Last Samurai Standing begins with a familiar premise. Desperate samurai dispossessed by the restoration of the emperor enter into a deadly game for a life-changing cash prize — all for the entertainment of anonymous elites. Unlike its inspirations Battle Royale and Squid Game, however, Last Samurai Standing’s violence is chaotic, fast-paced, and kinetic, though it hides a careful choreography that makes the series a more electric proposition than its predecessors.
Technology
Insurance data breach exposes sensitive info of 1.6 million people
If there’s one thing I’ve learned from covering data breaches over the years, it’s that you should never take a company’s initial numbers at face value. When a breach becomes public, most companies try to minimize the damage by reporting fewer victims or staying vague about what kind of data was exposed.
Sometimes, to be fair, they genuinely don’t have the full picture yet. But that rarely gets communicated clearly. The same thing just happened again with an insurtech company that has now doubled the number of people affected by a breach it disclosed last year.
STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS – SIGN UP FOR KURT’S ‘THE CYBERGUY REPORT’ NOW
A woman working on her laptop (Kurt “CyberGuy” Knutsson)
What you need to know
Texas-based insurance administrative services provider Landmark Admin has revised the scope of its May 2024 cyberattack, revealing that nearly twice as many people were impacted as initially reported. Back in October 2024, Landmark disclosed that suspicious activity was detected in its network on May 13, prompting an investigation. At the time, it was estimated that the breach affected 806,519 individuals. But in a recent update filed with the Maine Attorney General’s office, that number has now jumped to 1,613,773.
Landmark serves as a third-party administrator offering backend support to major insurers like Liberty Bankers Life and American Benefit Life. This means millions of sensitive insurance policy records flow through its systems, making it a tempting target for cybercriminals.
The compromised information varies for each individual but may include a wide range of sensitive personal data. This includes full names, home addresses, Social Security numbers, tax identification numbers, driver’s license or state-issued identification numbers, passport numbers and bank account details. In some cases, medical information, dates of birth, health insurance policy numbers and details related to life and annuity policies may also have been exposed.
A hacker at work (Kurt “CyberGuy” Knutsson)
200 MILLION SOCIAL MEDIA RECORDS LEAKED IN MAJOR X DATA BREACH
What is Landmark doing now?
The company says the forensic investigation is still ongoing and that the total number of affected individuals may continue to rise. Personalized notification letters are being mailed out in phases, detailing exactly what type of data was compromised in each case.
“Landmark began reviewing the affected systems to identify the specific individuals and the types of information that may have been compromised,” reads the latest notice. “While this process remains ongoing, Landmark will notify affected individuals by mail as the information becomes available.”
To help mitigate the fallout, Landmark is offering 12 months of free credit monitoring and identity theft protection. The notice also advises recipients to monitor their credit reports and consider placing fraud alerts or a security freeze for extra protection. A dedicated helpline is available for 90 days after notification to address questions and concerns.
A man working on his laptop and scrolling on his phone (Kurt “CyberGuy” Knutsson)
MALWARE EXPOSES 3.9 BILLION PASSWORDS IN HUGE CYBERSECURITY THREAT
6 ways you can stay safe from insurance data breach
If your information was part of the Landmark breach or any similar one, it’s worth taking a few steps to protect yourself.
1) Consider identity theft protection services: Since the Landmark data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs.
Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. They often include up to $1 million to cover losses and legal fees and a white-glove fraud resolution team in which a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.
2) Monitor your accounts and transactions: The Landmark data breach revealed bank details to attackers, which means they can misuse those details to steal your money. You should check your online accounts and transactions regularly for any suspicious or unauthorized activity. If you notice anything unusual, immediately report it to the service provider or authorities. You should also review your credit reports and scores to see if there are any signs of identity theft or fraud.
3) Contact your bank and credit card companies: Since Landmark hackers obtained bank and credit card information, they could use it to make purchases or withdrawals without your consent. You should inform your bank and credit card companies of the situation. They can help you freeze or cancel your cards, dispute any fraudulent charges and issue new cards for you. You should also contact one of the three major credit reporting agencies (Equifax, Experian or TransUnion) and request a fraud alert to be placed on your credit file. This will make it more difficult for identity thieves to open new accounts in your name without verification.
4) Use personal data removal services: The data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you. One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.
5) Have strong antivirus software: Landmark hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.
6) Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication (2FA). It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.
WINDOWS 10 SECURITY FLAWS LEAVE MILLIONS VULNERABLE
Kurt’s key takeaway
The real risk with breaches like this isn’t just the initial leak. It’s the slow drip of consequences that follow. As more names and numbers surface, the fallout becomes harder to contain, and the people impacted are left scrambling to protect themselves. Landmark’s delayed clarity is a reminder that in the world of cyberattacks, timelines rarely work in the public’s favor. By the time the full picture emerges, the damage may already be done.
Do you think companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most-asked CyberGuy questions:
New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
How Last Samurai Standing adds kinetic action to the Battle Royale formula
Viewers have Junichi Okada to thank for that. As well as starring in and producing Last Samurai Standing, he serves as the series’ action planner. Many will be familiar with the results of an action planner’s work — sometimes called an action director, elsewhere a “coordinator,” and even “choreographer” — though perhaps not what the role entails. In the case of Last Samurai Standing, it’s a role that touches on nearly every aspect of the production, from the story to the action itself.
“I was involved from the script stage, thinking about what kind of action we wanted and how we would present it in the context of this story,” Okada tells The Verge. “If the director [Michihito Fujii] said, ‘I want to shoot this kind of battle scene,’ I would then think through the content and concept, design the scene, and ultimately translate that into script pages.”
The close relationship between the writer and director extends to other departments, too. Though an action planner’s role starts with managing fight scenes and stunt performers, they also liaise with camera, wardrobe, makeup, and even editorial departments to ensure fight scenes cohere with the rest of the production.
Image: Netflix
It’s a role which might appear a natural progression for Okada, who is certified to teach Kali and Jeet Kune Do — a martial art conceived by Bruce Lee — and holds multiple black belts in jiujitsu. Though the roots of his progression into action planning can be traced back further, to 1995 when he became the youngest member of J-pop group V6.
“Dance experience connects directly to creating action,” he says. “[In both] rhythm and control of the body are extremely important.” Joining V6 at the age of 15, that experience has made Okada conscious of how he moves in relation to a camera during choreography, how he is seen within the structure of a shot, and, critical to action planning, how to navigate all of that safely from a young age.
That J-pop stardom also offered avenues into acting, initially in roles you might expect for a young pop star: comic heartthrobs and sitcom sons. But he was steadily able to broaden his output. A starring turn in Hirokazu Kore-eda’s Hana followed, as did voice acting in Studio Ghibli’s Tales From Earthsea and From Up on Poppy Hill. A more telling departure was a starring role in 2007’s SP, in which he played a rookie in a police bodyguard unit, for which he trained for several years under shootfighting instructor Yorinaga Nakamura.
“What I care about is whether audiences feel that ‘this man really lives here as a samurai.’”
In the years since, Okada has cemented himself as one of Japan’s most recognizable actors, hopping between action starring roles in The Fable to sweeping period epics like Sekigahara. Those two genres converge in his Last Samurai Standing role of Shujiro, a former Shogunate samurai now reduced to poverty, working through his PTSD and reckoning with his bloodthirsty past in the game. These days, it’s less of a concern that the character butts up against his past idol image, he suggests. “What I care about is whether audiences feel that ‘this man really lives here as a samurai.’”
For Okada’s work on Last Samurai Standing, as both producer and action planner, that involved lacing high-octane but believable action with the respect for history and character studies of the period dramas he loves. “Rather than being 100 percent faithful to historical accuracy,” he adds, “my goal was to focus on entertainment and story, while letting the ‘DNA’ and beauty of Japanese period drama gently float up in the background.”
A focus on what he defines as “‘dō’ — movement,” pure entertainment that “never lets the audience get bored” punctuated — with “‘ma,’” the active emptiness that connects those frenetic moments. Both can be conversations, even if one uses words and another communicates dialogue through sword blows. This is most apparent when Shujiro faces his former comrade Sakura (Yasushi Fuchikami) inside a claustrophobic bank vault that serves as a charnel house for the game’s less fortunate contestants.
“The whole battle is divided into three sequences,” Okada says. The first starts with a moment of almost perfect stillness, a deep breath, before the two launch into battle. “A fight where pride and mutual respect collide,” he says, “and where the speed of the techniques reaches a level that really surprises the audience.” It’s all captured in one, zooming take with fast, tightly choreographed action reminiscent of Donnie Yen and Wu Jing in Kill Zone.
So intense is their duel that both shatter multiple swords. The next phase sees them lash out in a more desperate and brutal manner with whatever weapons they find. Finally, having fought to a weary stalemate, the fight becomes, Okada concludes, “a kind of duel where their stubbornness and will are fully exposed” as they hack at each other with shattered blades and spear fragments.

Image: Netflix
It’s a rhythm that many fights in Last Samurai Standing follow, driven by a string of physical and emotional considerations that form the basis of an action planner’s tool kit: how and why someone fights based on who they are and their environment. Here it is two former samurai in an elegant and terrifyingly fast-paced duel. Elsewhere we see skill matched against brutality, or inexperience against expertise.
“I define a clear concept for each sequence,” Okada says, before he opens those concepts up to the broader team. From there, he might add notes, but in Last Samurai Standing, action is a collaborative affair. “We keep refining,” he says. “It’s a back-and-forth process of shaping the sequence using both the ideas the team brings and the choreography I create myself.”
There is a third factor which Okada believes is the series’ most defining. “If we get to continue the story,” he says, “I’d love to explore how much more we can lean into ‘sei’ — stillness, and bring in even more of a classical period drama feel.”
As much of a triumph of action as Last Samurai Standing is, its quietest moments are the ones that stay with you. The charged looks between Shujiro and Iroha (Kaya Kiyohara) or their shuddering fright when confronted with specters of their past. Most of all, Shujiro watching his young ward, Futaba Katsuki (Yumia Fujisaki), dance before a waterlogged torii as mist hovers. These pauses are what elevate and invigorate the breathless action above spectacle.
The pauses are also emblematic of the balance that Last Samurai Standing strikes between its period setting and pushing the boundaries of action, all to inject new excitement into the genre. “Japan is a country that values tradition and everything it has built up over time. That’s why moments where you try to update things are always difficult,” Okada says. “But right now, we’re in the middle of that transformation.”
That is an evolution that Okada hopes to support through his work, both in front of and behind the camera. If he can create avenues for new generations of talent to carry Japanese media to a broader audience and his team to achieve greater success on a global stage, “that would make me very happy,” he says. “I want to keep doing whatever I can to help make that possible.”
The first season of Last Samurai Standing is streaming on Netflix now, and a second season was just confirmed.
Technology
Free up iPhone storage by deleting large attachments
NEWYou can now listen to Fox News articles!
If your iPhone keeps warning you about low storage, your Messages app may be part of the problem. Photos, videos and documents saved inside your text threads can stack up fast. The good news is that you can clear those big files without erasing entire conversations.
Below, you will find simple steps that work on the latest iOS 26.1. These steps help you clean up storage while keeping your messages right where you want them.
If you haven’t updated to iOS 26.1, go to Settings > General > Software Update to install the latest version.
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
‘CLOUD STORAGE FULL’ SCAM STEALS YOUR PHOTOS AND MONEY
An iPhone displays a low-storage alert as large photos, videos and documents saved in Messages fill device space, prompting users to remove files without deleting entire conversations. (Cyberguy.com)
Why clearing attachments helps your iPhone run better
Removing large attachments gives you quick breathing room on your iPhone. It can free up gigabytes in seconds, especially if you text lots of photos or videos. Clearing old files also keeps your message threads tidy and helps your device run more smoothly by reducing the amount of storage your system needs to manage. The best part is that you can clean up everything without losing a single conversation.
How to delete attachments but keep your conversations on iPhone
These quick steps help you clear large files from Messages while keeping every conversation intact.
- Launch the Messages app on your iPhone
- Open the conversation thread that holds the attachments you want to delete.
- Tap on the name of the contact(s) in the text thread.
To the right of Info, click on Photos or Documents; you may need to swipe over other tabs to see these. Photos will also contain videos and GIFs, while documents will contain Word documents, PDFs and other types of files.
- Hold your finger and long-press on a photo, video or document until a menu appears.
- Tap Delete to remove that single file.
Then confirm Delete when asked.
How to delete multiple files on your iPhone at once
To clear out several attachments at once, follow these quick steps on your iPhone.
Deleting attachments in Messages quickly frees space without losing your conversations. (Sean Gallup/Getty Images)
- Go back to the Photos or Documents tab.
- Tap Edit.
- Click Select documents or Select Photos
- Tap on the photos or documents that you want to remove. You will see a blue checkmark appear in the bottom-right corner.
- Tap the trash icon in the bottom right corner.
Confirm you want to delete the selected attachments by clicking Delete Photos.
These steps work almost the same way on an iPad. After you finish, you will often see an instant boost in available storage.
How to review large attachments in settings and delete them
If you want to clear the biggest files on your device, you can check them from your iPhone’s storage screen and delete them:
- Open Settings
- Tap General
- Choose iPhone Storage
- Tap Messages
- Click Review Large Attachments to see photos, videos and attachments taking up storage in Messages.
- Click Edit.
- Select items to delete by clicking the circle next to the attachment you want to delete. A blue checkmark will appear.
Then, tap the trash can icon in the upper right to delete it.
APPLE RELEASES IOS 26.1 WITH MAJOR SECURITY IMPROVEMENTS AND NEW FEATURES FOR IPHONE USERS
This method gives you a quick overview of what takes up the most space and lets you delete it quickly.
IPhone users can clear large photos, videos and files from Messages using built-in storage tools, helping free space, keep conversations intact and improve device performance. (Cyberguy.com)
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.
Kurt’s key takeaways
Freeing up storage doesn’t have to be confusing. A few quick taps can remove bulky files and keep your conversations intact. With these simple steps, your iPhone stays organized, runs smoothly and is ready for more photos, videos and apps.
What is the one type of attachment that takes up the most space on your iPhone? Let us know by writing to us at Cyberguy.com
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
The FCC’s foreign drone ban is here
The Federal Communications Commission has banned new drones made in foreign countries from being imported into the US unless the Department of Defense or the Department of Homeland Security recommends them. Monday’s action added drones to the FCC’s Covered List, qualifying foreign-made drones and drone parts, like those from DJI, as communications equipment representing “unacceptable risks to the national security of the United States and to the safety and security of U.S. persons.”
DJI is “disappointed” by today’s action, Adam Welsh, DJI’s head of global policy, says in a statement. “While DJI was not singled out, no information has been released regarding what information was used by the Executive Branch in reaching its determination.” Welsh adds that DJI “remains committed to the U.S. market” and noted that existing products can continue operation as usual. Other items on the FCC’s list include Kaspersky anti-virus software (added in 2024) and telecommunications equipment from Huawei and ZTE (added in 2021).
The FCC says it received a National Security Determination on December 21st from an interagency body saying that “uncrewed aircraft systems” (UAS) and critical UAS components produced in a foreign country could “enable persistent surveillance, data exfiltration, and destructive operations over U.S. territory” and that “U.S. cybersecurity and critical‑infrastructure guidance has repeatedly highlighted how foreign‑manufactured UAS can be used to harvest sensitive data, used to enable remote unauthorized access, or disabled at will via software updates.”
If you already own a drone made outside the US, you will still be able to use it, according to the FCC’s fact sheet. Drones or drone components can be removed from the Covered List if the DoD or DHS “makes a specific determination to the FCC” that it does not pose unacceptable risks.
“Unmanned aircraft systems (UAS), also known as drones, offer the potential to enhance public safety as well as cement America’s leadership in global innovation,” FCC chairman Brendan Carr says.
-
Iowa1 week agoAddy Brown motivated to step up in Audi Crooks’ absence vs. UNI
-
Maine1 week agoElementary-aged student killed in school bus crash in southern Maine
-
Maryland1 week agoFrigid temperatures to start the week in Maryland
-
New Mexico7 days agoFamily clarifies why they believe missing New Mexico man is dead
-
South Dakota1 week agoNature: Snow in South Dakota
-
Detroit, MI1 week ago‘Love being a pedo’: Metro Detroit doctor, attorney, therapist accused in web of child porn chats
-
Health1 week ago‘Aggressive’ new flu variant sweeps globe as doctors warn of severe symptoms
-
Maine7 days agoFamily in Maine host food pantry for deer | Hand Off