The attacks stem from a collection of vulnerabilities collected by the NSA, which collected vulnerabilities and created tools to use the exploits for espionage and cyber attack purposes. The vulnerabilities and the tools were released by a hacking group known… Read More ›