybercriminals of all skill levels and defend against attacks. Evolving Enterprise Security To Meet The Moment Malware, phishing platforms, stolen credentials and install broker services are readily available and sold like consumer software, dramatically lowering the barrier to entry for cyberattackers. This shift has redefined the threat landscape, turning low-skill actors into legitimate threats and scaling the impact of cybercrime across industries. As the era of cybercrime enablement expands, enterprise security practices must evolve, too. Instead of focusing exclusively on perimeter defense models, organizations must understand the types of PII today's bad actors possess—and use that information against them to build strong and sustainable security postures. Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store