Event JSON
{
"id": "91b7e7d5bf29a73ec0c07a2b047a749b4b5fdf35c39ff82ede96b6135d515644",
"pubkey": "6b40efd81060cdf652224c3c39c959f52c774f6e86bd9dd95df0fb62b9dad5f5",
"created_at": 1713420319,
"kind": 1,
"tags": [
[
"t",
"Cybersecurity"
],
[
"t",
"cybersecurity"
],
[
"t",
"PuTTY"
],
[
"t",
"putty"
],
[
"t",
"Filezilla"
],
[
"t",
"filezilla"
],
[
"t",
"infosec"
],
[
"t",
"infosec"
],
[
"t",
"vulns"
],
[
"t",
"vulns"
],
[
"r",
"https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fwww.cloudzat.com%2Fwp-content%2Fuploads%2F2020%2F10%2FPuTTY.png\u0026f=1\u0026nofb=1\u0026ipt=58e376e1c1fe408ddf8fed65552bf9a12858cb151cc50d31c1e903cf15cc24f5\u0026ipo=images"
]
],
"content": "PUTTY VULNERABILITY\n\n#Cybersecurity researchers have found a critical vulnerability in #PuTTY SSH client with NIST P-521 keys, that allows private key recovery from only 60 signatures, CVE-2024-31497! \n\nIf you use #PuTTY or #Filezilla with ECDSA P-521, upgrade now and generate a new key! \n\n#infosec #vulns\n\nhttps://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fwww.cloudzat.com%2Fwp-content%2Fuploads%2F2020%2F10%2FPuTTY.png\u0026f=1\u0026nofb=1\u0026ipt=58e376e1c1fe408ddf8fed65552bf9a12858cb151cc50d31c1e903cf15cc24f5\u0026ipo=images",
"sig": "86a2669fda05ed63a15bff86104bf8bb5b3771d4b1358af671dcffdb8f3a98042579ddf32f968416ee0fb333931d0049fcf1ad44df458c9a88a984e4c5934239"
}