
An investigation by WIRED utilizing records from the Department of Homeland Security this week uncovered the identities of paramilitary Border Patrol agents who often employed force against civilians during Operation Midway Blitz in Chicago last autumn. Several of the agents, according to WIRED, also participated in similar operations in various states across the US.
Customs and Border Protection might want to consider safeguarding its sensitive facility information. Through simple Google searches, WIRED found flashcards created by users on the online learning site Quizlet that included gate codes for CBP facilities and more.
In an unusual decision, Apple this week issued “backported” patches for iOS 18 to safeguard millions of users still utilizing the older operating system from the DarkSword hacking method that was discovered being used in the wild. Found in March, DarkSword enables attackers to compromise iPhones that simply visit a website containing the takeover tools. Apple first encouraged users to upgrade to the latest version of its OS, iOS 26, but eventually released the iOS 18 patches as DarkSword continued to proliferate.
The US-Israel conflict with Iran entered its second month this week, with Iran issuing threats to initiate attacks on over a dozen US companies, including major tech firms like Apple, Google, and Microsoft, which operate offices and data centers in the Gulf region. The perilous conflict, with no clear resolution in sight, continues to devastate the global economy as shipping crews remain stuck in the Strait of Hormuz, a vital trade passage. Meanwhile, some are starting to ponder what might occur if US strikes inflict significant damage on Iran’s nuclear sites.
And that’s not everything! Each week, we compile the security and privacy updates we didn’t delve into more comprehensively. Click on the headlines to read the complete stories. And stay safe out there.
Earlier this week, a security expert pointed out that Anthropic inadvertently made the source code for its well-known vibe-coding tool, Claude Code, public. Instantly, individuals began sharing the code on the developer platform GitHub. But be cautious if you wish to download some of those repositories: BleepingComputer warns that some of the individuals posting are actually hackers who have embedded a piece of infostealer malware within the lines of code.
Anthropic, for its part, has been actively working to eliminate copies of the leak (malware-laden or otherwise) by sending out copyright takedown requests. The Wall Street Journal <a href="https://www.wsj.com/tech/ai/anthropic-races-to-contain-leak-of-code-behind-claude-ai-agent-4bc5acc7?gaa_at=eafs&gaa_n=AWEtsqe0YqHxbezGhAXCQMkTM704xLIzPtDKH78qcGbyQlXZjxZuAmm8TxwV4QxfOvM%3D&gaa_ts=69



