{"id":2111,"date":"2026-04-07T12:00:00","date_gmt":"2026-04-07T12:00:00","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/locky\/?p=2111"},"modified":"2026-02-20T15:29:31","modified_gmt":"2026-02-20T15:29:31","slug":"shadow-brokers-nsa-exploit-leaks-network-security","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/locky\/2026\/04\/07\/shadow-brokers-nsa-exploit-leaks-network-security\/","title":{"rendered":"Shadow Brokers, NSA Exploit Leaks, &amp; Network Security"},"content":{"rendered":"\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/06\/CYSE-280-HW3-Modules-12-and-Darknet-Diaries53-fd.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"both\" data-toolbar-fixed=\"on\">CYSE-280-HW3-Modules-12-and-Darknet-Diaries53-fd<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<ul class=\"wp-block-social-links has-normal-icon-size has-visible-labels has-icon-color has-icon-background-color is-style-default is-horizontal is-content-justification-center is-layout-flex wp-container-core-social-links-layout-1 wp-block-social-links-is-layout-flex\"><li style=\"color: #ffffff; background-color: #cf2e2e; \" class=\"wp-social-link wp-social-link-chain has-white-color wp-block-social-link\"><a rel=\"https:\/\/www.credly.com\/users\/carl-lochstampfor-jr noopener nofollow\" target=\"_blank\" href=\"http:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/06\/CYSE-280-HW3-Modules-12-and-Darknet-Diaries53-fd.pdf\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.6,7.2H14v1.5h1.6c2,0,3.7,1.7,3.7,3.7s-1.7,3.7-3.7,3.7H14v1.5h1.6c2.8,0,5.2-2.3,5.2-5.2,0-2.9-2.3-5.2-5.2-5.2zM4.7,12.4c0-2,1.7-3.7,3.7-3.7H10V7.2H8.4c-2.9,0-5.2,2.3-5.2,5.2,0,2.9,2.3,5.2,5.2,5.2H10v-1.5H8.4c-2,0-3.7-1.7-3.7-3.7zm4.6.9h5.3v-1.5H9.3v1.5z\"><\/path><\/svg><span class=\"wp-block-social-link-label\">Full Screen or Download<\/span><\/a><\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n","protected":false},"excerpt":{"rendered":"<p>This assignment explores foundational network operating system concepts and analyzes Darknet Diaries Episode 53 on the Shadow Brokers. It examines the leak of NSA hacking tools, including EternalBlue, and discusses the broader implications for government cybersecurity, offensive versus defensive security postures, and the global impact of exploit disclosure.<\/p>\n","protected":false},"author":30379,"featured_media":2113,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"image","meta":{"advanced_seo_description":"This assignment explores foundational network operating system concepts and analyzes Darknet Diaries Episode 53 on the Shadow Brokers. It examines the leak of NSA hacking tools, including EternalBlue, and discusses the broader implications for government cybersecurity, offensive versus defensive security postures, and the global impact of exploit disclosure.","jetpack_seo_html_title":"Shadow Brokers, NSA Exploit Leaks, & Network Security","jetpack_seo_noindex":false,"footnotes":"","wds_primary_category":200,"jetpack_publicize_message":"When NSA hacking tools were leaked by the Shadow Brokers, the fallout reshaped global cybersecurity \ud83d\udd10\ud83c\udf0d. A look at EternalBlue, exploit disclosure, and what it means for government network security.\n#Cybersecurity #ShadowBrokers #ThreatIntelligence","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[172,200,201,203,204,202,199],"tags":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/02\/Cybersecurity_Public_Domain.jpg?fit=832%2C1248&ssl=1","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/posts\/2111"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/users\/30379"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/comments?post=2111"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/posts\/2111\/revisions"}],"predecessor-version":[{"id":2407,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/posts\/2111\/revisions\/2407"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/media\/2113"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/media?parent=2111"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/categories?post=2111"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/tags?post=2111"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}