A WIRED investigation based connected Department of Homeland Security records this week revealed the identities of paramilitary Border Patrol agents who often utilized unit against civilians during Operation Midway Blitz successful Chicago past fall. Several of the agents, WIRED found, appeared successful akin operations successful different states astir the US.
Customs and Border Protection whitethorn privation to retrieve to support its delicate installation information. Using basal Google searches, WIRED discovered flashcards made by users of the online learning level Quizlet that contained gross codes to CBP facilities and more.
In a uncommon move, Apple this week released “backported” patches for iOS 18 to support millions of radical inactive utilizing the older operating strategy from the DarkSword hacking method that was recovered successful usage successful the wild. Discovered successful March, DarkSword allows attackers to infect iPhones that simply sojourn a website loaded with the takeover tools embedded successful it. Apple initially pushed users to update to the existent mentation of its operating system, iOS 26, but yet issued the iOS 18 patches aft DarkSword continued to spread.
The US-Israel warfare with Iran careened into its 2nd period this week, with Iran threatening to motorboat attacks against much than a twelve US companies, including tech giants similar Apple, Google, and Microsoft, which person offices and information centers successful the Gulf region. The deadly conflict, which has nary wide extremity successful sight, continues to wreak havoc connected the planetary system arsenic shipping crews stay stranded successful the Strait of Hormuz, a cardinal commercialized route. Meanwhile, immoderate are opening to wonderment what could hap if US strikes origin existent harm to Iran’s atomic facilities.
And that’s not all! Each week, we circular up the information and privateness quality we didn’t screen successful extent ourselves. Click the headlines to work the afloat stories. And enactment harmless retired there.
Hackers Are Posting the Claude Code Leak With Bonus Malware
Earlier this week, a information researcher flagged that Anthropic accidentally made the root codification for its fashionable vibe-coding tool, Claude Code, public. Immediately, radical began reposting the codification connected the developer level GitHub. But beware if you privation to effort to download immoderate of those repos yourself: BleepingComputer reports that immoderate of the posters are really hackers who person tucked a portion of infostealer malware into the lines of code.
Anthropic, for its part, has been trying to region copies of the leak (malware-ridden oregon not) by issuing copyright takedown notices. The Wall Street Journal reported that the institution initially tried to region much than 8,000 repositories connected GitHub but aboriginal narrowed that down to 96 copies and adaptations.
This isn't the archetypal clip that hackers person capitalized connected involvement successful Claude Code, which requires users who mightiness not beryllium arsenic acquainted with their computer's terminal to transcript and paste instal commands from a website. In March, 404 Media reported that sponsored ads connected Google led to sites that were masquerading arsenic authoritative Claude Code installation guides, which directed users to tally a bid that would really download malware.
Hack of FBI Wiretap Tools Are Officially a National Security Risk
The FBI formally classified a caller cyber intrusion into 1 of its surveillance postulation systems arsenic a “major incident” nether FISMA—a ineligible designation reserved for breaches believed to airs superior risks to nationalist security. The determination, reported to Congress earlier this week, is understood to beryllium the archetypal clip since astatine slightest 2020 that the bureau has declared a large incidental connected its ain systems. Politico, citing 2 unnamed elder Trump medication officials, reported that China is believed to beryllium down the intrusion. If confirmed, the breach could people a important counterintelligence nonaccomplishment for the FBI.
The FBI said it detected “suspicious activities” connected its networks successful February. In a announcement to Congress connected March 4, reviewed by Politico, the bureau said the compromised systems were unclassified and held “returns from ineligible process,” citing, arsenic examples, telephone and net metadata collected nether tribunal orders and idiosyncratic accusation “pertaining to subjects of FBI investigations.” The intruders reportedly gained entree done a commercialized net work provider, an attack the FBI characterized arsenic reflecting “sophisticated tactics.” In its lone nationalist statement, the bureau said it had deployed “all method capabilities to respond.”










English (CA) ·
English (US) ·
Spanish (MX) ·