I wonder if YOU are reading it, or comprehend what you are reading.
The link you posted says:
"there hasnt been any result that calls into question the soundness of SHA-2 at all."
Stuff like: "hacked into target computers to snare messages before they were encrypted"
or "build entry points into their products." have nothing to do with the hash function.
No doubt the NSA are bunch of vipers that should not be trusted on any level,
but I don't think they have a preimage attack on SHA-256.
Saying that they might is just baseless speculation, and none of the articles
are suggesting that.