
Kiwi singer 'heartbroken' over friends' deaths in LA homicide
The Los Angeles Police Department said the couple, both 70, were found dead with gunshot wounds on July 14, 2025, but their investigation found a radio call had been made about a possible burglary at their home four days earlier.
Police believe the couple returned home and were confronted by the suspect, who already gained entry. Police said a 22-year-old suspect has now been arrested and charged with murder.
In a message posted on social media, Westenra said she only found out the news of the death of her "surrogate aunty and uncle" this morning.
"They were the KINDEST of souls. I'd met Robin & Tom over 20 years ago through work and then we became lifelong friends," the 38-year-old said.
"I stayed with them many times including my last night in LA when I was escaping a very bad relationship (they likely saved my life)."
Westenra shared a video of her and Deluca performing Lovers Game , which she said Kaye wanted her to post when they had been messaging a few months ago.
She said she had written a number of songs with Deluca and they had also been meaning to do a proper release for Greener Lands , which she performed live at Carnegie Hall.
"I want people to remember them this way … bright, loyal & loving souls."
Born in Christchurch, Westenra rose to fame after she signed with Universal Records New Zealand at the age of 12 and released a self-titled album in 2001.
In a statement, a spokesperson for the American Idol series told ABC that Kaye had been with the TV show since 2009.
"We are devastated to hear of Robin and her dear husband, Tom's, passing," the spokesperson said in a statement. "Robin has been a cornerstone of the Idol family since 2009 and was truly loved and respected by all who came in contact with her. Robin will remain in our hearts forever and we share our deepest sympathy with her family and friends during this difficult time."
Kaye also served as music supervisor on Lip Sync Battle , After the Sunset , The Singing Bee and Q'Viva!: The Chosen as well as multiple Miss USA and Miss Universe pageants.
Singer and musician Deluca released his own albums Down to the Wire (produced by James Guthrie, Pink Floyd) and Street Rock , and had composed songs for artists like Kid Rock, Micky Dolenz and Diesel.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Scoop
4 hours ago
- Scoop
Thousands Of Leaked NZ Govt And Health Agency Credentials On Dark Web
Press Release – nWebbed Julian Wendt, founder of Kiwi tech start-up nWebbed Intelligence, says the findings show New Zealand organisations are underestimating the scale and frequency of cyber risk. Thousands of leaked employee credentials from government departments, local banks and healthcare organisations are among more than 150 million compromised records tied to New Zealand accessible on the dark web, according to new research. The nWebbed NZ Cybersecurity Study, which analysed over 30 billion credentials available for sale on the dark web – a hidden part of the internet used as an illegal marketplace by criminals, has revealed an alarming level of vulnerability among Kiwi businesses, with compromised credentials linked to more than 198,000 New Zealand companies and entities. In addition, the usernames and passwords of more than 18,000 NZ Government workers, 3,200 banking staff and 2,000 healthcare organisation accounts with privileged access to sensitive information were also found in leaked databases on the dark web. The study analysed global breach records and cross-referenced them with local email domains to identify exposure. Julian Wendt, founder of Kiwi tech start-up nWebbed Intelligence, which has built the world's fastest-growing database of dark web credentials, says the findings show New Zealand organisations are underestimating the scale and frequency of cyber risk. He says an urgent review of cybersecurity protocols, credential management systems and third-party access controls across the country's sensitive institutions and corporations is needed to secure exposed systems and protect the privacy of consumers whose personal data is at risk. 'We are seeing widespread exposure of compromised credentials linked to core parts of the New Zealand economy, including health providers, government agencies, banks and large-scale businesses. 'These are trusted institutions that Kiwis interact with every day, and they are real emails and passwords sitting in the wild. They're searchable, for sale and vulnerable to exploitation,' he says. Wendt says many breaches are going undetected for months or even years, and the data is still circulating. 'It's not that someone was hacked once and that's it. In many cases, credentials from five or six separate breaches are still sitting out there, waiting to be exploited,' he says. Wendt says New Zealand urgently needs to shift away from reactive cybersecurity practices. 'You can't wait for the ransom note to start caring about where your data ends up. We need a preventative model, and that starts with visibility. 'Most organisations are watching their perimeter, not what's already leaked. But if your staff credentials are out there, especially admin or technical roles, then attackers already have the keys,' he says. Wendt says their database is growing by 2 billion credentials each month as the global rate of breaches accelerates. He says in response to the volume of sensitive credentials available online, nWebbed has launched a new threat monitoring platform that uses artificial intelligence to help organisations close critical security gaps in real time, enabling businesses to act before data is weaponised. Wendt says the time between a data leak and active exploitation is narrowing, particularly for high-value targets. 'In some cases, we've seen attackers move within minutes of credentials appearing online. They're using automated tools to scan for executive logins, technical roles or access to critical systems. 'What starts as a single leaked password can escalate into a live intrusion before an organisation even realises there's been a breach,' he says. Wendt says part of the problem is cultural. 'There's still this assumption in New Zealand that cybercrime is something that happens to big overseas companies. But in reality, our companies are being targeted every day, often because we're seen as a soft entry point into larger international networks. 'Nearly half of the Fortune 500 companies worldwide have exposed employee credentials available online, and Kiwi companies are facing similar threats. Compromised credentials can be used to access corporate networks, bypass multi-factor authentication or launch phishing attacks,' he says. Wendt says too many companies rely on outdated risk assessments and miss critical external vulnerabilities. 'Even organisations with good internal cybersecurity practices are often shocked to discover what's floating around publicly. That includes old passwords, unpatched web portals or documents they thought were private. It's not about blaming anyone, it's about visibility,' he says. Wendt says the next step is to raise awareness and get more Kiwi companies treating external digital hygiene as seriously as they do internal firewalls. 'Most breaches happen because someone didn't know their login details were already out there. This is a solvable problem if you're willing to look,' he says.

1News
4 hours ago
- 1News
What does a drug shipment 'catcher' earn for picking up the haul?
After a West Auckland builder was yesterday sentenced to five years in prison for collecting what he thought was a shipment of 200kg of meth, Yvonne Tahana looks at the economics behind drug operations. The value of a large consignment of drugs quickly spirals when you start doing the maths, as Detective Superintendent Greg Williams, head of Police's National Organised Crime Group, explains. Asked about the 200kg of meth that Joshua Auina-Anae thought he was picking up from a commercial unit in Hobsonville in November 2023, Williams said you're looking at 'about $130,000 a kilo... that's a wholesale price'. Inside police's fake meth bust that fooled a Kiwi builder - watch on TVNZ+ A quick calculation therefore gives the total price for the shipment, which unbeknown to Auina-Anae had already been intercepted in China, at $26 million. ADVERTISEMENT But Williams isn't finished. "Then it's cut down into ounce prices, which sell for around $5000 an ounce. And then by the time it hits the street, it's at gram prices which are sitting around $480 to $380 sort of price. Now you're in the range of $76 million to $96 million." Methamphetamine was swapped out with a dummy substance. (Source: NZ Police) So what did Auina-Anae stand to gain for going to collect the haul? He'd never been in trouble before and worked in construction – in fact, he ran his own business. But he found himself caught up in an international law enforcement effort involving a tip-off from China's Anti-Smuggling Bureau. 'Cleanskin', 'catcher' or 'door' This led to the meth he was expecting to collect being switched out for a dummy substance. And police and Customs were waiting for him when he went to pick it up in his role as, to use the various terms used, a "cleanskin", "catcher" or "door". ADVERTISEMENT The terms all point in roughly the same direction. Williams said: "The reality is that transnational crime sitting outside the country, and the organised crime groups sitting inside the country, often refer to 'doors' – doors into the country. Detective Superintendent Greg Williams says the incentive comes down to greed. (Source: 1News) "So often, a door is, 'I've corrupted someone within the system at the border or someone prepared to take this risk, someone without any criminal history who's prepared to be the front person or the 'catcher', and then they organise the shipment into the country." In the Auckland District Court yesterday, Judge Evangelos Thomas heard that Auina-Anae was at the bottom of the chain. A police DVD recording of the offender's statement "advised that he received orders to do the job from an unknown person". Auina-Anae's lawyer Jasper Rhodes said his client was expecting payment. "And he's been candid about that,' he said. ADVERTISEMENT The granite slabs the "methamphetamine" was imported in. (Source: NZ Police) However, he said the amount would be 'absolutely disproportionate to the profits that the leading offenders were expecting to earn". He wouldn't be expecting figures in the millions. Williams said he knew of a "catcher" in Christchurch pulling cocaine out of a container who received about $40,000 to take the risk. "And it comes down to that greed aspect to this, right? And that's the chilling bit here. These groups cannot operate unless they corrupt people in and around the border or people like this prepared to do it." Auina-Anae walked through a different door yesterday and as he begins his time behind bars, he can reflect on whether the amount on offer was worth the risk. Watch more on this story on TVNZ+


Scoop
5 hours ago
- Scoop
Thousands Of Leaked NZ Govt And Health Agency Credentials On Dark Web
Thousands of leaked employee credentials from government departments, local banks and healthcare organisations are among more than 150 million compromised records tied to New Zealand accessible on the dark web, according to new research. The nWebbed NZ Cybersecurity Study, which analysed over 30 billion credentials available for sale on the dark web - a hidden part of the internet used as an illegal marketplace by criminals, has revealed an alarming level of vulnerability among Kiwi businesses, with compromised credentials linked to more than 198,000 New Zealand companies and entities. In addition, the usernames and passwords of more than 18,000 NZ Government workers, 3,200 banking staff and 2,000 healthcare organisation accounts with privileged access to sensitive information were also found in leaked databases on the dark web. The study analysed global breach records and cross-referenced them with local email domains to identify exposure. Julian Wendt, founder of Kiwi tech start-up nWebbed Intelligence, which has built the world's fastest-growing database of dark web credentials, says the findings show New Zealand organisations are underestimating the scale and frequency of cyber risk. He says an urgent review of cybersecurity protocols, credential management systems and third-party access controls across the country's sensitive institutions and corporations is needed to secure exposed systems and protect the privacy of consumers whose personal data is at risk. 'We are seeing widespread exposure of compromised credentials linked to core parts of the New Zealand economy, including health providers, government agencies, banks and large-scale businesses. 'These are trusted institutions that Kiwis interact with every day, and they are real emails and passwords sitting in the wild. They're searchable, for sale and vulnerable to exploitation,' he says. Wendt says many breaches are going undetected for months or even years, and the data is still circulating. 'It's not that someone was hacked once and that's it. In many cases, credentials from five or six separate breaches are still sitting out there, waiting to be exploited,' he says. Wendt says New Zealand urgently needs to shift away from reactive cybersecurity practices. 'You can't wait for the ransom note to start caring about where your data ends up. We need a preventative model, and that starts with visibility. 'Most organisations are watching their perimeter, not what's already leaked. But if your staff credentials are out there, especially admin or technical roles, then attackers already have the keys,' he says. Wendt says their database is growing by 2 billion credentials each month as the global rate of breaches accelerates. He says in response to the volume of sensitive credentials available online, nWebbed has launched a new threat monitoring platform that uses artificial intelligence to help organisations close critical security gaps in real time, enabling businesses to act before data is weaponised. Wendt says the time between a data leak and active exploitation is narrowing, particularly for high-value targets. 'In some cases, we've seen attackers move within minutes of credentials appearing online. They're using automated tools to scan for executive logins, technical roles or access to critical systems. 'What starts as a single leaked password can escalate into a live intrusion before an organisation even realises there's been a breach,' he says. Wendt says part of the problem is cultural. 'There's still this assumption in New Zealand that cybercrime is something that happens to big overseas companies. But in reality, our companies are being targeted every day, often because we're seen as a soft entry point into larger international networks. 'Nearly half of the Fortune 500 companies worldwide have exposed employee credentials available online, and Kiwi companies are facing similar threats. Compromised credentials can be used to access corporate networks, bypass multi-factor authentication or launch phishing attacks,' he says. Wendt says too many companies rely on outdated risk assessments and miss critical external vulnerabilities. 'Even organisations with good internal cybersecurity practices are often shocked to discover what's floating around publicly. That includes old passwords, unpatched web portals or documents they thought were private. It's not about blaming anyone, it's about visibility,' he says. Wendt says the next step is to raise awareness and get more Kiwi companies treating external digital hygiene as seriously as they do internal firewalls. 'Most breaches happen because someone didn't know their login details were already out there. This is a solvable problem if you're willing to look,' he says.