Event JSON
{
"id": "83944db7d1ef9da9857d262384c1582d9638a51e434bf1809a80112fb172930e",
"pubkey": "f6870afcde4480ec8508f50304859e14a51309ff24ab3f0f862c52bdc4af8747",
"created_at": 1689354780,
"kind": 1,
"tags": [
[
"e",
"e84d3df531936551822f69aba40186aaf90115a0b56531d500e41f4c3ff05e58",
"wss://relay.mostr.pub",
"reply"
],
[
"mostr",
"https://cyberplace.social/users/GossiTheDog/statuses/110713554900152610"
]
],
"content": "Really good new MS blog on the MS compromise - contains IOCs etc. I'll put MSPaint.exe down. https://www.microsoft.com/en-us/security/blog/2023/07/14/analysis-of-storm-0558-techniques-for-unauthorized-email-access/",
"sig": "32d89391eb04a845ce09de20251aa33c37abf72fa7c5c33045a06907b20c1f4d88fe20ca0222bbfa8a1e504dd035c391fa374f49de85ec7bc925b452f3dfda88"
}