New hack poses biggest iPhone threat in 19 years: What you can do



Apple has had a hard time lately with critical exploits plaguing iPhones all around the world. In mid-February, Google’s Threat Analysis Group discovered a critical zero-day vulnerability in Apple’s iOS software that gave hackers full control of a “small subset” of targeted iPhones. This month, reports revealed that an entire exploit tool kit has been successfully used by hackers in Russia and China. The worst part is that mounting evidence suggests the kit came from the United States, possibly even from our very own government.

Chock-full of vulnerabilities

According to Google’s full report, the exploit tool kit — dubbed Coruna — consists of five exploit chains and 23 exploits in total, all targeted at iPhones running iOS 13 to iOS 17.2.1. Mobile security experts at iVerify corroborated the report, claiming that 42,000 iPhones were affected.

Are there more zero-day vulnerabilities in iOS that we don’t know about? Almost certainly yes.

An exploit chain is the path a hacker can use to bypass a device’s security controls via exploits to gain access. In other words, if your phone’s software was a map, an exploit chain is the route a driver could take through different toll areas to reach the final destination. Even one exploit chain — or route — is enough to break into a device, but the fact that five routes exist within Coruna makes it a sophisticated hacking resource unlike anything security researchers have seen on iOS.

Google notes that Coruna has already been exploited by a “customer of a surveillance company,” as well as foreign nations, namely China and Russia. More alarming than that, however, “multiple threat actors” have also gained access to exploit techniques that can be customized to leverage new and unknown vulnerabilities for future attacks.

Image credit: Google

Where did Coruna come from?

Now that Coruna is out in the open, it only makes sense to wonder where it came from. Its sophisticated nature makes it highly unlikely that an independent hacker threw it together. Instead, several pieces of evidence point toward government intervention.

For starters, the tool kit’s source materials are all written in native English, suggesting English origins. Second, two of the exploits in the chain are linked directly to Operation Triangulation, a hardware vulnerability discovered in Apple’s first-party processing chips by Russian cybersecurity company Kaspersky. Russian government officials blamed the NSA for this exploit back in 2023, but the U.S. government denied any connection.

Third, iVerify’s co-founder and COO, Rocky Cole, reportedly called Coruna’s code “superb,” going on to state, “It was elegantly written. It’s fluid and holds together very well. There were comments in the code that, as someone who’s been around the U.S. defense industrial base for years, really are reminiscent of the sort of insider jokes and insider remarks that you might see from a U.S. based coder. Certainly they were native English language speakers.”

For what it’s worth, Kaspersky recently denied that Coruna is linked to the NSA, despite the evidence outlined above. Regardless of the tool kit’s origin, researchers are unsure how it made it into the hands of foreign entities.

RELATED: Apple issues a critical software update for iPhone. Install it now!

Photo by Matt Cardy/Getty Images

Bigger signs of Apple’s compromised security

Apple’s iOS mobile platform is notoriously hard for hackers to crack, thanks to its closed nature, often frustrating U.S. criminal investigation agencies with its strong end-to-end encryption practices. The Coruna tool kit, however, changes everything. It’s the biggest collection of exploits to hit iOS since its inception in 2007. It’s also part of a growing trend that undermines Apple’s once-impenetrable software security and privacy protocols.

Just last month, Apple released iOS 26.3 to patch a critical zero-day vulnerability dubbed CVE-2026-20700. Although this remains to be a major threat to iPhone users, this exploit is not part of the Coruna tool kit. These are completely independent issues. Are there more zero-day vulnerabilities in iOS that we don’t know about? Almost certainly yes.

Tips to secure your device

That doesn’t mean there’s nothing you can do. As software vulnerabilities become more prevalent, the best way to keep your devices safe and secure is to make sure you always have the latest iOS updates downloaded and installed on your phone, tablet, and laptop.

The exploits in the Coruna tool kit that plagued iOS 13 through 17.2.1, as well as CVE-2026-20700 for iOS 26, have all been patched. If you haven’t updated your iPhone to the newest software, or if you’re not sure which version you have, check for updates by opening the Settings app. Then go to General, Software Update, and make sure you’re on one of these versions, depending on your phone’s model:

  • iOS 26.3.1 (iPhone 11 and up);
  • iOS 18.7.5 (Phone XS, XS Max, and XR);
  • iOS 16.7.14 (iPhone 8, 8 Plus, and X);
  • iOS 15.8.6 (iPhone 6s and 7); or
  • iOS 12.5.8 (iPhone 5s, 6, 6 Plus).

If you want even more protection from exploits and vulnerabilities, you can secure your private data with Apple’s Advanced Data Protection built directly into iCloud. Then for maximum protection, Apple offers Lockdown Mode, though this feature isn’t meant for everybody. Since it will ultimately restrict many of the features and functions of your device, it’s only meant for high-profile cyber-criminal targets like politicians, celebrities, and investigative journalists.

Epstein files were allegedly compromised by foreign hacker in 2023; FBI admits 'cyber incident'



The FBI Field Office in New York produced myriad documents pertaining to its criminal probe into child sex offender Jeffrey Epstein. Attorney General Pam Bondi suggested in a Feb. 17, 2025, letter to FBI Director Kash Patel that "thousands of pages of documents related to the investigation and indictment of Epstein" were stored on site there.

Some of these documents were allegedly compromised in a hack years before the Department of Justice began publishing the heavily redacted Epstein files.

Reuters' source suggested that the hack appears to have been executed by a 'cybercriminal' rather than a foreign government.

The bureau revealed in 2023 that it was investigating a hack of its computer network, which it characterized as an "isolated incident that has been contained."

Multiple sources briefed on the matter told CNN at the time that FBI officials suspected the incident involved a bureau computer system used in the investigations of images of child sexual exploitation.

Reuters, citing a source familiar with the matter and recently published DOJ documents, reported on Wednesday that the hack entailed a foreign actor's targeting of files related to the FBI's investigation of Epstein.

The hack reportedly took place after a server at the New York FBI office's Child Exploitation Forensic Lab was allegedly left exposed by Special Agent Aaron Spivack, who did not return Reuters' numerous requests for comment but has previously issued a voluminous statement on the matter.

RELATED: 'The mistake I made': Bill Gates reportedly admits to affairs with Russians, apologizes for Epstein fallout

Photo by Joe Schildhorn/Patrick McMullan via Getty Images

Among the Epstein files released by the Department of Justice in recent months is a 2024 statement from Spivack in which he addresses the allegations that he "improperly stored digital evidence at his residence"; "improperly handled, documented, and stored digital evidence and failed to secure [child sexual abuse material] within policy, resulting in a cyber intrusion"; and "exceeded the limits of his authority by contracting an outside company to develop computer software on behalf of the FBI."

Spivack — who apparently participated in the Epstein investigation — stated that the cyber "intrusion" happened on Feb. 12, 2023.

After logging into his computer to find a .txt file indicating that his network had been compromised, Spivack claimed that he ran an anti-virus sweep, which identified a potential threat. He said that he was unable, however, to remove the threat, as his "administrative privileges had been removed."

Spivack notified some of his colleagues, attempting to rectify the issue, then noticed that the main server was down, that other servers were malfunctioning, and that "the folders that contain our data was missing."

According to Spivack's timeline, he and others later noticed "strange IP activity that took place [on Feb. 12] from two IP addresses."

"The activity included combing through certain files pertaining to the Epstein investigation," stated Spivack.

It's unclear what particular files were accessed and whether they were downloaded, reported Reuters.

By 5 p.m. on Feb. 13, 2023, Spivack said, "we realized we were hacked."

The FBI reiterated that the "cyber incident" was an "isolated one" and said in a statement obtained by Reuters that "the FBI restricted access to the malicious actor and rectified the network. The investigation remains ongoing, so we do not have further comments to provide at this time."

The FBI did not immediately respond to a request for comment from Blaze News.

Reuters' source suggested:

  • that the hack appears to have been executed by a "cybercriminal" rather than a foreign government;
  • that the hacker did not appear to realize he or she had hacked a law enforcement server; and
  • that the hacker expressed revulsion at the presence of child sexual abuse images on the device and threatened to turn its owner over to the FBI.

The hacker — whom the FBI allegedly spoke to on video chat but was unable to identify or locate — may have acted alone, but Jon Lindsay, an associate professor at the Georgia Institute of Technology's School of Cybersecurity and Privacy, suggested that the hack demonstrates the files' potential intelligence value.

"Who wouldn’t be going after the Epstein files if you’re the Russians or somebody interested in kompromat?" Lindsay told Reuters. "If foreign intelligence agencies are not thinking seriously about the Epstein files as a target, then I would be shocked."

Reuters indicated it was unable to "establish the result of the bureau's internal investigation" regarding Spivack or connect with FBI agents identified in the documents as being involved in the investigation.

Spivack stressed in his 2024 statement, "I have rescued more exploited children than anyone in the NYFO and in most of the Bureau. All I wanted to do was to better the Bureau. I did not know how to do everything right, but I always did the right thing and everything I did was with good intentions. I love this job. I was not reckless."

Like Blaze News? Bypass the censors, sign up for our newsletters, and get stories like this direct to your inbox. Sign up here!

25,000 Americans apply for just 1,000 jobs at new federal Tech Force



Hot on the heels of the U.S. government's announcement of the Tech Force combing for 1,000 new recruits, 25 times that number of Americans have sent in their resumes to the cross-agency technology team.

The Tech Force, announced mid-month, urged the country's best and brightest to head to its website to apply for short-term federal employment. Over the ensuing week, that number has risen to at least 25,000, according to Scott Kupor, the director of the U.S. Office of Personnel Management.

'Tech Force will tackle the most complex and large-scale civic and defense challenges of our era.'

With a two-year government contract worth as much as $200,000, recruits will be part of an "elite group" of tech specialists hired to "accelerate artificial intelligence (AI) implementation" and solve critical tech challenges.

The unprecedented new group will primarily recruit those early in their careers, the Tech Force website explained, who specialize in engineering, AI, cybersecurity, data analytics, or project management in tech. Those brought on board can expect to implement AI programs and applications, modernize data, and provide digital service delivery at federal agencies.

"Backed by the White House, Tech Force will tackle the most complex and large-scale civic and defense challenges of our era," the outfit promised. "From administering critical financial infrastructure at the Treasury Department to advancing cutting-edge programs at the Department of Defense, and everything in between."

RELATED: BEWARE: With these new web browsers, everything on your computer can be stolen with one click

— (@)

Hires can look forward to working with agency leadership and "leading technology companies" to train and engage with senior management from partnered companies. The government openly states that once Tech Forcers are finished with their training program, they will seek employment at the partnering private-sector companies in order to demonstrate "the value of combining civil service with technical expertise."

Along with the competitive high salaries, the government program says it provides benefits like health insurance, retirement plans, and "performance-based awards."

The duties and scope of the Tech Force varied to a great degree, with the official website providing a lengthy list of federal agencies that participants can expect to be placed within. These included the Departments of War, Treasury, State, Labor, Commerce, Energy, Health and Human Services, Interior, Housing & Urban Development, Transportation, Homeland Security, and Veterans Affairs.

Other agencies like the Small Business Administration, IRS, and Office of Personnel Management were also noted.

RELATED: NO HANDS: New Japanese firm trains robots without human input

Photo by Wang Gang/VCG via Getty Images

Readers on X had mixed reactions to open recruitment, with several hoping the program would only be open to Americans and others sarcastically saying that it probably should not be filled "with Indians."

The application form goes through the USA Jobs website.

The official account for the Young Republicans of Texas said the program could be an effective way to prove that there are "plenty of qualified Americans" in the tech field.

At the same time, others worried about a dystopian future that could arise from combining advanced technology and the Treasury Department.

Like Blaze News? Bypass the censors, sign up for our newsletters, and get stories like this direct to your inbox. Sign up here!

Convicted hacker twins who landed jobs as federal contractors nabbed for allegedly deleting government databases



Muneeb and Sohaib Akhter, a pair of convicted hackers based in Alexandria, Virginia, were arrested on Wednesday over an alleged conspiracy to destroy government databases and other crimes.

After doing prison time for wire fraud and conspiring to hack into the U.S. State Department, the Akhter twins, one of whom previously served as a cybersecurity contractor with the State Department, managed to secure jobs as federal contractors — working as engineers for Opexus.

'Their actions jeopardized the security of government systems.'

Opexus, a company that handles sensitive data for most federal agencies and has received over $50 million in contracts from various agencies over the past decade, determined earlier this year that it had been compromised in February by two employees.

A Bloomberg investigation revealed in May that after one of the agencies with which Opexus was working, the Federal Deposit Insurance Corporation, flagged the twins as possible threats on account of their criminal records, the duo were fired on Feb. 18.

The company later discovered that while being fired and immediately afterward, the twins allegedly accessed sensitive documents and compromised or scrubbed dozens of databases, including those containing data from the General Services Administration and the Internal Revenue Service.

The FBI, FDIC Office of Inspector General, Department of Homeland Security Office of Inspector General, and Homeland Security Investigations investigated the case.

The brothers were indicted on Nov. 13 for allegedly working to harm Opexus and its U.S. government clients "by accessing computers without authorization, issuing commands to prevent others from modifying the databases before deletion, deleting databases, stealing information, and destroying evidence of their unlawful activities," the DOJ said in a release.

RELATED: Could hackers target your car's tires?

Muneeb Akhter. Photo by Evelyn Hockstein/Washington Post via Getty Images

According to the indictment, Muneeb Akhter allegedly deleted approximately 96 databases storing U.S. government information — including databases containing records and documents related to Freedom of Information Act matters as well as sensitive federal investigative files.

Muneeb Akhter is also accused of asking an artificial intelligence tool how they could cover their tracks after deleting a DHS database.

After he got fired from Opexus, Muneeb Akhter allegedly obtained data from the U.S. Equal Employment Opportunity Commission and is accused further of stealing copies of IRS information including federal tax information and other identifying information for at least 450 individuals.

Opexus did not respond to a request for comment from Blaze News.

"These defendants abused their positions as federal contractors to attack government databases and steal sensitive government information," said Matthew Galeotti, acting assistant attorney general at the Department of Justice's Criminal Division, in a statement. "Their actions jeopardized the security of government systems and disrupted agencies’ ability to serve the American people."

Muneeb Akhter has been charged with conspiracy to commit computer fraud and to destroy records, two counts of computer fraud, theft of federal records, and two counts of aggravated identity theft. His twin, Sohaib Akhter, was charged with conspiracy to commit computer fraud and to destroy records and computer fraud.

While Sohaib Akhter faces a maximum penalty of six years in prison, Muneeb Akhter faces a mandatory minimum penalty of two years of prison time for each aggravated identity theft count and a maximum penalty of 45 years for the other charges.

The duo pleaded guilty in 2015 to a different set of crimes.

Muneeb Akhter hacked into the website of a cosmetics company and stole thousands of customers' credit card and personal information. He and his brother used the stolen data to pay for flights, hotel stays, various goods, and attendance at professional conferences. Muneeb Akhter proceeded to hand off the stolen data to a "dark net" operator who cut him in on the profits from the sales.

The other brother, meanwhile, used his contract position at the State Department in 2015 to steal personally identifiable data belonging to various people including co-workers and a federal law enforcement agent who was investigating him.

According to the Justice Department, Sohaib Akhter later hatched a scheme to ensure perpetual access to various State Department systems and, with the help of his twin, attempted to install an electronic collection device inside a State Department office, which would have enabled the hackers to remotely steal federal data.

Years earlier, Muneeb Akhter hacked into a Maryland-based private data aggregation company that he was performing contract work for, giving his brother access to a database of federal contract information to give their technology company an upper hand when bidding for contracts and clients.

Like Blaze News? Bypass the censors, sign up for our newsletters, and get stories like this direct to your inbox. Sign up here!

It's not just you. X and vast tracts of the internet are down.



Large sections of the internet stopped working on Tuesday morning. Among the sites affected by the latest in a weeks-long series of outages were Amazon Web Services, X, League of Legends, the betting site bet365, Spotify, ChatGPT, and — ironically — the website that monitors online outages, Downdetector.

The problem appears to be the result of issues at Cloudflare, a San Francisco-headquartered tech company that effectively serves as a backbone to a myriad of sites, providing content delivery network and wide area network services, domain registration, and cybersecurity.

'We saw a spike in unusual traffic.'

At the time of writing, the Cloudflare system status page indicated that the company was working toward restoring global network services, having hours earlier acknowledged "experiencing an internal service degradation" that could leave some services "intermittently impacted."

The latest outages come just days after Cloudflare admitted an "issue which potentially impacts multiple customers" — an issue that was supposedly "resolved."

A spokesperson for Cloudflare said in a statement obtained by the Guardian, "We saw a spike in unusual traffic to one of Cloudflare’s services beginning at 11:20am [London time]. That caused some traffic passing through Cloudflare’s network to experience errors. While most traffic for most services continued to flow as normal, there were elevated errors across multiple Cloudflare services."

"We do not yet know the cause of the spike in unusual traffic," continued the spokesperson. "We are all hands on deck to make sure all traffic is served without errors. After that, we will turn our attention to investigating the cause of the unusual spike in traffic."

The company's engineers were reportedly scheduled to conduct some maintenance work on data centers in Atlanta, Los Angeles, Tahiti, and Santiago, Chile. It's unclear whether their efforts had anything to do with the technical issues.

Like Blaze News? Bypass the censors, sign up for our newsletters, and get stories like this direct to your inbox. Sign up here!

'Unprecedented': AI company documents startling discovery after thwarting 'sophisticated' cyberattack



In the middle of September, AI company and Claude developer Anthropic discovered "suspicious activity" while monitoring real-world cyberattacks that used artificial intelligence agents. Upon further investigation, however, the company came to realize that this activity was in fact a "highly sophisticated espionage campaign" and a watershed moment in cybersecurity.

AI agents weren't just providing advice to the hackers, as expected.

'The key was role-play: The human operators claimed that they were employees of legitimate cybersecurity firms.'

Anthropic's Thursday report said the AI agents were executing the cyberattacks themselves, adding that it believed that this is the "first documented case of a large-scale cyberattack executed without substantial human intervention."

RELATED: Coca-Cola doubles down on AI ads, still won't say 'Christmas'

Photo by Samuel Boivin/NurPhoto via Getty Images

The company's investigation showed that the hackers, whom the report "assess[ed] with high confidence" to be a "Chinese-sponsored group" manipulated the AI agent Claude Code to run the cyberattack.

The innovation was, of course, not simply using AI to assist in the cyberattack; the hackers directed the AI agent to run the attack with minimal human input.

The human operator tasked instances of Claude Code to operate in groups as autonomous penetration testing orchestrators and agents, with the threat actor able to leverage AI to execute 80-90% of tactical operations independently at physically impossible request rates.

In other words, the AI agent was doing the work of a full team of competent cyberattackers, but in a fraction of the time.

While this is potentially a groundbreaking moment in cybersecurity, the AI agents were not 100% autonomous. They reportedly required human verification and struggled with hallucinations such as providing publicly available information. "This AI hallucination in offensive security contexts presented challenges for the actor's operational effectiveness, requiring careful validation of all claimed results," the analysis explained.

Anthropic reported that the attack targeted roughly 30 institutions around the world but did not succeed in every case.

The targets included technology companies, financial institutions, chemical manufacturing companies, and government agencies.

Interestingly, Anthropic said the attackers were able to trick Claude through sustained "social engineering" during the initial stages of the attack: "The key was role-play: The human operators claimed that they were employees of legitimate cybersecurity firms and convinced Claude that it was being used in defensive cybersecurity testing."

The report also responded to a question that is likely on many people's minds upon learning about this development: If these AI agents are capable of executing these malicious attacks on behalf of bad actors, why do tech companies continue to develop them?

In its response, Anthropic asserted that while the AI agents are capable of major, increasingly autonomous attacks, they are also our best line of defense against said attacks.

Could hackers target your car's tires?



Hackers have found another way into your car's computer system: where the rubber meets the road.

Thanks to the TREAD Act, every new car since 2008 comes with a tire pressure monitoring system. It's what turns on that annoying low-pressure light we're all familiar with. By monitoring the the air pressure of each tire and alerting the driver when the pressure falls below a certain threshold, you car's TPMS makes you safer. It also makes you a bigger target for hackers.

TPMS hackers could gain access to other systems within the vehicle, such as the engine or brakes, leading to complete control of the vehicle.

The problem is that TPMS uses unencrypted radio frequencies for the communication between the tire and the receiver. Hackers can "spoof" these signals, allowing them to send false data to the vehicle’s computer, such as indicating that the tire pressure is higher or lower than it actually is.

Takeover

Big deal. You can hack my car and turn on my little pressure light? Annoying, sure. I didn’t think I cared until I learned that your TPMS radio frequency receiver is hooked directly into the car's ECU — the computer that controls everything from fuel injection to exhaust, fuel mix, electricity, engine stats, timing, electric car driveability, and more

What's more, this RF receiver is usually the same receiver that talks to your remote key fob to open the doors and disarm your security system.

RELATED: Could a hacker blow up your EV remotely?

Bloomberg/Getty Images

Compromised safety

So what exactly could a hacker do via your TPMS? More than you might expect.

TPMS hacking can:

  • Compromise the safety of the vehicle by causing incorrect tire pressure readings, which can lead to accidents or tire blowouts.
  • Capture data about the vehicle, such as its location and driving habits.
  • Gain access to other systems within the vehicle, such as the engine or brakes, leading to complete control of the vehicle.

Gauging the risk

So what can you do to keep hackers out? You should be as cautious of your car’s security as you are of public Wi-Fi and keep your vehicle's software up to date. Additionally, be wary of any attempts to physically tamper with your TPMS sensors.

And it can't hurt to have your own dial or digital pressure gauge. If that tire pressure light kicks on and your tires seem fine, check the pressure against the number inside the driver's door. If it it's fine, it could be a sign that your TPMS has been compromised.

Someone hacking into your car this way is unlikely, but if it does happen, it could be a disaster. As vehicles become more connected and rely more on electronic systems, this and other cybersecurity issues are something to keep an eye on.

China Escalates Cyberattacks That Are Increasingly Hard To Detect

The Trump administration must take decisive action to hold the Chinese government and its affiliated hackers accountable for their cyber activities.

Secret Service Foils Foreign-Linked Plot To Disable NYC Cellular Network Amid UN General Assembly

The Secret Service on Tuesday dismantled an illicit network of electronic devices in the New York tristate area that could have been used to shut down cell networks as world leaders gather in Manhattan for the U.N. General Assembly.

The post Secret Service Foils Foreign-Linked Plot To Disable NYC Cellular Network Amid UN General Assembly appeared first on .

Israeli government official arrested in child sex-crime sting, flees to Israel



An Israeli government official was arrested during a child sex-crime joint sting operation in Nevada earlier this month, racking up a felony charge of "luring a child with computer for sex act," according to a Las Vegas Metropolitan Police Department press release.

Tom Artiom Alexandrovich, 38, was named as one of the eight arrested during a Nevada Internet Crimes Against Children Unit joint operation with the FBI's Child Exploitation Task Force earlier this month.

Alexandrovich was reportedly released from custody on $10,000 bail after an initial court appearance and then returned to Israel.

Those arrested reportedly believed that they were meeting underage children whom they had met online for sex acts, but they were apprehended by law enforcement in part of the two-week sting operation.

RELATED: Epstein-funded MIT lab hosted panel that discussed 'child-size sex robots'

Photo by ABIR SULTAN/POOL/AFP via Getty Images

According to an alleged screenshot of a since-deleted LinkedIn profile, Alexandrovich is the executive director of the Israel Cyber Directorate, a government agency that operates under Prime Minister Benjamin Netanyahu's office. Another screenshot also placed him in Nevada during early August, talking about the Black Hat conference and cybersecurity:

Two things you can’t escape at Black Hat 2025: the relentless buzz of generative [artificial intelligence] and the sound of Hebrew … in every corridor. ... The key takeaway? The future of cybersecurity is being written in code, and it seems a significant part of it is being authored in #TelAviv and powered by LLMs. An exciting time to be in the field!

Black Hat 2025 was a cybersecurity conference scheduled for August 2-7 at Mandalay Bay Convention Center in Las Vegas, Nevada.

The Jewish Chronicle reported that a "Tom Alexandrovich" is due in court in Clark County, Nevada, on August 27 in connection with an alleged offense on August 6, a date that coincides both with the Black Hat Convention and with the Nevada police sting operation. Alexandrovich was reportedly released from custody on $10,000 bail after an initial court appearance and then returned to Israel.

According to an article published Wednesday by Ynet, an Israel-based outlet, the Israeli prime minister’s office initially issued a statement denying that the official was even arrested. “A state employee who traveled to the U.S. for professional matters was questioned by American authorities during his stay,” the initial statement read. “The employee, who does not hold a diplomatic visa, was not arrested and returned to Israel as scheduled.”

In a Saturday report, Ynet said that the Cyber Directorate claimed its earlier statement "was accurate based on the information provided to us" when presented with evidence of the arrest. The office denied that it had any involvement with posting Alexandrovich's bail, though it is unclear who posted it. Alexandrovich is reportedly on leave "by mutual decision."

The Las Vegas Metropolitan Police Department did not respond to Blaze News' request for comment on the circumstances of Alexandrovich's arrest.

Like Blaze News? Bypass the censors, sign up for our newsletters, and get stories like this direct to your inbox. Sign up here!