Event JSON
{
"id": "a94cc8d6dee99cfe2424f1a8c6edcc09a2c7b679b1218f4efa348dddbd6b7e25",
"pubkey": "aacd194d13b03a7a7026dd1857f09d86d9d789d3b95e0784963b48e77598809b",
"created_at": 1742136274,
"kind": 1,
"tags": [
[
"t",
"cybersecurity"
],
[
"t",
"infosec"
],
[
"imeta",
"url https://files.ioc.exchange/media_attachments/files/114/172/642/876/631/233/original/e42206c1c75e8eb6.jpeg",
"m image/jpeg",
"dim 1024x1024",
"blurhash UbLg^ZfQWBt7~qWBj[ay~qoft7WBM{WBRjfQ"
],
[
"proxy",
"https://ioc.exchange/users/percepticon/statuses/114172642913782519",
"activitypub"
]
],
"content": "Chinesische Hacker nutzen maßgeschneiderte Hintertüren in Juniper-Routern https://www.it-boltwise.de/chinesische-hacker-nutzen-massgeschneiderte-hintertueren-in-juniper-routern.html #cybersecurity #infosec\n\nhttps://files.ioc.exchange/media_attachments/files/114/172/642/876/631/233/original/e42206c1c75e8eb6.jpeg",
"sig": "028e7607e7421af139bf4f95de561939a9c2baae5f64fcbbbe5ad1a0068a657c309111300e50ed00d4223789c86b004aa3ea464d471f5b418a6e44c23bcdf705"
}