- Security Fixes and Improvements
- By Catalin Cimpanu
- September 19th, 2016
Shadow Brokers BENINGCERTAIN Tool Deployed in Live Attacks
Cisco devices at risk of attack from Pix Pocket exploits
- Cyber Espionage
- By Catalin Cimpanu
- September 13th, 2016
NOPEN Is the Equation Group's Backdoor for Unix Systems
NOPEN has central role in Equation Group operations
- Security Blog
- By Catalin Cimpanu
- August 23rd, 2016
Juniper Confirms Shadow Brokers Firewall Implants
Company still investigating, no fixes or mitigations out yet
- Cyber Espionage
- By Catalin Cimpanu
- August 23rd, 2016
List of Equation Group Files Leaked by Shadow Brokers
A compendium of what was included in the dumped files
- Cyber Espionage
- By Catalin Cimpanu
- August 19th, 2016
Computer Science Professor Gives Failing Grade to Newly Leaked NSA Hacking Tool
It appears that the NSA will need some better coders
- Cyber Espionage
- By Catalin Cimpanu
- August 19th, 2016
Did the NSA Have the Ability to Extract VPN Keys from Cisco PIX Firewalls?
The answer is YES, according to LulzSec co-founder
- Security Fixes and Improvements
- By Catalin Cimpanu
- August 17th, 2016
Cisco Patches Zero-Day Included in Shadow Brokers Leak
Fortinet recommends customers to upgrade their firmware
- Cyber Espionage
- By Catalin Cimpanu
- August 16th, 2016
Kaspersky Says Shadow Brokers Leaked Malware Is Authentic
Security vendor that detected and analyzed Equation Group malware says The Shadow Brokers leak is authentic
- Cyber Espionage
- By Catalin Cimpanu
- August 15th, 2016
Shadow Brokers Group Auctions Off Supposed NSA Hacking Tools
Hackers are holding a public auction for the stolen data
- Security
- By Ionut Ilascu
- February 19th, 2015
DoubleFantasy Is Equation Group’s First Attack Wave
Infection starts with running multiple exploits in a loop