Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124

Wired investigation Based on DHS records this week Revealing the identities of paramilitary Border Patrol agents who repeatedly used force against civilians during Operation Midway Blitz in Chicago last fall. WIRED found that several agents have turned up in similar operations in other states across the United States.
CBP may want to remember to protect its facilities’ sensitive information. Using basic Google searches, WIRED discovered flashcards created by users of the online learning platform Quizlet Contains gate codes for CBP facilities And more.
In a rare move, Apple this week Released “backported” patches for iOS 18 To protect the millions of people who are still using older operating systems than… DarkSword hacking technique That have been found in use in the wild. DarkSword, which was discovered in March, allows attackers to infect iPhones that simply visit a loaded website with takeover tools embedded within it. Apple initially pushed users to update to the current version of its operating system, iOS 26, but eventually released iOS 18 patches after DarkSword continued to spread.
The US-Israeli war with Iran entered its second month this week, with Iran threatening to do so Launched attacks against more than a dozen American companiesIncluding technology giants such as Apple, Google and Microsoft, which have offices and data centers in the Gulf region. The deadly conflict, with no clear end in sight, continues to wreak havoc on the global economy Ship crews are still stuck in the Strait of Hormuza major trade route. At the same time, some began to wonder what could happen If US strikes cause real damage to Iranian nuclear facilities.
And that’s not all! Every week we round up security and privacy news that we haven’t covered in depth ourselves. Click on the titles to read the full stories. And stay safe out there.
Earlier this week, a security researcher noted that Anthropic had mistakenly released the source code for its popular encryption tool, Claude Code, to the public. Immediately, people started republishing the code on the developer platform GitHub. But beware if you want to try downloading some of those repositories yourself: BleepingComputer reports that some posters are actually hackers who have slipped in a piece of infostealer Malware in lines of code.
Anthropic, for its part, attempts to remove leaked copies (whether or not they’re tainted with malware) by issuing copyright takedown notices. The Wall Street Journal I mentioned The company initially tried to remove more than 8,000 repositories on GitHub but later reduced that to 96 versions and modifications.
This isn’t the first time hackers have taken advantage of interest in Claude Code, which requires users who may not be familiar with their computer terminal to copy and paste installation commands from the website. In March 404 Media I mentioned Sponsored advertising on Google led to sites that were masquerading as official installation guides for Claude Code, which directed users to run a command that would actually download the malware.
The FBI has officially classified the recent cyber breach of one of its surveillance collection systems as a “major incident” under the law. Visma– A legal designation reserved for violations that are believed to pose serious risks to national security. determination, He informed Congress earlier this weekIt is understood that this is the first time since at least 2020 that the office has announced a major incident on its own systems. Politico reported, citing two senior officials in the Trump administration, whose names were not mentioned, that China is believed to be behind this hack. If the hack is confirmed, it could represent a major counterintelligence failure for the FBI.
The FBI said it detected “suspicious activity” on its networks In February. In a notice to Congress on March 4, reviewed by Politico, the bureau said the compromised systems were unclassified and had “proceeds from legal action,” citing, for example, phone and Internet metadata collected under court orders and personal information “related to the subjects of FBI investigations.” The hackers reportedly gained access through a commercial ISP, an approach the FBI described as reflecting “sophisticated tactics.” In its only public statement, the office said it had deployed “all technical capabilities to respond.”