Event JSON
{
"id": "03fe7d92e6c5cde6b0ee5b78c944e5ca3b183407fbf807375745c341f1f5abc7",
"pubkey": "f6870afcde4480ec8508f50304859e14a51309ff24ab3f0f862c52bdc4af8747",
"created_at": 1704913941,
"kind": 1,
"tags": [
[
"p",
"4cb4152b1801b2d5fbd0120af38d4b45d66e5f74a613e71aef2de67baa629f92",
"wss://relay.mostr.pub"
],
[
"p",
"860c51bf8f11b0a841748094a7afa4a819b83d41af612e19e2cabbef5d36f6e2",
"wss://relay.mostr.pub"
],
[
"e",
"00eb70ff87c2c964b6a2eb90183f945a5dcec268c736be311bc2c3a3819b099a",
"wss://relay.mostr.pub",
"reply"
],
[
"t",
"connectaround"
],
[
"proxy",
"https://cyberplace.social/users/GossiTheDog/statuses/111733240063138916",
"activitypub"
]
],
"content": "More info on #ConnectAround from nostr:npub1fj6p22ccqxedt77szg908r2tghtxuhm55cf7wxh09hn8h2nzn7fqfeneuw \n\nhttps://www.volexity.com/blog/2024/01/10/active-exploitation-of-two-zero-day-vulnerabilities-in-ivanti-connect-secure-vpn/\n\n- Exploitation dates to at least late 2023\n- Chinese nation state actor\n\nLoads of info in the blog.",
"sig": "fcee0ced56ba2e21a6a05b6169db223ce06de46c9dffd546f61e4c6e682db4a52b08afc97e64191d09461553a3328701136c7dc0c68b35fd5ebb29aeae8e0d47"
}