Exploit against Cisco’s PIX line of firewalls remotely extracted crypto keys.
Category: Technology Lab
Company advisories further corroborate authenticity of mysterious Shadow Brokers leak.
Rare crypto implementation in ShadowBrokers dump connects it to Equation Group.
Extraordinary claim gets attention of security experts everywhere.