Tech
SSA Whistleblower’s Resignation Email Mysteriously Disappeared From Inboxes
On Friday, the Social Security Administration’s chief data officer, Chuck Borges, sent an email to agency staff claiming that he had been forcibly removed from his position after filing a whistleblower complaint this week accusing the agency of mishandling sensitive agency data. Minutes after the email went out, it disappeared from employee inboxes, two SSA sources tell WIRED.
“I am regretfully and involuntarily leaving my position at the Social Security Administration (SSA),” Borges wrote in the resignation letter to staff obtained by WIRED. “This involuntary resignation is the result of SSA’s actions against me, which make my duties impossible to perform legally and ethically, have caused me serious attendant mental, physical, and emotional distress, and constitute a constructive discharge.”
Less than 30 minutes after staffers received the email, it mysteriously disappeared from employee inboxes, the SSA sources tell WIRED. It is not clear whether the email had been restored after it was made unavailable, nor was the reason for the email’s disappearance immediately clear. One SSA staffer speculates that it was removed because it was critical of the agency.
“It certainly didn’t paint CIO leadership in a favorable light,” one SSA source says, referring to the SSA’s chief information officer.
Under the Federal Records Act of 1950, US agencies are typically required by law to maintain internal records, including emails.
Independent journalist Marisa Kabas was first to report on Borges’ resignation and his email’s disappearance in posts on Bluesky.
Neither Borges nor SSA immediately responded to requests for comment.
The “involuntary resignation” comes days after Borges filed a formal whistleblower complaint to the US Office of Special Counsel accusing the Department of Government Efficiency (DOGE) of wrongfully uploading SSA data, which included highly sensitive information on millions of people with Social Security numbers, to an unsecure cloud server. Borges alleges that uploading “live” SSA data to a cloud server outside of agency protocols is illegal and could put the data at risk of being hacked or leaked.
“Recently, I have been made aware of several projects and incidents which may constitute violations of federal statutes or regulations, involve the potential safety and security of high value data assets in the cloud, possibly provided unauthorized or inappropriate access to agency enterprise data storage solutions, and may involve unauthorized data exchange with other agencies,” Borges wrote in his Friday letter.
In a statement to The New York Times on Tuesday, SSA spokesperson Nick Perrine defended the agency’s data-security practices and claimed that the data Borges’ complaint references is “walled off from the internet.”
“SSA stores all personal data in secure environments that have robust safeguards in place to protect vital information,” Perrine said. “The data referenced in the complaint is stored in a long-standing environment used by SSA and walled off from the internet. High-level career SSA officials have administrative access to this system with oversight by SSA’s information security team.”
Borges’ whistleblower complaint included documents showing that DOGE affiliate John Solly, working under the SSA, asked a career agency employee to copy data from Numident, a master SSA database including a lifelong record of all SSN holders, to a “virtual private cloud,” identified in the complaint as an Amazon Web Services server controlled by SSA. Edward “Big Balls” Coristine was also involved with the project, according to the complaint.
“Mr. Borges’ disclosures involve wrongdoing including apparent systemic data security violations, uninhibited administrative access to highly sensitive production environments, and potential violations of internal SSA security protocols and federal privacy laws by DOGE personnel Edward Coristine, Aram Moghaddassi, John Solly, and Michael Russo,” the complaint reads. “These actions constitute violations of laws, rules, and regulations, abuse of authority, gross mismanagement, and creation of a substantial and specific threat to public health and safety.”
Neither Coristine, Moghaddassi, Solly, nor Russo immediately responded to WIRED’s request for comment.
Tech
A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals
Google notes that Apple patched vulnerabilities used by Coruna in the latest versions of its mobile operating system, iOS 26, so its exploitation techniques are only confirmed to work against iOS 13 through 17.2.1. It targets vulnerabilities in Apple’s Webkit framework for browsers, so Safari users on those older versions of iOS would be vulnerable, but there’s no confirmed techniques in the toolkit for targeting Chrome users. Google also notes that Coruna checks if an iOS devices has Apple’s most stringent security setting, known as Lockdown Mode, enabled, and doesn’t attempt to hack it if so.
Despite those limitations, iVerify says Coruna likely infected tens of thousands of phones. The company consulted with a partner that has access to network traffic and counted visits to a command-and-control server for the cybercriminal version of Coruna infecting Chinese-language websites. The volume of those connections suggest, iVerify says, that roughly 42,000devices may have already been hacked with the toolkit in the for-profit campaign alone.
Just how many other victims Coruna may have hit, including Ukrainians who visited websites infected with the code by the suspected Russian espionage operation, remains unclear. Google declined to comment beyond its published report. Apple did not immediately provide comment on Google or iVerify’s findings.
In iVerify’s analysis of the cybercriminal version of Coruna—it didn’t have access to any of the earlier versions—the company found that the code appeared to have been altered to plant malware on target devices designed to drain cryptocurrency from crypto wallets as well as steal photos and, in some cases, emails. Those additions, however, were “poorly written” compared to the underlying Coruna toolkit, according to iVerify chief product officer Spencer Parker, which he found to be impressively polished and modular.
“My god, these things are very professionally written,” Parker says of the exploits included in Coruna, suggesting that the cruder malware was added by the cybercriminals who later obtained that code.
As for the clues that suggest Coruna’s origins as a US government toolkit, iVerify’s Cole notes that it’s possible that Coruna’s code overlap with the Operation Triangulation code that Russia pinned on US hackers could be based on Triangulation’s components being picked up and repurposed after they were discovered. But Cole argues that’s unlikely. Many components of Coruna have never been seen before, he points out, and the whole toolkit appears to have been created by a “single author,” as he puts it.
“The framework holds together very well,” says Cole, who previously worked at the NSA, but notes that he’s been out of the government for more than a decade and isn’t basing any findings on his own outdated knowledge of US hacking tools. “It looks like it was written as a whole. It doesn’t look like it was pieced together.”
If Coruna is, in fact, a US hacking toolkit gone rogue, just how it got into foreign and criminal hands remains a mystery. But Cole points to the industry of brokers that may pay tens of millions of dollars for zero-day hacking techniques that they can resell for espionage, cybercrime, or cyberwar. Notably, Peter Williams, an executive of US government contractor Trenchant, was sentenced this month to seven years in prison for selling hacking tools to the Russian zero-day broker Operation Zero from 2022 to 2025. Williams’ sentencing memo notes that Trenchant sold hacking tools to the US intelligence community as well as others in the “Five Eyes” group of English-speaking governments—the US, UK, Australia, Canada and New Zealand—though it’s not clear what specific tools he sold or what devices they targeted.
“These zero-day and exploit brokers tend to be unscrupulous,” says Cole. “They sell to the highest bidder and they double dip. Many don’t have exclusivity arrangements. That’s very likely what happened here.”
“One of these tools ended up in the hands of a non-Western exploit broker, and they sold it to whoever was willing to pay,” Cole concludes. “The genie is out of the bottle.”
Tech
Apple’s New MacBook Air and MacBook Pro Have New Chips, More Storage, and Higher Prices
Alongside its price-friendly iPhone 17e and M4 iPad Air yesterday, Apple just announced a few updates to the MacBook Pro, MacBook Air, and its rarely-refreshed desktop display line.
The MacBook Air has now been updated to the latest M5 chip. It’s a fairly modest upgrade, but it brings it up to speed with Apple’s latest processor that debuted in the MacBook Pro last fall. There are no other major hardware changes—it now comes with 512 GB of starting storage with “faster SSD technology”—but you can still get the Air in either a 13- or 15-inch screen size.
This laptop also features Apple’s N1 wireless chip, which includes Wi-Fi 7 and Bluetooth 6 for the latest connectivity standards. It still comes with the standard 16 GB of RAM, and sadly, there’s a $100 price bump to account for the extra storage. It now starts at $1,099 for the 13-inch model and $1,299 for the 15-inch model. Apple says you can preorder it tomorrow, with sales kicking off on March 11.
More interestingly, Apple is expanding the M5 chip series with the M5 Pro and M5 Max, now available in the 14-inch and 16-inch MacBook Pro. Like previous generations of Apple silicon, the “Pro” and “Max” configurations add significantly improved multi-core CPU and graphics performance.
The M5 Pro and M5 Max can be configured with up to 18 CPU cores (12 performance cores and 6 “super” cores), up from 16 on the M4 Max. The M5 Pro can scale up to 20 GPU cores, while the M5 Max extends up to 40 GPU cores. Thanks to higher memory bandwidth, more efficient Neural Engine, and improved GPU architecture, Apple says the M5 Pro and M5 Max have “over 4X the peak CPU compute for AI” compared to the last generation and offer 20 percent better GPU performance.
The new MacBook Pros don’t include any other hardware changes; things have stayed largely the same since 2021—same port selection, Mini-LED display, speakers, and webcam. Even the claimed 24-hour battery life hasn’t changed from the M4 models, which came out in late 2024. Interestingly, as recently as last week, Bloomberg reported that Apple plans to launch a more significant update to the MacBook Pro later this fall, which will reportedly debut the M6 chip, an OLED touchscreen, and a thinner chassis.
Like the MacBook Air, all versions of the M5 Pro or M5 Max MacBook Pros come with twice the storage and a slightly higher starting price. Coming with 1 TB, the 14-inch M5 Pro now starts at $2,199, and the 16-inch model at $2,699. That’s $200 more than last year’s machines. Meanwhile, M5 Max prices start at $3,599.
Tech
National Grid, Nebius and Emerald hail datacentre power throttling | Computer Weekly
National Grid has carried out the first trial of flexible electricity usage by a UK datacentre, in conjunction with operator Nebius. The trial used artificial intelligence (AI)-powered datacentre management software from Emerald AI’s software on a bank of 96 Nvidia Blackwell Ultra high-performance graphics processing units (GPUs) at a Nebius datacentre near London.
Over five days in December 2025, more than 200 real-time simulated “grid events” were sent to the site to test the Emerald software’s ability to dynamically adjust the datacentre’s power consumption.
Emerald AI’s platform was able to adjust power use to the requested level and cut demand by up to 40% while critical workloads ran as normal.
Key results included successfully reacting to spikes in demand during half time at football matches, followed by load-reduction requests for up to 10 hours that demonstrated an ability to help the grid navigate periods of low wind or extreme heat, and simulated a system stress event that saw it shed 30% of load in 30 seconds to help maintain grid resilience.
According to the partners involved in the trial, such capabilities could enable AI datacentres to add more than 2GW of capacity back to the grid when needed.
The aim is that AI datacentres can avoid being simply a source of electricity constraint to being more controllable in relation to the electricity grid, by managing peaks, making better use of existing infrastructure, and supporting the connection of different sources of energy to the grid.
“Most electric networks, most electric power systems, operate with probably 30% of capacity in place a year; there’s lots of capacity in the system, it’s a small number of hours a year when we’re at peak,” said Steve Smith, president of National Grid Partners, speaking at the Economist Impact Sustainability Week event in London.
“So, the trick is how you do it,” said Smith. “Because if you can throw more electrons at a fixed-cost system, you don’t need to put more infrastructure in, and the rates come down for everyone else.
“If you’re doing a small number of hours and you’re stretched, if we say, can you actually moderate your load when we need you to, then we don’t need to build lots more capacity.”
Also speaking at the Sustainability Week event, Varun Sivaram, chief executive of Emerald AI, said the trial showed that AI hardware at the Nebius datacentre could consume energy flexibly at a moment’s notice.
“When we got the signal in the middle of the night, we were able to reduce power within 30 seconds by over a third,” said Sivaram. “That’s also going to be the case with renewable energy, when there’s low wind, for eight hours, and the AI factory can reduce its consumption in such a way that we protect the critical workloads that run at 100% throughput.”
Sivaram explained that there are three ways to achieve flexibility of power consumption for AI workloads. The first is to slow some down or pause them. “Maybe a fine-tuning model run that doesn’t need to finish right this second, but it can be delayed by an hour,” he suggested.
The second way, he said, is by moving AI workloads. “You expect your answer from AI pretty soon, but we may be able to move it, as we did with a move between two different Oracle datacentres at the rate of 10 milliseconds of latency. There is a little bit of a latency penalty, but not relevant for that workload,” said Sivaram.
The third way, he said, is to monitor the datacentre to achieve flexibility. Here, Emerald operates as software intelligence to operate AI workloads – that can include by tagging them as different priorities – in an optimal way to give the grid what it needs while protecting the integrity of the workloads for the user.
-
Politics6 days agoUS arrests ex-Air Force pilot for ‘training’ Chinese military
-
Politics6 days agoWhat are Iran’s ballistic missile capabilities?
-
Business7 days agoHouseholds set for lower energy bills amid price cap shake-up
-
Sports1 week agoTop 50 USMNT players of 2026, ranked by club form: USMNT Player Performance Index returns
-
Sports6 days agoSri Lanka’s Shanaka says constant criticism has affected players’ mental health
-
Business7 days agoLucid widely misses earnings expectations, forecasts continued EV growth in 2026
-
Fashion5 days agoPolicy easing drives Argentina’s garment import surge in 2025
-
Business5 days agoAttock Cement’s acquisition approved | The Express Tribune
