Shadow Brokers BENINGCERTAIN Tool Deployed in Live Attacks

Shadow Brokers BENINGCERTAIN Tool Deployed in Live Attacks

Cisco devices at risk of attack from Pix Pocket exploits

NOPEN Is the Equation Group's Backdoor for Unix Systems

NOPEN Is the Equation Group's Backdoor for Unix Systems

NOPEN has central role in Equation Group operations

Juniper Confirms Shadow Brokers Firewall Implants

Juniper Confirms Shadow Brokers Firewall Implants

Company still investigating, no fixes or mitigations out yet

List of Equation Group Files Leaked by Shadow Brokers

List of Equation Group Files Leaked by Shadow Brokers

A compendium of what was included in the dumped files

Computer Science Professor Gives Failing Grade to Newly Leaked NSA Hacking Tool

Computer Science Professor Gives Failing Grade to Newly Leaked NSA Hacking Tool

It appears that the NSA will need some better coders

Did the NSA Have the Ability to Extract VPN Keys from Cisco PIX Firewalls?

Did the NSA Have the Ability to Extract VPN Keys from Cisco PIX Firewalls?

The answer is YES, according to LulzSec co-founder

Cisco Patches Zero-Day Included in Shadow Brokers Leak

Cisco Patches Zero-Day Included in Shadow Brokers Leak

Fortinet recommends customers to upgrade their firmware

Kaspersky Says Shadow Brokers Leaked Malware Is Authentic

Kaspersky Says Shadow Brokers Leaked Malware Is Authentic

Security vendor that detected and analyzed Equation Group malware says The Shadow Brokers leak is authentic

Shadow Brokers Group Auctions Off Supposed NSA Hacking Tools

Shadow Brokers Group Auctions Off Supposed NSA Hacking Tools

Hackers are holding a public auction for the stolen data

DoubleFantasy Is Equation Group’s First Attack Wave

DoubleFantasy Is Equation Group’s First Attack Wave

Infection starts with running multiple exploits in a loop