Event JSON
{
"id": "57d73721688eeb55caf5f0a2432bbce729ac4fc66f24d0f711d98e359d7226cc",
"pubkey": "a0c598eba122a39fe6bf50c17a7a2787754903664afa79cb94d2103794b06dd5",
"created_at": 1762540263,
"kind": 1,
"tags": [
[
"proxy",
"https://schleuss.online/@itsecbot/115509838693412525",
"web"
],
[
"t",
"security"
],
[
"t",
"mobile"
],
[
"proxy",
"https://schleuss.online/users/itsecbot/statuses/115509838693412525",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://schleuss.online/users/itsecbot/statuses/115509838693412525",
"pink.momostr"
],
[
"-"
]
],
"content": "New LandFall spyware exploited Samsung zero-day via WhatsApp messages - A threat actor exploited a zero-day vulnerability in Samsung's Android image processing l... https://www.bleepingcomputer.com/news/security/new-landfall-spyware-exploited-samsung-zero-day-via-whatsapp-messages/ #security #mobile",
"sig": "f8d941a755d8f1089f70a621a6f72d57e12d35a52c9f385f4793d0b2cb8d91b607a37f79e6d9a51359c907e9e87787f190c63c1d935ae3a613b3ce6f29aa5233"
}