ActivityPub Viewer

A small tool to view real-world ActivityPub objects as JSON! Enter a URL or username from Mastodon or a similar service below, and we'll send a request with the right Accept header to the server to view the underlying object.

Open in browser →
{ "@context": [ "https://www.w3.org/ns/activitystreams", { "ostatus": "http://ostatus.org#", "atomUri": "ostatus:atomUri", "inReplyToAtomUri": "ostatus:inReplyToAtomUri", "conversation": "ostatus:conversation", "sensitive": "as:sensitive", "toot": "http://joinmastodon.org/ns#", "votersCount": "toot:votersCount", "litepub": "http://litepub.social/ns#", "directMessage": "litepub:directMessage", "blurhash": "toot:blurhash", "focalPoint": { "@container": "@list", "@id": "toot:focalPoint" }, "Hashtag": "as:Hashtag" } ], "id": "https://infosec.exchange/users/Weld/outbox?page=true", "type": "OrderedCollectionPage", "next": "https://infosec.exchange/users/Weld/outbox?max_id=113476386370261651&page=true", "prev": "https://infosec.exchange/users/Weld/outbox?min_id=113533228074388106&page=true", "partOf": "https://infosec.exchange/users/Weld/outbox", "orderedItems": [ { "id": "https://infosec.exchange/users/Weld/statuses/113533228074388106/activity", "type": "Create", "actor": "https://infosec.exchange/users/Weld", "published": "2024-11-23T16:32:58Z", "to": [ "https://infosec.exchange/users/Weld/followers" ], "cc": [ "https://www.w3.org/ns/activitystreams#Public", "https://defcon.social/users/deviantollam", "https://infosec.exchange/users/Tarah" ], "object": { "id": "https://infosec.exchange/users/Weld/statuses/113533228074388106", "type": "Note", "summary": null, "inReplyTo": "https://defcon.social/users/deviantollam/statuses/113533160065106264", "published": "2024-11-23T16:32:58Z", "url": "https://infosec.exchange/@Weld/113533228074388106", "attributedTo": "https://infosec.exchange/users/Weld", "to": [ "https://infosec.exchange/users/Weld/followers" ], "cc": [ "https://www.w3.org/ns/activitystreams#Public", "https://defcon.social/users/deviantollam", "https://infosec.exchange/users/Tarah" ], "sensitive": false, "atomUri": "https://infosec.exchange/users/Weld/statuses/113533228074388106", "inReplyToAtomUri": "https://defcon.social/users/deviantollam/statuses/113533160065106264", "conversation": "tag:infosec.exchange,2024-11-23:objectId=215890229:objectType=Conversation", "content": "<p><span class=\"h-card\" translate=\"no\"><a href=\"https://defcon.social/@deviantollam\" class=\"u-url mention\">@<span>deviantollam</span></a></span> great to see you and <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@Tarah\" class=\"u-url mention\">@<span>Tarah</span></a></span></p>", "contentMap": { "en": "<p><span class=\"h-card\" translate=\"no\"><a href=\"https://defcon.social/@deviantollam\" class=\"u-url mention\">@<span>deviantollam</span></a></span> great to see you and <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@Tarah\" class=\"u-url mention\">@<span>Tarah</span></a></span></p>" }, "attachment": [], "tag": [ { "type": "Mention", "href": "https://defcon.social/users/deviantollam", "name": "@deviantollam@defcon.social" }, { "type": "Mention", "href": "https://infosec.exchange/users/Tarah", "name": "@Tarah" } ], "replies": { "id": "https://infosec.exchange/users/Weld/statuses/113533228074388106/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://infosec.exchange/users/Weld/statuses/113533228074388106/replies?only_other_accounts=true&page=true", "partOf": "https://infosec.exchange/users/Weld/statuses/113533228074388106/replies", "items": [] } }, "likes": { "id": "https://infosec.exchange/users/Weld/statuses/113533228074388106/likes", "type": "Collection", "totalItems": 1 }, "shares": { "id": "https://infosec.exchange/users/Weld/statuses/113533228074388106/shares", "type": "Collection", "totalItems": 0 } } }, { "id": "https://infosec.exchange/users/Weld/statuses/113532745903268528/activity", "type": "Create", "actor": "https://infosec.exchange/users/Weld", "published": "2024-11-23T14:30:21Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Weld/followers" ], "object": { "id": "https://infosec.exchange/users/Weld/statuses/113532745903268528", "type": "Note", "summary": null, "inReplyTo": null, "published": "2024-11-23T14:30:21Z", "url": "https://infosec.exchange/@Weld/113532745903268528", "attributedTo": "https://infosec.exchange/users/Weld", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Weld/followers" ], "sensitive": false, "atomUri": "https://infosec.exchange/users/Weld/statuses/113532745903268528", "inReplyToAtomUri": null, "conversation": "tag:infosec.exchange,2024-11-23:objectId=215890229:objectType=Conversation", "content": "<p>Today, I embark on my journey to Riyadh for Black Hat MEA. Thrilled to be invited back to deliver a keynote this Wednesday on the future—a world where code not only detects but repairs its own vulnerabilities.</p>", "contentMap": { "en": "<p>Today, I embark on my journey to Riyadh for Black Hat MEA. Thrilled to be invited back to deliver a keynote this Wednesday on the future—a world where code not only detects but repairs its own vulnerabilities.</p>" }, "attachment": [ { "type": "Document", "mediaType": "image/png", "url": "https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/532/745/799/694/674/original/c5231183ed26a0a7.png", "name": null, "blurhash": "U46@{0IAX8.9_3D%M{%M0Lx]xanO00%MxuM{", "width": 1898, "height": 1022 } ], "tag": [], "replies": { "id": "https://infosec.exchange/users/Weld/statuses/113532745903268528/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://infosec.exchange/users/Weld/statuses/113532745903268528/replies?only_other_accounts=true&page=true", "partOf": "https://infosec.exchange/users/Weld/statuses/113532745903268528/replies", "items": [] } }, "likes": { "id": "https://infosec.exchange/users/Weld/statuses/113532745903268528/likes", "type": "Collection", "totalItems": 1 }, "shares": { "id": "https://infosec.exchange/users/Weld/statuses/113532745903268528/shares", "type": "Collection", "totalItems": 0 } } }, { "id": "https://infosec.exchange/users/Weld/statuses/113522941507693530/activity", "type": "Create", "actor": "https://infosec.exchange/users/Weld", "published": "2024-11-21T20:56:58Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Weld/followers" ], "object": { "id": "https://infosec.exchange/users/Weld/statuses/113522941507693530", "type": "Note", "summary": null, "inReplyTo": null, "published": "2024-11-21T20:56:58Z", "url": "https://infosec.exchange/@Weld/113522941507693530", "attributedTo": "https://infosec.exchange/users/Weld", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Weld/followers" ], "sensitive": false, "atomUri": "https://infosec.exchange/users/Weld/statuses/113522941507693530", "inReplyToAtomUri": null, "conversation": "tag:infosec.exchange,2024-11-21:objectId=215373911:objectType=Conversation", "content": "<p>Launch of new cybertraining service TRYZUB based on Ukrainian experience in cyberwar</p><p><a href=\"https://cip.gov.ua/en/news/launch-of-new-cybertraining-service-tryzub-based-on-ukrainian-experience-in-cyberwar\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">cip.gov.ua/en/news/launch-of-n</span><span class=\"invisible\">ew-cybertraining-service-tryzub-based-on-ukrainian-experience-in-cyberwar</span></a></p>", "contentMap": { "en": "<p>Launch of new cybertraining service TRYZUB based on Ukrainian experience in cyberwar</p><p><a href=\"https://cip.gov.ua/en/news/launch-of-new-cybertraining-service-tryzub-based-on-ukrainian-experience-in-cyberwar\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">cip.gov.ua/en/news/launch-of-n</span><span class=\"invisible\">ew-cybertraining-service-tryzub-based-on-ukrainian-experience-in-cyberwar</span></a></p>" }, "attachment": [], "tag": [], "replies": { "id": "https://infosec.exchange/users/Weld/statuses/113522941507693530/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://infosec.exchange/users/Weld/statuses/113522941507693530/replies?only_other_accounts=true&page=true", "partOf": "https://infosec.exchange/users/Weld/statuses/113522941507693530/replies", "items": [] } }, "likes": { "id": "https://infosec.exchange/users/Weld/statuses/113522941507693530/likes", "type": "Collection", "totalItems": 5 }, "shares": { "id": "https://infosec.exchange/users/Weld/statuses/113522941507693530/shares", "type": "Collection", "totalItems": 2 } } }, { "id": "https://infosec.exchange/users/Weld/statuses/113516927286115609/activity", "type": "Create", "actor": "https://infosec.exchange/users/Weld", "published": "2024-11-20T19:27:28Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Weld/followers" ], "object": { "id": "https://infosec.exchange/users/Weld/statuses/113516927286115609", "type": "Note", "summary": null, "inReplyTo": "https://infosec.exchange/users/Weld/statuses/113516741984754317", "published": "2024-11-20T19:27:28Z", "url": "https://infosec.exchange/@Weld/113516927286115609", "attributedTo": "https://infosec.exchange/users/Weld", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Weld/followers" ], "sensitive": false, "atomUri": "https://infosec.exchange/users/Weld/statuses/113516927286115609", "inReplyToAtomUri": "https://infosec.exchange/users/Weld/statuses/113516741984754317", "conversation": "tag:infosec.exchange,2024-11-20:objectId=214998437:objectType=Conversation", "content": "<p>Note that some of the CWEs in the list do not have any corresponding instances in the KEV:</p><p>#4 CSRF</p><p>#9 Missing Auth</p><p>#10 Unrestricted Upload of a File w/Dangerous Type</p><p>#15 Improper Privilege Mgmt</p><p>#17 Exposure of Sensitive Info</p><p>#21 Null Pointer Dereference</p><p>#24 ...</p><p><a href=\"https://cwe.mitre.org/top25/archive/2024/2024_cwe_top25.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">cwe.mitre.org/top25/archive/20</span><span class=\"invisible\">24/2024_cwe_top25.html</span></a></p>", "contentMap": { "en": "<p>Note that some of the CWEs in the list do not have any corresponding instances in the KEV:</p><p>#4 CSRF</p><p>#9 Missing Auth</p><p>#10 Unrestricted Upload of a File w/Dangerous Type</p><p>#15 Improper Privilege Mgmt</p><p>#17 Exposure of Sensitive Info</p><p>#21 Null Pointer Dereference</p><p>#24 ...</p><p><a href=\"https://cwe.mitre.org/top25/archive/2024/2024_cwe_top25.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">cwe.mitre.org/top25/archive/20</span><span class=\"invisible\">24/2024_cwe_top25.html</span></a></p>" }, "attachment": [], "tag": [], "replies": { "id": "https://infosec.exchange/users/Weld/statuses/113516927286115609/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://infosec.exchange/users/Weld/statuses/113516927286115609/replies?only_other_accounts=true&page=true", "partOf": "https://infosec.exchange/users/Weld/statuses/113516927286115609/replies", "items": [] } }, "likes": { "id": "https://infosec.exchange/users/Weld/statuses/113516927286115609/likes", "type": "Collection", "totalItems": 4 }, "shares": { "id": "https://infosec.exchange/users/Weld/statuses/113516927286115609/shares", "type": "Collection", "totalItems": 1 } } }, { "id": "https://infosec.exchange/users/Weld/statuses/113516741984754317/activity", "type": "Create", "actor": "https://infosec.exchange/users/Weld", "published": "2024-11-20T18:40:21Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Weld/followers" ], "object": { "id": "https://infosec.exchange/users/Weld/statuses/113516741984754317", "type": "Note", "summary": null, "inReplyTo": null, "published": "2024-11-20T18:40:21Z", "url": "https://infosec.exchange/@Weld/113516741984754317", "attributedTo": "https://infosec.exchange/users/Weld", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Weld/followers" ], "sensitive": false, "atomUri": "https://infosec.exchange/users/Weld/statuses/113516741984754317", "inReplyToAtomUri": null, "conversation": "tag:infosec.exchange,2024-11-20:objectId=214998437:objectType=Conversation", "content": "<p>New CWE Top 25 for 2024 just dropped</p>", "contentMap": { "en": "<p>New CWE Top 25 for 2024 just dropped</p>" }, "attachment": [ { "type": "Document", "mediaType": "image/png", "url": "https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/516/741/868/348/492/original/a4995e56fc5339c0.png", "name": null, "blurhash": "UDN^ra4mxv%NM_t7ofRiRjofofWBM{ayogWB", "width": 1876, "height": 1042 } ], "tag": [], "replies": { "id": "https://infosec.exchange/users/Weld/statuses/113516741984754317/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://infosec.exchange/users/Weld/statuses/113516741984754317/replies?min_id=113516927286115609&page=true", "partOf": "https://infosec.exchange/users/Weld/statuses/113516741984754317/replies", "items": [ "https://infosec.exchange/users/Weld/statuses/113516927286115609" ] } }, "likes": { "id": "https://infosec.exchange/users/Weld/statuses/113516741984754317/likes", "type": "Collection", "totalItems": 6 }, "shares": { "id": "https://infosec.exchange/users/Weld/statuses/113516741984754317/shares", "type": "Collection", "totalItems": 2 } } }, { "id": "https://infosec.exchange/users/Weld/statuses/113516731326695827/activity", "type": "Create", "actor": "https://infosec.exchange/users/Weld", "published": "2024-11-20T18:37:38Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Weld/followers" ], "object": { "id": "https://infosec.exchange/users/Weld/statuses/113516731326695827", "type": "Note", "summary": null, "inReplyTo": null, "published": "2024-11-20T18:37:38Z", "url": "https://infosec.exchange/@Weld/113516731326695827", "attributedTo": "https://infosec.exchange/users/Weld", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Weld/followers" ], "sensitive": false, "atomUri": "https://infosec.exchange/users/Weld/statuses/113516731326695827", "inReplyToAtomUri": null, "conversation": "tag:infosec.exchange,2024-11-20:objectId=214997777:objectType=Conversation", "content": "<p>New technologies bring new vulnerabilities. Introducing CWE-1427: Improper Neutralization of Input Used for LLM Prompting</p><p>The product uses externally-provided data to build prompts provided to large language models (LLMs), but the way these prompts are constructed causes the LLM to fail to distinguish between user-supplied inputs and developer provided system directives.</p>", "contentMap": { "en": "<p>New technologies bring new vulnerabilities. Introducing CWE-1427: Improper Neutralization of Input Used for LLM Prompting</p><p>The product uses externally-provided data to build prompts provided to large language models (LLMs), but the way these prompts are constructed causes the LLM to fail to distinguish between user-supplied inputs and developer provided system directives.</p>" }, "attachment": [], "tag": [], "replies": { "id": "https://infosec.exchange/users/Weld/statuses/113516731326695827/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://infosec.exchange/users/Weld/statuses/113516731326695827/replies?only_other_accounts=true&page=true", "partOf": "https://infosec.exchange/users/Weld/statuses/113516731326695827/replies", "items": [] } }, "likes": { "id": "https://infosec.exchange/users/Weld/statuses/113516731326695827/likes", "type": "Collection", "totalItems": 3 }, "shares": { "id": "https://infosec.exchange/users/Weld/statuses/113516731326695827/shares", "type": "Collection", "totalItems": 0 } } }, { "id": "https://infosec.exchange/users/Weld/statuses/113515974234114412/activity", "type": "Create", "actor": "https://infosec.exchange/users/Weld", "published": "2024-11-20T15:25:06Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Weld/followers" ], "object": { "id": "https://infosec.exchange/users/Weld/statuses/113515974234114412", "type": "Note", "summary": null, "inReplyTo": null, "published": "2024-11-20T15:25:06Z", "url": "https://infosec.exchange/@Weld/113515974234114412", "attributedTo": "https://infosec.exchange/users/Weld", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Weld/followers" ], "sensitive": false, "atomUri": "https://infosec.exchange/users/Weld/statuses/113515974234114412", "inReplyToAtomUri": null, "conversation": "tag:infosec.exchange,2024-11-20:objectId=214941166:objectType=Conversation", "content": "<p>After 18 yrs as Veracode&#39;s CTO I have transitioned to Chief Security Evangelist. I&#39;m excited to have more time to engage developers at meetups &amp; conferences. You&#39;ll still see me at all the cybersecurity cons. This &amp; the future of AppSec w/Jens Wessling &amp; Alan Shimel: <a href=\"https://techstrong.tv/videos/interviews/the-evolution-of-application-security-integration-with-veracodes-jens-wessling-and-chris-wysopal\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">techstrong.tv/videos/interview</span><span class=\"invisible\">s/the-evolution-of-application-security-integration-with-veracodes-jens-wessling-and-chris-wysopal</span></a></p>", "contentMap": { "en": "<p>After 18 yrs as Veracode&#39;s CTO I have transitioned to Chief Security Evangelist. I&#39;m excited to have more time to engage developers at meetups &amp; conferences. You&#39;ll still see me at all the cybersecurity cons. This &amp; the future of AppSec w/Jens Wessling &amp; Alan Shimel: <a href=\"https://techstrong.tv/videos/interviews/the-evolution-of-application-security-integration-with-veracodes-jens-wessling-and-chris-wysopal\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">techstrong.tv/videos/interview</span><span class=\"invisible\">s/the-evolution-of-application-security-integration-with-veracodes-jens-wessling-and-chris-wysopal</span></a></p>" }, "attachment": [], "tag": [], "replies": { "id": "https://infosec.exchange/users/Weld/statuses/113515974234114412/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://infosec.exchange/users/Weld/statuses/113515974234114412/replies?only_other_accounts=true&page=true", "partOf": "https://infosec.exchange/users/Weld/statuses/113515974234114412/replies", "items": [] } }, "likes": { "id": "https://infosec.exchange/users/Weld/statuses/113515974234114412/likes", "type": "Collection", "totalItems": 18 }, "shares": { "id": "https://infosec.exchange/users/Weld/statuses/113515974234114412/shares", "type": "Collection", "totalItems": 4 } } }, { "id": "https://infosec.exchange/users/Weld/statuses/113515273427871241/activity", "type": "Create", "actor": "https://infosec.exchange/users/Weld", "published": "2024-11-20T12:26:52Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Weld/followers", "https://infosec.exchange/users/Defcon" ], "object": { "id": "https://infosec.exchange/users/Weld/statuses/113515273427871241", "type": "Note", "summary": null, "inReplyTo": null, "published": "2024-11-20T12:26:52Z", "url": "https://infosec.exchange/@Weld/113515273427871241", "attributedTo": "https://infosec.exchange/users/Weld", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Weld/followers", "https://infosec.exchange/users/Defcon" ], "sensitive": false, "atomUri": "https://infosec.exchange/users/Weld/statuses/113515273427871241", "inReplyToAtomUri": null, "conversation": "tag:infosec.exchange,2024-11-20:objectId=214893830:objectType=Conversation", "content": "<p>It was so great to be part of this amazing panel this year at ⁦‪<span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@Defcon\" class=\"u-url mention\">@<span>Defcon</span></a></span>‬ - Bricked &amp; Abandoned: How To Keep IoT From Becoming An IoTrash. <a href=\"https://securityboulevard.com/2024/11/def-con-32-bricked-abandoned-how-to-keep-iot-from-becoming-an-iotrash/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">securityboulevard.com/2024/11/</span><span class=\"invisible\">def-con-32-bricked-abandoned-how-to-keep-iot-from-becoming-an-iotrash/</span></a></p>", "contentMap": { "en": "<p>It was so great to be part of this amazing panel this year at ⁦‪<span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@Defcon\" class=\"u-url mention\">@<span>Defcon</span></a></span>‬ - Bricked &amp; Abandoned: How To Keep IoT From Becoming An IoTrash. <a href=\"https://securityboulevard.com/2024/11/def-con-32-bricked-abandoned-how-to-keep-iot-from-becoming-an-iotrash/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">securityboulevard.com/2024/11/</span><span class=\"invisible\">def-con-32-bricked-abandoned-how-to-keep-iot-from-becoming-an-iotrash/</span></a></p>" }, "attachment": [], "tag": [ { "type": "Mention", "href": "https://infosec.exchange/users/Defcon", "name": "@Defcon" } ], "replies": { "id": "https://infosec.exchange/users/Weld/statuses/113515273427871241/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://infosec.exchange/users/Weld/statuses/113515273427871241/replies?only_other_accounts=true&page=true", "partOf": "https://infosec.exchange/users/Weld/statuses/113515273427871241/replies", "items": [] } }, "likes": { "id": "https://infosec.exchange/users/Weld/statuses/113515273427871241/likes", "type": "Collection", "totalItems": 6 }, "shares": { "id": "https://infosec.exchange/users/Weld/statuses/113515273427871241/shares", "type": "Collection", "totalItems": 4 } } }, { "id": "https://infosec.exchange/users/Weld/statuses/113504823188431402/activity", "type": "Create", "actor": "https://infosec.exchange/users/Weld", "published": "2024-11-18T16:09:14Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Weld/followers" ], "object": { "id": "https://infosec.exchange/users/Weld/statuses/113504823188431402", "type": "Note", "summary": null, "inReplyTo": null, "published": "2024-11-18T16:09:14Z", "url": "https://infosec.exchange/@Weld/113504823188431402", "attributedTo": "https://infosec.exchange/users/Weld", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Weld/followers" ], "sensitive": false, "atomUri": "https://infosec.exchange/users/Weld/statuses/113504823188431402", "inReplyToAtomUri": null, "conversation": "tag:infosec.exchange,2024-11-18:objectId=214282345:objectType=Conversation", "content": "<p>Are you going to Black Hat MEA in Riyadh next week? If so I would love the see you there. I am speaking on Wednesday about the future of automated vulnerability repair. <br /><a href=\"https://attend.blackhatevents.virtual.informatech.com/event/black-hat-mea-2024/planning/UGxhbm5pbmdfMjIyNzk2NQ\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">attend.blackhatevents.virtual.</span><span class=\"invisible\">informatech.com/event/black-hat-mea-2024/planning/UGxhbm5pbmdfMjIyNzk2NQ</span></a>==</p>", "contentMap": { "en": "<p>Are you going to Black Hat MEA in Riyadh next week? If so I would love the see you there. I am speaking on Wednesday about the future of automated vulnerability repair. <br /><a href=\"https://attend.blackhatevents.virtual.informatech.com/event/black-hat-mea-2024/planning/UGxhbm5pbmdfMjIyNzk2NQ\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">attend.blackhatevents.virtual.</span><span class=\"invisible\">informatech.com/event/black-hat-mea-2024/planning/UGxhbm5pbmdfMjIyNzk2NQ</span></a>==</p>" }, "attachment": [], "tag": [], "replies": { "id": "https://infosec.exchange/users/Weld/statuses/113504823188431402/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://infosec.exchange/users/Weld/statuses/113504823188431402/replies?only_other_accounts=true&page=true", "partOf": "https://infosec.exchange/users/Weld/statuses/113504823188431402/replies", "items": [] } }, "likes": { "id": "https://infosec.exchange/users/Weld/statuses/113504823188431402/likes", "type": "Collection", "totalItems": 4 }, "shares": { "id": "https://infosec.exchange/users/Weld/statuses/113504823188431402/shares", "type": "Collection", "totalItems": 1 } } }, { "id": "https://infosec.exchange/users/Weld/statuses/113498435991464688/activity", "type": "Create", "actor": "https://infosec.exchange/users/Weld", "published": "2024-11-17T13:04:53Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Weld/followers" ], "object": { "id": "https://infosec.exchange/users/Weld/statuses/113498435991464688", "type": "Note", "summary": null, "inReplyTo": null, "published": "2024-11-17T13:04:53Z", "url": "https://infosec.exchange/@Weld/113498435991464688", "attributedTo": "https://infosec.exchange/users/Weld", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Weld/followers" ], "sensitive": false, "atomUri": "https://infosec.exchange/users/Weld/statuses/113498435991464688", "inReplyToAtomUri": null, "conversation": "tag:infosec.exchange,2024-11-17:objectId=213935032:objectType=Conversation", "content": "<p>3 years later log4j vuln is #8 most exploited. The hype was justified. Also, why are people still using vulnerable versions and still not updating?</p><p><a href=\"https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-317a\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">cisa.gov/news-events/cybersecu</span><span class=\"invisible\">rity-advisories/aa24-317a</span></a></p>", "contentMap": { "en": "<p>3 years later log4j vuln is #8 most exploited. The hype was justified. Also, why are people still using vulnerable versions and still not updating?</p><p><a href=\"https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-317a\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">cisa.gov/news-events/cybersecu</span><span class=\"invisible\">rity-advisories/aa24-317a</span></a></p>" }, "attachment": [], "tag": [], "replies": { "id": "https://infosec.exchange/users/Weld/statuses/113498435991464688/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://infosec.exchange/users/Weld/statuses/113498435991464688/replies?only_other_accounts=true&page=true", "partOf": "https://infosec.exchange/users/Weld/statuses/113498435991464688/replies", "items": [] } }, "likes": { "id": "https://infosec.exchange/users/Weld/statuses/113498435991464688/likes", "type": "Collection", "totalItems": 53 }, "shares": { "id": "https://infosec.exchange/users/Weld/statuses/113498435991464688/shares", "type": "Collection", "totalItems": 35 } } }, { "id": "https://infosec.exchange/users/Weld/statuses/113487710040136880/activity", "type": "Create", "actor": "https://infosec.exchange/users/Weld", "published": "2024-11-15T15:37:08Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Weld/followers" ], "object": { "id": "https://infosec.exchange/users/Weld/statuses/113487710040136880", "type": "Note", "summary": null, "inReplyTo": null, "published": "2024-11-15T15:37:08Z", "url": "https://infosec.exchange/@Weld/113487710040136880", "attributedTo": "https://infosec.exchange/users/Weld", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Weld/followers" ], "sensitive": false, "atomUri": "https://infosec.exchange/users/Weld/statuses/113487710040136880", "inReplyToAtomUri": null, "conversation": "tag:infosec.exchange,2024-11-15:objectId=213379982:objectType=Conversation", "content": "<p>Have you ever wanted to find BIP39 seed phrase files on a filesystem? I wrote a python program to do that. <a href=\"https://github.com/weldp/seed_phrase_search\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">github.com/weldp/seed_phrase_s</span><span class=\"invisible\">earch</span></a> <a href=\"https://infosec.exchange/tags/Crypto\" class=\"mention hashtag\" rel=\"tag\">#<span>Crypto</span></a></p>", "contentMap": { "en": "<p>Have you ever wanted to find BIP39 seed phrase files on a filesystem? I wrote a python program to do that. <a href=\"https://github.com/weldp/seed_phrase_search\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">github.com/weldp/seed_phrase_s</span><span class=\"invisible\">earch</span></a> <a href=\"https://infosec.exchange/tags/Crypto\" class=\"mention hashtag\" rel=\"tag\">#<span>Crypto</span></a></p>" }, "attachment": [], "tag": [ { "type": "Hashtag", "href": "https://infosec.exchange/tags/crypto", "name": "#crypto" } ], "replies": { "id": "https://infosec.exchange/users/Weld/statuses/113487710040136880/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://infosec.exchange/users/Weld/statuses/113487710040136880/replies?only_other_accounts=true&page=true", "partOf": "https://infosec.exchange/users/Weld/statuses/113487710040136880/replies", "items": [] } }, "likes": { "id": "https://infosec.exchange/users/Weld/statuses/113487710040136880/likes", "type": "Collection", "totalItems": 0 }, "shares": { "id": "https://infosec.exchange/users/Weld/statuses/113487710040136880/shares", "type": "Collection", "totalItems": 3 } } }, { "id": "https://infosec.exchange/users/Weld/statuses/113482521747942757/activity", "type": "Create", "actor": "https://infosec.exchange/users/Weld", "published": "2024-11-14T17:37:41Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Weld/followers" ], "object": { "id": "https://infosec.exchange/users/Weld/statuses/113482521747942757", "type": "Note", "summary": null, "inReplyTo": null, "published": "2024-11-14T17:37:41Z", "url": "https://infosec.exchange/@Weld/113482521747942757", "attributedTo": "https://infosec.exchange/users/Weld", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Weld/followers" ], "sensitive": false, "atomUri": "https://infosec.exchange/users/Weld/statuses/113482521747942757", "inReplyToAtomUri": null, "conversation": "tag:infosec.exchange,2024-11-14:objectId=213080460:objectType=Conversation", "content": "<p>Interesting approach of combining static analysis with LLM reasoning to find vulnerabilities in code. <a href=\"https://www.linkedin.com/posts/ai4code_neurosymbolic-llms-codeql-activity-7254846670666899456-CofX/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">linkedin.com/posts/ai4code_neu</span><span class=\"invisible\">rosymbolic-llms-codeql-activity-7254846670666899456-CofX/</span></a></p>", "contentMap": { "en": "<p>Interesting approach of combining static analysis with LLM reasoning to find vulnerabilities in code. <a href=\"https://www.linkedin.com/posts/ai4code_neurosymbolic-llms-codeql-activity-7254846670666899456-CofX/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">linkedin.com/posts/ai4code_neu</span><span class=\"invisible\">rosymbolic-llms-codeql-activity-7254846670666899456-CofX/</span></a></p>" }, "attachment": [], "tag": [], "replies": { "id": "https://infosec.exchange/users/Weld/statuses/113482521747942757/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://infosec.exchange/users/Weld/statuses/113482521747942757/replies?only_other_accounts=true&page=true", "partOf": "https://infosec.exchange/users/Weld/statuses/113482521747942757/replies", "items": [] } }, "likes": { "id": "https://infosec.exchange/users/Weld/statuses/113482521747942757/likes", "type": "Collection", "totalItems": 1 }, "shares": { "id": "https://infosec.exchange/users/Weld/statuses/113482521747942757/shares", "type": "Collection", "totalItems": 4 } } }, { "id": "https://infosec.exchange/users/Weld/statuses/113482374440188338/activity", "type": "Create", "actor": "https://infosec.exchange/users/Weld", "published": "2024-11-14T17:00:13Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Weld/followers", "https://infosec.exchange/users/bradlarsen" ], "object": { "id": "https://infosec.exchange/users/Weld/statuses/113482374440188338", "type": "Note", "summary": null, "inReplyTo": "https://infosec.exchange/users/bradlarsen/statuses/113482308730596943", "published": "2024-11-14T17:00:13Z", "url": "https://infosec.exchange/@Weld/113482374440188338", "attributedTo": "https://infosec.exchange/users/Weld", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Weld/followers", "https://infosec.exchange/users/bradlarsen" ], "sensitive": false, "atomUri": "https://infosec.exchange/users/Weld/statuses/113482374440188338", "inReplyToAtomUri": "https://infosec.exchange/users/bradlarsen/statuses/113482308730596943", "conversation": "tag:infosec.exchange,2024-11-14:objectId=213061348:objectType=Conversation", "content": "<p><span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@bradlarsen\" class=\"u-url mention\">@<span>bradlarsen</span></a></span> It&#39;s a startup o perhaps it was inexperience on the team. Obviously not acceptable.</p>", "contentMap": { "en": "<p><span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@bradlarsen\" class=\"u-url mention\">@<span>bradlarsen</span></a></span> It&#39;s a startup o perhaps it was inexperience on the team. Obviously not acceptable.</p>" }, "attachment": [], "tag": [ { "type": "Mention", "href": "https://infosec.exchange/users/bradlarsen", "name": "@bradlarsen" } ], "replies": { "id": "https://infosec.exchange/users/Weld/statuses/113482374440188338/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://infosec.exchange/users/Weld/statuses/113482374440188338/replies?only_other_accounts=true&page=true", "partOf": "https://infosec.exchange/users/Weld/statuses/113482374440188338/replies", "items": [] } }, "likes": { "id": "https://infosec.exchange/users/Weld/statuses/113482374440188338/likes", "type": "Collection", "totalItems": 1 }, "shares": { "id": "https://infosec.exchange/users/Weld/statuses/113482374440188338/shares", "type": "Collection", "totalItems": 0 } } }, { "id": "https://infosec.exchange/users/Weld/statuses/113482371025100645/activity", "type": "Create", "actor": "https://infosec.exchange/users/Weld", "published": "2024-11-14T16:59:21Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Weld/followers", "https://infosec.exchange/users/malanalysis" ], "object": { "id": "https://infosec.exchange/users/Weld/statuses/113482371025100645", "type": "Note", "summary": null, "inReplyTo": "https://infosec.exchange/users/malanalysis/statuses/113482338544674910", "published": "2024-11-14T16:59:21Z", "url": "https://infosec.exchange/@Weld/113482371025100645", "attributedTo": "https://infosec.exchange/users/Weld", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Weld/followers", "https://infosec.exchange/users/malanalysis" ], "sensitive": false, "atomUri": "https://infosec.exchange/users/Weld/statuses/113482371025100645", "inReplyToAtomUri": "https://infosec.exchange/users/malanalysis/statuses/113482338544674910", "conversation": "tag:infosec.exchange,2024-11-14:objectId=213065765:objectType=Conversation", "content": "<p><span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@malanalysis\" class=\"u-url mention\">@<span>malanalysis</span></a></span> Is that because it is clear the threat actors have access to the data? Would that have to be proven with evidence of exfltration?</p>", "contentMap": { "en": "<p><span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@malanalysis\" class=\"u-url mention\">@<span>malanalysis</span></a></span> Is that because it is clear the threat actors have access to the data? Would that have to be proven with evidence of exfltration?</p>" }, "attachment": [], "tag": [ { "type": "Mention", "href": "https://infosec.exchange/users/malanalysis", "name": "@malanalysis" } ], "replies": { "id": "https://infosec.exchange/users/Weld/statuses/113482371025100645/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://infosec.exchange/users/Weld/statuses/113482371025100645/replies?only_other_accounts=true&page=true", "partOf": "https://infosec.exchange/users/Weld/statuses/113482371025100645/replies", "items": [] } }, "likes": { "id": "https://infosec.exchange/users/Weld/statuses/113482371025100645/likes", "type": "Collection", "totalItems": 0 }, "shares": { "id": "https://infosec.exchange/users/Weld/statuses/113482371025100645/shares", "type": "Collection", "totalItems": 0 } } }, { "id": "https://infosec.exchange/users/Weld/statuses/113482334707766458/activity", "type": "Create", "actor": "https://infosec.exchange/users/Weld", "published": "2024-11-14T16:50:07Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Weld/followers" ], "object": { "id": "https://infosec.exchange/users/Weld/statuses/113482334707766458", "type": "Note", "summary": null, "inReplyTo": null, "published": "2024-11-14T16:50:07Z", "url": "https://infosec.exchange/@Weld/113482334707766458", "attributedTo": "https://infosec.exchange/users/Weld", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Weld/followers" ], "sensitive": false, "atomUri": "https://infosec.exchange/users/Weld/statuses/113482334707766458", "inReplyToAtomUri": null, "conversation": "tag:infosec.exchange,2024-11-14:objectId=213065765:objectType=Conversation", "content": "<p>Ransomware actors encrypted 1.4TB data at American Assoc. Pharmacies (AAP) which oversees 2K pharmacies. AAP paid $1.3M to decrypt the data. Now the criminals want another $1.3M or they will release the data. I&#39;m not an expert on HIPAA but I think this would have a $1.5M fine cap so the criminals are coming in just under that.</p>", "contentMap": { "en": "<p>Ransomware actors encrypted 1.4TB data at American Assoc. Pharmacies (AAP) which oversees 2K pharmacies. AAP paid $1.3M to decrypt the data. Now the criminals want another $1.3M or they will release the data. I&#39;m not an expert on HIPAA but I think this would have a $1.5M fine cap so the criminals are coming in just under that.</p>" }, "attachment": [], "tag": [], "replies": { "id": "https://infosec.exchange/users/Weld/statuses/113482334707766458/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://infosec.exchange/users/Weld/statuses/113482334707766458/replies?only_other_accounts=true&page=true", "partOf": "https://infosec.exchange/users/Weld/statuses/113482334707766458/replies", "items": [] } }, "likes": { "id": "https://infosec.exchange/users/Weld/statuses/113482334707766458/likes", "type": "Collection", "totalItems": 4 }, "shares": { "id": "https://infosec.exchange/users/Weld/statuses/113482334707766458/shares", "type": "Collection", "totalItems": 3 } } }, { "id": "https://infosec.exchange/users/Weld/statuses/113482277110067630/activity", "type": "Create", "actor": "https://infosec.exchange/users/Weld", "published": "2024-11-14T16:35:28Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Weld/followers" ], "object": { "id": "https://infosec.exchange/users/Weld/statuses/113482277110067630", "type": "Note", "summary": null, "inReplyTo": null, "published": "2024-11-14T16:35:28Z", "url": "https://infosec.exchange/@Weld/113482277110067630", "attributedTo": "https://infosec.exchange/users/Weld", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Weld/followers" ], "sensitive": false, "atomUri": "https://infosec.exchange/users/Weld/statuses/113482277110067630", "inReplyToAtomUri": null, "conversation": "tag:infosec.exchange,2024-11-14:objectId=213061348:objectType=Conversation", "content": "<p>It&#39;s mind boggling that in 2024 companies with access to credit score data are publishing APIs that have inadequate authorization and allow a client who should have access to just their data access any data. This just happened to itsmydata in Germany. Hackers helping companies.</p>", "contentMap": { "en": "<p>It&#39;s mind boggling that in 2024 companies with access to credit score data are publishing APIs that have inadequate authorization and allow a client who should have access to just their data access any data. This just happened to itsmydata in Germany. Hackers helping companies.</p>" }, "attachment": [], "tag": [], "replies": { "id": "https://infosec.exchange/users/Weld/statuses/113482277110067630/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://infosec.exchange/users/Weld/statuses/113482277110067630/replies?only_other_accounts=true&page=true", "partOf": "https://infosec.exchange/users/Weld/statuses/113482277110067630/replies", "items": [] } }, "likes": { "id": "https://infosec.exchange/users/Weld/statuses/113482277110067630/likes", "type": "Collection", "totalItems": 5 }, "shares": { "id": "https://infosec.exchange/users/Weld/statuses/113482277110067630/shares", "type": "Collection", "totalItems": 2 } } }, { "id": "https://infosec.exchange/users/Weld/statuses/113482236941893645/activity", "type": "Create", "actor": "https://infosec.exchange/users/Weld", "published": "2024-11-14T16:25:15Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Weld/followers" ], "object": { "id": "https://infosec.exchange/users/Weld/statuses/113482236941893645", "type": "Note", "summary": null, "inReplyTo": null, "published": "2024-11-14T16:25:15Z", "url": "https://infosec.exchange/@Weld/113482236941893645", "attributedTo": "https://infosec.exchange/users/Weld", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Weld/followers" ], "sensitive": false, "atomUri": "https://infosec.exchange/users/Weld/statuses/113482236941893645", "inReplyToAtomUri": null, "conversation": "tag:infosec.exchange,2024-11-14:objectId=213058336:objectType=Conversation", "content": "<p>The Google Meet ClickFix attack reminds me of the days when you had to install a codec to watch a video. Now they are automating the social engineering attack the fake customer support scmmers use to get you to type or copy commands into a command window to fix your computer.</p>", "contentMap": { "en": "<p>The Google Meet ClickFix attack reminds me of the days when you had to install a codec to watch a video. Now they are automating the social engineering attack the fake customer support scmmers use to get you to type or copy commands into a command window to fix your computer.</p>" }, "attachment": [], "tag": [], "replies": { "id": "https://infosec.exchange/users/Weld/statuses/113482236941893645/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://infosec.exchange/users/Weld/statuses/113482236941893645/replies?only_other_accounts=true&page=true", "partOf": "https://infosec.exchange/users/Weld/statuses/113482236941893645/replies", "items": [] } }, "likes": { "id": "https://infosec.exchange/users/Weld/statuses/113482236941893645/likes", "type": "Collection", "totalItems": 0 }, "shares": { "id": "https://infosec.exchange/users/Weld/statuses/113482236941893645/shares", "type": "Collection", "totalItems": 0 } } }, { "id": "https://infosec.exchange/users/Weld/statuses/113477001856943076/activity", "type": "Create", "actor": "https://infosec.exchange/users/Weld", "published": "2024-11-13T18:13:54Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Weld/followers", "https://infosec.exchange/users/roblemos" ], "object": { "id": "https://infosec.exchange/users/Weld/statuses/113477001856943076", "type": "Note", "summary": null, "inReplyTo": null, "published": "2024-11-13T18:13:54Z", "url": "https://infosec.exchange/@Weld/113477001856943076", "attributedTo": "https://infosec.exchange/users/Weld", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Weld/followers", "https://infosec.exchange/users/roblemos" ], "sensitive": false, "atomUri": "https://infosec.exchange/users/Weld/statuses/113477001856943076", "inReplyToAtomUri": null, "conversation": "tag:infosec.exchange,2024-11-13:objectId=212754170:objectType=Conversation", "content": "<p>I shared my thoughts on how AI and LLMs are reshaping software security in <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@roblemos\" class=\"u-url mention\">@<span>roblemos</span></a></span>&#39;s latest article. Discussed automating bug fixes to eliminate vulnerabilities. Check it out: <a href=\"https://www.darkreading.com/application-security/ai-llms-show-promise-squashing-software-bugs\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">darkreading.com/application-se</span><span class=\"invisible\">curity/ai-llms-show-promise-squashing-software-bugs</span></a></p>", "contentMap": { "en": "<p>I shared my thoughts on how AI and LLMs are reshaping software security in <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@roblemos\" class=\"u-url mention\">@<span>roblemos</span></a></span>&#39;s latest article. Discussed automating bug fixes to eliminate vulnerabilities. Check it out: <a href=\"https://www.darkreading.com/application-security/ai-llms-show-promise-squashing-software-bugs\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">darkreading.com/application-se</span><span class=\"invisible\">curity/ai-llms-show-promise-squashing-software-bugs</span></a></p>" }, "attachment": [], "tag": [ { "type": "Mention", "href": "https://infosec.exchange/users/roblemos", "name": "@roblemos" } ], "replies": { "id": "https://infosec.exchange/users/Weld/statuses/113477001856943076/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://infosec.exchange/users/Weld/statuses/113477001856943076/replies?only_other_accounts=true&page=true", "partOf": "https://infosec.exchange/users/Weld/statuses/113477001856943076/replies", "items": [] } }, "likes": { "id": "https://infosec.exchange/users/Weld/statuses/113477001856943076/likes", "type": "Collection", "totalItems": 3 }, "shares": { "id": "https://infosec.exchange/users/Weld/statuses/113477001856943076/shares", "type": "Collection", "totalItems": 3 } } }, { "id": "https://infosec.exchange/users/Weld/statuses/113476798269472890/activity", "type": "Create", "actor": "https://infosec.exchange/users/Weld", "published": "2024-11-13T17:22:08Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Weld/followers" ], "object": { "id": "https://infosec.exchange/users/Weld/statuses/113476798269472890", "type": "Note", "summary": null, "inReplyTo": null, "published": "2024-11-13T17:22:08Z", "url": "https://infosec.exchange/@Weld/113476798269472890", "attributedTo": "https://infosec.exchange/users/Weld", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Weld/followers" ], "sensitive": false, "atomUri": "https://infosec.exchange/users/Weld/statuses/113476798269472890", "inReplyToAtomUri": null, "conversation": "tag:infosec.exchange,2024-11-13:objectId=212739382:objectType=Conversation", "content": "<p>Thrilled to share my interview with Help Net Security! 🎙️ We discuss how CISOs can quantify application risk in financial terms, manage third-party dependencies, and embed continuous risk management into <a href=\"https://infosec.exchange/tags/DevSecOps\" class=\"mention hashtag\" rel=\"tag\">#<span>DevSecOps</span></a>. <a href=\"https://www.helpnetsecurity.com/2024/11/12/chris-wysopal-veracode-application-risk-management/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">helpnetsecurity.com/2024/11/12</span><span class=\"invisible\">/chris-wysopal-veracode-application-risk-management/</span></a> <a href=\"https://infosec.exchange/tags/AppSec\" class=\"mention hashtag\" rel=\"tag\">#<span>AppSec</span></a> <a href=\"https://infosec.exchange/tags/CyberSecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>CyberSecurity</span></a></p>", "contentMap": { "en": "<p>Thrilled to share my interview with Help Net Security! 🎙️ We discuss how CISOs can quantify application risk in financial terms, manage third-party dependencies, and embed continuous risk management into <a href=\"https://infosec.exchange/tags/DevSecOps\" class=\"mention hashtag\" rel=\"tag\">#<span>DevSecOps</span></a>. <a href=\"https://www.helpnetsecurity.com/2024/11/12/chris-wysopal-veracode-application-risk-management/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">helpnetsecurity.com/2024/11/12</span><span class=\"invisible\">/chris-wysopal-veracode-application-risk-management/</span></a> <a href=\"https://infosec.exchange/tags/AppSec\" class=\"mention hashtag\" rel=\"tag\">#<span>AppSec</span></a> <a href=\"https://infosec.exchange/tags/CyberSecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>CyberSecurity</span></a></p>" }, "attachment": [], "tag": [ { "type": "Hashtag", "href": "https://infosec.exchange/tags/devsecops", "name": "#devsecops" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/appsec", "name": "#appsec" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/cybersecurity", "name": "#cybersecurity" } ], "replies": { "id": "https://infosec.exchange/users/Weld/statuses/113476798269472890/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://infosec.exchange/users/Weld/statuses/113476798269472890/replies?only_other_accounts=true&page=true", "partOf": "https://infosec.exchange/users/Weld/statuses/113476798269472890/replies", "items": [] } }, "likes": { "id": "https://infosec.exchange/users/Weld/statuses/113476798269472890/likes", "type": "Collection", "totalItems": 2 }, "shares": { "id": "https://infosec.exchange/users/Weld/statuses/113476798269472890/shares", "type": "Collection", "totalItems": 0 } } }, { "id": "https://infosec.exchange/users/Weld/statuses/113476386370261651/activity", "type": "Create", "actor": "https://infosec.exchange/users/Weld", "published": "2024-11-13T15:37:23Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Weld/followers" ], "object": { "id": "https://infosec.exchange/users/Weld/statuses/113476386370261651", "type": "Note", "summary": null, "inReplyTo": null, "published": "2024-11-13T15:37:23Z", "url": "https://infosec.exchange/@Weld/113476386370261651", "attributedTo": "https://infosec.exchange/users/Weld", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Weld/followers" ], "sensitive": false, "atomUri": "https://infosec.exchange/users/Weld/statuses/113476386370261651", "inReplyToAtomUri": null, "conversation": "tag:infosec.exchange,2024-11-13:objectId=212708664:objectType=Conversation", "content": "<p>Thrilled to share my BlueHat keynote is now live! 🎤</p><p>&quot;A Clash of Cultures Comes Together to Change Software&quot; dives into how early hacker groups like the L0pht began collaborating with tech companies, reshaping software security.</p><p>Watch here: <a href=\"https://www.youtube.com/watch?v=w6SAqT4ZQik\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">youtube.com/watch?v=w6SAqT4ZQi</span><span class=\"invisible\">k</span></a></p><p><a href=\"https://infosec.exchange/tags/BlueHat\" class=\"mention hashtag\" rel=\"tag\">#<span>BlueHat</span></a> <a href=\"https://infosec.exchange/tags/Cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>Cybersecurity</span></a> <a href=\"https://infosec.exchange/tags/Infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>Infosec</span></a> <a href=\"https://infosec.exchange/tags/Hackers\" class=\"mention hashtag\" rel=\"tag\">#<span>Hackers</span></a></p>", "contentMap": { "en": "<p>Thrilled to share my BlueHat keynote is now live! 🎤</p><p>&quot;A Clash of Cultures Comes Together to Change Software&quot; dives into how early hacker groups like the L0pht began collaborating with tech companies, reshaping software security.</p><p>Watch here: <a href=\"https://www.youtube.com/watch?v=w6SAqT4ZQik\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">youtube.com/watch?v=w6SAqT4ZQi</span><span class=\"invisible\">k</span></a></p><p><a href=\"https://infosec.exchange/tags/BlueHat\" class=\"mention hashtag\" rel=\"tag\">#<span>BlueHat</span></a> <a href=\"https://infosec.exchange/tags/Cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>Cybersecurity</span></a> <a href=\"https://infosec.exchange/tags/Infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>Infosec</span></a> <a href=\"https://infosec.exchange/tags/Hackers\" class=\"mention hashtag\" rel=\"tag\">#<span>Hackers</span></a></p>" }, "attachment": [], "tag": [ { "type": "Hashtag", "href": "https://infosec.exchange/tags/bluehat", "name": "#bluehat" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/cybersecurity", "name": "#cybersecurity" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/infosec", "name": "#infosec" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/hackers", "name": "#hackers" } ], "replies": { "id": "https://infosec.exchange/users/Weld/statuses/113476386370261651/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://infosec.exchange/users/Weld/statuses/113476386370261651/replies?only_other_accounts=true&page=true", "partOf": "https://infosec.exchange/users/Weld/statuses/113476386370261651/replies", "items": [] } }, "likes": { "id": "https://infosec.exchange/users/Weld/statuses/113476386370261651/likes", "type": "Collection", "totalItems": 13 }, "shares": { "id": "https://infosec.exchange/users/Weld/statuses/113476386370261651/shares", "type": "Collection", "totalItems": 6 } } } ] }