Leaked EXTRABACON exploit can work on newer Cisco ASA firewalls
EXTRABACON, one of the Equation Group exploits leaked by the Shadow Brokers, can be made to work on a wider range of Cisco Adaptive Security Appliance (ASA) firewalls than …
Snowden documents definitely link Shadow Brokers’ leak to the NSA
Last week, Cisco and Fortinet confirmed that the exploits leaked by the Shadow Brokers and aimed at compromising their networking devices work as intended, but the origin of …
Cisco, Fortinet validate exploits leaked by the Shadow Brokers
Cisco and Fortinet have released security advisories confirming that some of the exploits leaked by the Shadow Brokers work as intended. The entity released the batch as proof …
Leaked hacking tools can be tied to NSA’s Equation Group
The batch of data released by the Shadow Brokers, an entity that claims to have hacked the Equation Group, contains attack tools that can be tied to the group. Equation Group …
NSA spied on world leaders, UN, EU officials
A set of highly classified documents recently published by WikiLeaks show how the NSA spied on a number of high ranking officials of the UN, UNHCR, WTO, NATO, the EU and …
WikiLeaks publishes reports showing NSA spied on French presidents
WikiLeaks has published “Espionnage Élysée”, a set of intelligence reports and documents that show that the US NSA has, between 2006 and 2012, intercepted the …
US, UK spies reverse-engineered security software in search for flaws
The UK GCHQ has been actively trying to reverse-engineer popular security software in order find vulnerabilities that can be used to neutralize the protection the software …
USA Freedom Act is just the beginning of the fight for privacy
The US Senate voted for the passing of the USA Freedom Act on Tuesday, and President Obama signed it into law later the same day. So, how will this impact the surveillance …
Section 215 of the Patriot Act expired last night
A small, perhaps temporary, but important victory has been won by privacy advocates today, as the US Senate has allowed three sections of the USA PATRIOT Act to expire.Among …
Newly disclosed Logjam bug might be how the NSA broke VPNs
Another vulnerability courtesy of 1990s-era US export restrictions on cryptography has been discovered, and researchers believe it might be how the NSA managed to regularly …
US House of Representatives votes to stop NSA’s bulk data collection
The highly debated USA FREEDOM Act, a bill whose purpose is “to rein in the dragnet collection of data by the NSA and other government agencies, increase transparency of …
Court declares NSA’s domestic phone metadata collection program illegal
It took nearly two years, but three judges of a federal appeals court in New York have unanimously ruled that the bulk collection of telephone metadata associated with phone …
Featured news
Resources
Don't miss
- AI is speeding up nation-state cyber programs
- A study of 1,000 Android apps finds a privacy policy logging gap
- With AI’s help, North Korean hackers stumbled into a near-undetectable attack
- Apple fixes iPhone bug that let FBI retrieve deleted Signal messages(CVE-2026-28950)
- GopherWhisper APT group hides command and control traffic in Slack and Discord