logo
Pregnant woman claims dead rat found in salad at Sydney restaurant

Pregnant woman claims dead rat found in salad at Sydney restaurant

SYDNEY: A Japanese restaurant in Sydney has issued a public apology after a customer claimed to have discovered a dead rat in her meal.
According to News.com.au, the incident allegedly occurred at Tatsuya West Ryde, where a diner reported finding the rodent in her side salad while eating a katsu don lunch set.
The woman, who posted a Google review under the name DO, described the experience as shocking and disturbing.
"I'd eaten half of it at this point. Just absolutely revolting and unacceptable," she wrote in the review.
She added that after she made the disturbing discovery, "everyone who was present at the time stood up and left the restaurant."
Another review, posted by a person identified as JH, who claimed to be the woman's friend, described the situation in even stronger terms.
"My pregnant friend and I were having their lunch set today and in her small salad was a disgusting feral dead rat that was underneath the salad," JH wrote, giving the restaurant a one-star rating.
"I don't even think I should be giving a star considering what happened today."
Both reviewers expressed outrage that the restaurant continued operating after the alleged discovery.
Daniel Kim, who identified himself as DO's husband, also left a review, saying: "My wife's salad had a rat in it. Absolutely disgusting."
In response to Kim's review, the restaurant acknowledged the complaint and extended an apology.
"We sincerely apologise for this incident," the restaurant wrote.
"The issue originated from a delivered salad box which we are currently investigating with our supplier and local food authorities."
The business added that it was taking necessary measures to prevent similar events in the future.
"We are taking all necessary steps to prevent such incidents and appreciate your understanding," the restaurant said in a statement.
According to News.com.au, a statement from the restaurant's owner confirmed that an investigation is underway.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Philippine Bureau of Investigation nabs yakuza boss in Angeles
Philippine Bureau of Investigation nabs yakuza boss in Angeles

The Star

time3 days ago

  • The Star

Philippine Bureau of Investigation nabs yakuza boss in Angeles

MANILA: The Bureau of Immigration (BI) confirmed on Friday (June 5) the arrest and detention of a yakuza boss who has been operating a transnational crime ring out of the Philippines since 2022. Immigration Commissioner Joel Anthony Viado described as a 'significant victory' the arrest of Japanese national Ryuji Yoshioka, 54, the leader of the so-called JP Dragon crime ring. BI records showed that Yoshioka has not left the Philippines since 2022 when he arrived after a warrant for his arrest was issued by a court in Fukuoka, Japan. He arrived two years after one of his top aides, Tomohiro Koyama, who was subsequently deported last November along with two other JP Dragon members who were suspected of making calls from the Philippines to defraud people in Japan. The JP Dragon gang is believed to be behind large-scale theft and telecom fraud schemes with operational bases in South-East Asia. Viado said BI's Fugitive Search Unit (FSU) arrested Yoshioka in Angeles City, Pampanga, on June 4 with the help of the Philippine Navy and the Northern Luzon Command of the Armed Forces of the Philippines. 'This individual is a key player in an international crime group. His arrest sends a clear message that the Philippines is not a safe refuge for fugitives,' Viado emphasised. 'Yoshioka's arrest is a testament to our commitment to uphold justice and protect the Philippines from becoming a haven for international fugitives,' Viado said. Viado commended the FSU, led by its chief Rendel Ryan Sy, for the successful operation that followed continuing surveillance that has resulted in the arrest of at lest 10 JP Dragon gangsters. Yoshioka's aide Koyama was actually arrested in January 2024, but fraud charges were filed against him by his Filipino girlfriend apparently so he could dodge summary deportation. Viado did not specify the charges against Yoshioka, apparently to avoid a delay in his deportation because of charges pending in Philippine courts. Last November, Koyama was deported with fellow JP Dragon members Hiroki Nagaura, 26, and Eisei Miura, 41. According to the English-language Japan Times, Koyama and his two companions were linked to the so-called Luffy group, a separate yakuza ring believed to be behind a series of burglaries in Japan. According to the Nippon Hoso Kyoka television network, the Luffy group is led by Kiyoto Imamura, 41, who is also believed to be in the Philippines. Last month, lawmen arrested seven JP Dragon gangsters in simultaneous operations in Metro Manila and Bulacan. The BI did not identify all the seven arrested gangsters, except for Hikari Ishikawa, 45, and Masato Morihiro, 37. Ishikawa was arrested with four others in a residential subdivision in Bulacan while Morihiro was nabbed with another JP Dragon member in a condominium in Metro Manila. - Philippine Daily Inquirer/ANN

US$92b damage order against ex-bosses of Fukushima operator overturned: Japanese media
US$92b damage order against ex-bosses of Fukushima operator overturned: Japanese media

Malaysian Reserve

time5 days ago

  • Malaysian Reserve

US$92b damage order against ex-bosses of Fukushima operator overturned: Japanese media

TOKYO — The Tokyo High Court on Friday overturned a $92 billion damages order against four ex-bosses of the operator of the devastated Fukushima nuclear plant, Japanese media reported. The former executives had in 2022 been ordered to pay 13.3 trillion yen in a suit brought by shareholders over the nuclear disaster triggered by a massive tsunami in 2011. Shareholders had argued the catastrophe could have been prevented if Tokyo Electric Power Company (TEPCO) bosses had listened to research and implemented preventative measures like placing an emergency power source on higher ground. But the defendants countered that the risks were unpredictable, and the studies cited were not credible. The court did not immediately confirm Friday's news reports when contacted by AFP. The 13.3 trillion yen damages award was believed to be the largest amount ever ordered in a civil suit in Japan. It was meant to cover TEPCO's costs for dismantling reactors, compensating affected residents, and cleaning up contamination. In 2015, British oil giant BP was ordered to pay $20.8 billion for the Gulf of Mexico oil spill in what was described at the time as the highest fine ever imposed on a company in US history. Jiji Press reported Friday that the High Court had denied the tsunami was a predictable event. 'Take responsibility' Footage broadcast on Japanese networks showed the plaintiffs holding a banner calling for an even higher damages order of 22 billion yen. 'Take responsibility for the Fukushima nuclear accident!' their banner said. Three of the Fukushima Daiichi nuclear plant's six reactors were operating when a massive undersea quake triggered a massive tsunami on March 11, 2011. They went into meltdown after their cooling systems failed when waves flooded backup generators, leading to the worst nuclear disaster since Chernobyl. Overall the tsunami along Japan's northeast coast left around 18,500 people dead or missing. In March, Japan's top court said it had finalised the acquittal of two former TEPCO executives charged with professional negligence over the Fukushima meltdown. The decision concluded the only criminal trial to arise from the plant's 2011 accident. — AFP

Hackers abuse modified Salesforce app to steal data, extort companies, Google says
Hackers abuse modified Salesforce app to steal data, extort companies, Google says

The Star

time6 days ago

  • The Star

Hackers abuse modified Salesforce app to steal data, extort companies, Google says

FILE PHOTO: The company logo for is displayed on the Salesforce Tower in New York City, U.S., March 7, 2019. REUTERS/Brendan McDermid/File Photo (Reuters) -Hackers are tricking employees at companiesin Europe and the Americasinto installing a modified version of a Salesforce-related app, allowing the hackers to steal reams of data, gain access to other corporate cloud services and extort those companies, Google said on Wednesday. The hackers – tracked by the Google Threat Intelligence Group as UNC6040 – have 'proven particularly effective at tricking employees' into installing a modified version of Salesforce's Data Loader, a proprietary tool used to bulk import data into Salesforce environments, the researchers said. The hackers use voice calls to trick employees into visiting a purported Salesforce connected app setup page to approve the unauthorized, modified version of the app, created by the hackers to emulate Data Loader. If the employee installs the app, the hackers gain 'significant capabilities to access, query, and exfiltrate sensitive information directly from the compromised Salesforce customer environments,' the researchers said. The access also frequently gives the hackers the ability to move throughout a customer's network, enabling attacks on other cloud services and internal corporate networks. Technical infrastructure tied to the campaign shares characteristics with suspected ties to the broader and loosely organized ecosystem known as 'The Com,' known for small, disparate groups engaging in cybercriminal and sometimes violent activity, the researchers said. A Google spokesperson did not share additional details about how many companies have been targeted as part of the campaign, which has been observed over the past several months. A Salesforce spokesperson told Reuters in an email that 'there's no indication the issue described stems from any vulnerability inherent in our platform.' The spokesperson said the voice calls used to trick employees 'are targeted social engineering scams designed to exploit gaps in individual users' cybersecurity awareness and best practices.' The spokesperson declined to share the specific number of affected customers, but said that Salesforce was "aware of only a small subset of affected customers," and said it was "not a widespread issue." Salesforce warned customers of voice phishing, or "vishing," attacks and of hackers abusing malicious, modified versions of Data Loader in a March 2025 blog post. (Reporting by AJ Vicens in Detroit; Editing by Leslie Adler)

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store