Event JSON
{
"id": "dd21b97a0e9a191fef6c288978907e0834710df2675cf978e354324761118f79",
"pubkey": "53b542dd5e10bd1b93ae82b2af36a2056e7b2099c821940dc6cf1853de328a6a",
"created_at": 1722970804,
"kind": 1,
"tags": [
[
"t",
"smartappcontrol"
],
[
"t",
"cybersecurity"
],
[
"t",
"smartscreen"
],
[
"proxy",
"https://mastodon.thenewoil.org/@thenewoil/112916614658337025",
"web"
],
[
"t",
"windows"
],
[
"t",
"microsoft"
],
[
"proxy",
"https://mastodon.thenewoil.org/users/thenewoil/statuses/112916614658337025",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://mastodon.thenewoil.org/users/thenewoil/statuses/112916614658337025",
"pink.momostr"
],
[
"-"
]
],
"content": "#Windows #SmartAppControl, #SmartScreen bypass exploited since 2018\n\nhttps://www.bleepingcomputer.com/news/microsoft/windows-smart-app-control-smartscreen-bypass-exploited-since-2018/\n\n#cybersecurity #Microsoft",
"sig": "e8af4fd56ef412d66a8a95a97363808867f8ea1b893c5ec266977b6c3675f6259f227a8266afa4f9518c96c0340a9208f894e5eedf45c1709cc4182e9dc02cf4"
}