Event JSON
{
"id": "f6081c1b6ab1290fc25f211e41495d7bf880b5dfc584418dee14cab919d57806",
"pubkey": "dbd18bb071ec96517e156c5b2dea6059774741329ea0042e3b2a5a2de3e19c7b",
"created_at": 1730303514,
"kind": 1,
"tags": [
[
"proxy",
"https://infosec.exchange/@howelloneill/113397171122724751",
"web"
],
[
"imeta",
"url https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/397/171/023/532/455/original/0407ffe47292ef26.png",
"m image/png"
],
[
"proxy",
"https://infosec.exchange/users/howelloneill/statuses/113397171122724751",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://infosec.exchange/users/howelloneill/statuses/113397171122724751",
"pink.momostr"
],
[
"-"
]
],
"content": "Here's something I'm interested in: Adversaries who gain access and then patch a system to prevent any other threat actors from exploiting the same vulnerability. For example: (Image) https://cloud.google.com/blog/topics/threat-intelligence/initial-access-brokers-exploit-f5-screenconnect\n\nAny other examples of this behavior come to mind? Any other reporting to share?\nhttps://media.infosec.exchange/infosec.exchange/media_attachments/files/113/397/171/023/532/455/original/0407ffe47292ef26.png\n",
"sig": "62019f6f4e7af90194b0b3e51ef59df0c9e4ea5b0afd5d67fda0377e8c93dfa0d0277f0c2ca39d40ccd79a2898171ae374ee7414af5995fb373a8242c49c512b"
}