WIRE Investigation according to Department of Homeland Security records this week revealed the identity of the military agents of the Border Patrol who repeatedly used force against civilians during Operation Midway Blitz in Chicago last fall. Several agents, WIRED found, were seen in similar operations in other states around the US.
Customs and Border Protection may want to remember to protect the facility’s sensitive information. Using a basic Google search, WIRED discovered flashcards created by users of the online learning platform Quizlet that contains gate codes for CBP facilities and more.
In a rare move, Apple this week released “rollback” patches for iOS 18 protect the millions of people who are still using the old operating system from DarkSword hack method which was found being used in the wild. Discovered in March, DarkSword allows attackers to infect iPhones that visit a website loaded with ransomware embedded in it. Apple initially pushed users to update to the current version of its operating system, iOS 26, but eventually released iOS 18 patches after DarkSword continued to spread.
The war between the United States and Israel against Iran has entered its second month this week, with Iran threatening to do so launching attacks against more than a dozen American companiesincluding tech giants like Apple, Google, and Microsoft, which have offices and data centers in the Gulf region. The terrible conflict, which has no clear end, continues to destroy the world economy as the ship’s crew is still stuck in the Strait of Hormuzmain trade route. Meanwhile, others are beginning to wonder what could happen if US strikes cause real damage to Iran’s nuclear facilities.
And not that all! Each week, we round up security and privacy news that we didn’t cover in depth ourselves. Click on the headlines to read the full story. And stay safe out there.
Earlier this week, a security researcher reported that Anthropic made the source code for its popular encryption tool, Claude Code, public. Immediately, people started reposting the code on the GitHub developer forum. But beware if you want to try downloading some of those repos yourself: BleepingComputer reports that some of the posters are hackers who have pasted a piece of infostealer malware on lines of code.
Anthropic, for its part, has been trying to get rid of leaked copies (malware-laden or not) by issuing copyright takedown notices. The Wall Street Journal information that the company initially tried to remove more than 8,000 repositories from GitHub but later reduced it to 96 repositories with fixes.
This isn’t the first time hackers have used Claude’s code, which requires users who may not be familiar with their computer’s operating system to copy and paste installation commands from websites. In March, 404 Media information which sponsored ads on Google led to websites posing as official Code Claude installation guides, which directed users to execute a command that would actually download malware.
The FBI officially classified a recent cyber attack on one of its intelligence collection systems as a “major incident” under FISMA-a legal designation reserved for violations believed to pose a serious threat to national security. That decision, reported to Congress earlier this weekit is understood that it is the first time since at least 2020 that the office has announced a major event on its own systems. Politico, citing two unnamed senior Trump administration officials, reported that China is believed to be behind the attack. If confirmed, the breach could signal an intelligence failure for the FBI.
The FBI said it detected “suspicious activity” on its networks in February. In a notice to Congress on March 4, reviewed by Politico, the bureau said the affected systems were not classified and were being held “back from legal process,” citing, as examples, phone and Internet metadata collected under court orders and personal information “pertaining to FBI investigative subjects.” The hackers reportedly gained access through a commercial Internet service provider, a technique the FBI characterized as “sophisticated techniques.” In its only public statement, the office said it had dispatched “all technical capabilities to respond.”





