Event JSON
{
"id": "9b2d9bcdfafdcaa1ae3f35db8a921127f12e5ba7a6e317f31a23b74a79beb8a8",
"pubkey": "336490f2eea322646604f0e5d2b114f310f44b0ae1cfc9a4e7db642f519a2f1a",
"created_at": 1725917554,
"kind": 1,
"tags": [
[
"t",
"cybersecurity"
],
[
"t",
"infosec"
],
[
"proxy",
"https://ioc.exchange/@percepticon/113109732876234911",
"web"
],
[
"imeta",
"url https://files.ioc.exchange/media_attachments/files/113/109/732/832/318/975/original/6474780f5d8cbbee.jpeg",
"m image/jpeg"
],
[
"proxy",
"https://ioc.exchange/users/percepticon/statuses/113109732876234911",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://ioc.exchange/users/percepticon/statuses/113109732876234911",
"pink.momostr"
],
[
"-"
]
],
"content": "How cyber criminals are compromising AI software supply chains https://securityintelligence.com/articles/cyber-criminals-compromising-ai-software-supply-chains/?utm_source=dlvr.it\u0026utm_medium=mastodon #cybersecurity #infosec\nhttps://files.ioc.exchange/media_attachments/files/113/109/732/832/318/975/original/6474780f5d8cbbee.jpeg\n",
"sig": "52f459edc1eaba0ff643e1a98c1b676e1d6e2f062c2a215d37179c0ee84f1be8c77712e8d75438953555e5909afb780d0339f3b7529694eebf02fd6d84695cde"
}