Sources told Axios that the agency was among the roughly 40 organizations granted access. This, despite the Pentagon arguing that Anthropic is a threat to national security. The NSA has reportedly been using it primarily to identify vulnerabilities in its own network, but considering its track record, it’s understandable if you’re wary.
Security
Cybersecurity is the rickety scaffolding supporting everything you do online. For every new feature or app, there are a thousand different ways it can break – and a hundred of those can be exploited by criminals for data breaches, identity theft, or outright cyber heists. Staying ahead of those exploits is a full-time job, and one of the most lucrative and sought-after skills in the tech industry. All too often, it’s something up-and-coming companies decide to skip out on, only to pay the price later on.


A new Wired investigation details the lengths Jim Dolan, owner of the New York Knicks and venues like MSG and the Las Vegas Sphere, goes to to spy on perceived enemies, fans, and critics. The vast surveillance apparatus includes dossiers, social media posts, and facial recognition tech.
Last year I wrote about one fan who believes a t-shirt design he had made resulted in a lifetime ban from Dolan’s venues — and that facial recognition picked him out of the crowd.
Despite Anthropic’s ongoing battle with the Pentagon, Bloomberg reports that the White House Office of Management and Budget’s CIO told government officials that it is preparing for their agencies to use Anthropic’s cybersecurity-focused AI model.


When hackers got access to an account belonging to the maintainer of Axios, they inserted a script that granted remote access to users’ Windows, macOS, and Linux devices. This malicious version potentially compromised ChatGPT’s macOS apps, so OpenAI is issuing an update and new certificates to mitigate any risks.
Starting this week, enterprise users will be able to send encrypted messages from Gmail’s Android and iOS apps if their organization has the feature enabled. Gmail’s version of E2EE, which uses client-side encryption, has been available since last year, but is still limited to users with enterprise accounts.
[Google Workspace Updates Blog]
Google is officially rolling out Device Bound Session Credentials (DBSC) to Windows users in Chrome 146. The new security feature cryptographically binds your login cookies to your device’s hardware. So, even if malware steals your browser cookies, they should be useless to remote hackers. MacOS support is coming soon.
The AI-powered compliance startup is no longer listed on YC’s directory after an anonymous report alleged Delve “fakes compliance” and leaked audit reports, as reported by TechCrunch. Delve responded by claiming a bad actor “maliciously exfiltrated data” as part of a “coordinated, targeted cyberattack.”
Meta has paused work with the company, Mercor (which The Verge has profiled), while OpenAI is investigating the security incident, Wired reports.
The update adds protections against DarkSword, a security vulnerability that can steal information from your phone if you visit an infected link. Apple previously released iOS 18.7.7 to the iPhone XS and XR, but if you have a newer phone and don’t want to download iOS 26, now you can install the patch without worrying about getting Liquid Glass.
A disclosure spotted by TechCrunch says the incident prompted the toymaker to activate “its security response protocols.” Hasbro says it’s currently working to determine the impact of the breach, but it will continue to “take orders, ship product and conduct other key operations.”
iOS 26 devices are already protected against the hacking tool that targets iPhones when visiting malicious links, and today Apple is pushing out a new security update for older, vulnerable versions of iOS. That means iOS 18 users can protect their phones and avoid the Liquid Glass design update.
A hacker took over an account belonging to the lead maintainer of the JavaScript library, Axios, which is used to handle HTTP requests, as reported by Cybernews. Security researchers found that versions 1.14.1 and 0.30.4 contained the script for a remote access trojan capable of giving hackers access to a user’s Windows, macOS, or Linux device.
If you buy something from a Verge link, Vox Media may earn a commission. See our ethics statement.
The bundle, Proton Workspace, includes a new end-to-end encrypted video chat service called Proton Meet. But even encryption can’t guarantee the company will keep your payment info private from government requests.
According to “I Decompiled the White House’s New App,” the Android version has some odd choices for a government app that mostly shows content from the White House website.
That includes enabling location tracking and other monitoring via OneSignal’s analytics (which the company says are opt-in at the OS level), JavaScript loaded from some guy’s GitHub, an injected script to hide things like consent dialogs on pages users open in the app, and other hooks to non-government third-party services.
[Thereallo]

Why Todd McKinnon thinks it’s ‘naive’ not to prepare for the SaaSpocalypse
An Iran-linked group claimed responsibility for the breach and posted documents stolen from Patel’s inbox online, according to Reuters.
The DOJ has reportedly confirmed the breach, with a preliminary review by CNN finding emails from around 2011 to 2022 that “appear to include personal, business and travel correspondence that Patel had with various contacts.”
A newer version of the DarkSword exploit that targets devices running iOS 18.4 to 18.6.2 has appeared on GitHub. About 34 percent of iPhone and 43 percent of iPad users are still running iOS 18 or earlier, according to Apple, which issued an emergency patch on March 11th. Update your devices, folks!
Some Lloyds Bank, Halifax, and Bank of Scotland app users reported they were briefly able to view charges and payments made by other people on their accounts. Lloyds Banking Group, which owns all three banks, says the issue was “quickly identified and resolved,” and that it’s “reviewing what happened to ensure this cannot occur again.”


”The hacker expressed disgust at the presence of child abuse images on the device and left a message threatening to turn its owner over to the FBI, the person said.” Apparently they didn’t realize they were on an FBI server.
While end-to-end encryption can keep an account’s data private and hidden even from a service provider, the name of who paid for the account and other metadata is harder to hide.
LeakBase had more than 142,000 members and a database containing “hundreds of millions” of stolen account credentials, according to the DOJ. US law enforcement worked with Europol to seize LeakBase’s data and take over two of its domains.


Home security company ADT has acquired Origin Wireless, which can use Wi-Fi signals to detect where people and objects are. An appropriately named commenter recognizes there might be some cause for concern.
PerpetuallySkeptical:
I’m sure that paying a company to see exactly where I am in my house at all times won’t be used against me in the future.
Get the day’s best comment and more in my free newsletter, The Verge Daily.
Lockdown Mode is “not necessary” for most people and “tightly constrains how ChatGPT can interact with external systems to reduce the risk of prompt injection–based data exfiltration,” according to OpenAI.
Yes, Wyze has had its own issues, but this video is pretty funny.


Most Popular
- Anthropic’s most dangerous AI model just fell into the wrong hands
- Sony’s PlayStation 5 is $200 off for the first time since December
- The unraveling of Dan Crenshaw
- Framework is building a better couch keyboard because everyone hates the Logitech one
- Elon Musk admits that millions of Tesla vehicles won’t get unsupervised FSD























