A small tool to view real-world ActivityPub objects as JSON! Enter a URL
or username from Mastodon or a similar service below, and we'll send a
request with
the right
Accept
header
to the server to view the underlying object.
{
"@context": [
"https://www.w3.org/ns/activitystreams",
{
"ostatus": "http://ostatus.org#",
"atomUri": "ostatus:atomUri",
"inReplyToAtomUri": "ostatus:inReplyToAtomUri",
"conversation": "ostatus:conversation",
"sensitive": "as:sensitive",
"toot": "http://joinmastodon.org/ns#",
"votersCount": "toot:votersCount",
"litepub": "http://litepub.social/ns#",
"directMessage": "litepub:directMessage",
"blurhash": "toot:blurhash",
"focalPoint": {
"@container": "@list",
"@id": "toot:focalPoint"
},
"Hashtag": "as:Hashtag"
}
],
"id": "https://infosec.exchange/users/Weld/outbox?page=true",
"type": "OrderedCollectionPage",
"next": "https://infosec.exchange/users/Weld/outbox?max_id=113476386370261651&page=true",
"prev": "https://infosec.exchange/users/Weld/outbox?min_id=113533228074388106&page=true",
"partOf": "https://infosec.exchange/users/Weld/outbox",
"orderedItems": [
{
"id": "https://infosec.exchange/users/Weld/statuses/113533228074388106/activity",
"type": "Create",
"actor": "https://infosec.exchange/users/Weld",
"published": "2024-11-23T16:32:58Z",
"to": [
"https://infosec.exchange/users/Weld/followers"
],
"cc": [
"https://www.w3.org/ns/activitystreams#Public",
"https://defcon.social/users/deviantollam",
"https://infosec.exchange/users/Tarah"
],
"object": {
"id": "https://infosec.exchange/users/Weld/statuses/113533228074388106",
"type": "Note",
"summary": null,
"inReplyTo": "https://defcon.social/users/deviantollam/statuses/113533160065106264",
"published": "2024-11-23T16:32:58Z",
"url": "https://infosec.exchange/@Weld/113533228074388106",
"attributedTo": "https://infosec.exchange/users/Weld",
"to": [
"https://infosec.exchange/users/Weld/followers"
],
"cc": [
"https://www.w3.org/ns/activitystreams#Public",
"https://defcon.social/users/deviantollam",
"https://infosec.exchange/users/Tarah"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/Weld/statuses/113533228074388106",
"inReplyToAtomUri": "https://defcon.social/users/deviantollam/statuses/113533160065106264",
"conversation": "tag:infosec.exchange,2024-11-23:objectId=215890229:objectType=Conversation",
"content": "<p><span class=\"h-card\" translate=\"no\"><a href=\"https://defcon.social/@deviantollam\" class=\"u-url mention\">@<span>deviantollam</span></a></span> great to see you and <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@Tarah\" class=\"u-url mention\">@<span>Tarah</span></a></span></p>",
"contentMap": {
"en": "<p><span class=\"h-card\" translate=\"no\"><a href=\"https://defcon.social/@deviantollam\" class=\"u-url mention\">@<span>deviantollam</span></a></span> great to see you and <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@Tarah\" class=\"u-url mention\">@<span>Tarah</span></a></span></p>"
},
"attachment": [],
"tag": [
{
"type": "Mention",
"href": "https://defcon.social/users/deviantollam",
"name": "@deviantollam@defcon.social"
},
{
"type": "Mention",
"href": "https://infosec.exchange/users/Tarah",
"name": "@Tarah"
}
],
"replies": {
"id": "https://infosec.exchange/users/Weld/statuses/113533228074388106/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/Weld/statuses/113533228074388106/replies?only_other_accounts=true&page=true",
"partOf": "https://infosec.exchange/users/Weld/statuses/113533228074388106/replies",
"items": []
}
},
"likes": {
"id": "https://infosec.exchange/users/Weld/statuses/113533228074388106/likes",
"type": "Collection",
"totalItems": 1
},
"shares": {
"id": "https://infosec.exchange/users/Weld/statuses/113533228074388106/shares",
"type": "Collection",
"totalItems": 0
}
}
},
{
"id": "https://infosec.exchange/users/Weld/statuses/113532745903268528/activity",
"type": "Create",
"actor": "https://infosec.exchange/users/Weld",
"published": "2024-11-23T14:30:21Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Weld/followers"
],
"object": {
"id": "https://infosec.exchange/users/Weld/statuses/113532745903268528",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2024-11-23T14:30:21Z",
"url": "https://infosec.exchange/@Weld/113532745903268528",
"attributedTo": "https://infosec.exchange/users/Weld",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Weld/followers"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/Weld/statuses/113532745903268528",
"inReplyToAtomUri": null,
"conversation": "tag:infosec.exchange,2024-11-23:objectId=215890229:objectType=Conversation",
"content": "<p>Today, I embark on my journey to Riyadh for Black Hat MEA. Thrilled to be invited back to deliver a keynote this Wednesday on the future—a world where code not only detects but repairs its own vulnerabilities.</p>",
"contentMap": {
"en": "<p>Today, I embark on my journey to Riyadh for Black Hat MEA. Thrilled to be invited back to deliver a keynote this Wednesday on the future—a world where code not only detects but repairs its own vulnerabilities.</p>"
},
"attachment": [
{
"type": "Document",
"mediaType": "image/png",
"url": "https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/532/745/799/694/674/original/c5231183ed26a0a7.png",
"name": null,
"blurhash": "U46@{0IAX8.9_3D%M{%M0Lx]xanO00%MxuM{",
"width": 1898,
"height": 1022
}
],
"tag": [],
"replies": {
"id": "https://infosec.exchange/users/Weld/statuses/113532745903268528/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/Weld/statuses/113532745903268528/replies?only_other_accounts=true&page=true",
"partOf": "https://infosec.exchange/users/Weld/statuses/113532745903268528/replies",
"items": []
}
},
"likes": {
"id": "https://infosec.exchange/users/Weld/statuses/113532745903268528/likes",
"type": "Collection",
"totalItems": 1
},
"shares": {
"id": "https://infosec.exchange/users/Weld/statuses/113532745903268528/shares",
"type": "Collection",
"totalItems": 0
}
}
},
{
"id": "https://infosec.exchange/users/Weld/statuses/113522941507693530/activity",
"type": "Create",
"actor": "https://infosec.exchange/users/Weld",
"published": "2024-11-21T20:56:58Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Weld/followers"
],
"object": {
"id": "https://infosec.exchange/users/Weld/statuses/113522941507693530",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2024-11-21T20:56:58Z",
"url": "https://infosec.exchange/@Weld/113522941507693530",
"attributedTo": "https://infosec.exchange/users/Weld",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Weld/followers"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/Weld/statuses/113522941507693530",
"inReplyToAtomUri": null,
"conversation": "tag:infosec.exchange,2024-11-21:objectId=215373911:objectType=Conversation",
"content": "<p>Launch of new cybertraining service TRYZUB based on Ukrainian experience in cyberwar</p><p><a href=\"https://cip.gov.ua/en/news/launch-of-new-cybertraining-service-tryzub-based-on-ukrainian-experience-in-cyberwar\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">cip.gov.ua/en/news/launch-of-n</span><span class=\"invisible\">ew-cybertraining-service-tryzub-based-on-ukrainian-experience-in-cyberwar</span></a></p>",
"contentMap": {
"en": "<p>Launch of new cybertraining service TRYZUB based on Ukrainian experience in cyberwar</p><p><a href=\"https://cip.gov.ua/en/news/launch-of-new-cybertraining-service-tryzub-based-on-ukrainian-experience-in-cyberwar\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">cip.gov.ua/en/news/launch-of-n</span><span class=\"invisible\">ew-cybertraining-service-tryzub-based-on-ukrainian-experience-in-cyberwar</span></a></p>"
},
"attachment": [],
"tag": [],
"replies": {
"id": "https://infosec.exchange/users/Weld/statuses/113522941507693530/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/Weld/statuses/113522941507693530/replies?only_other_accounts=true&page=true",
"partOf": "https://infosec.exchange/users/Weld/statuses/113522941507693530/replies",
"items": []
}
},
"likes": {
"id": "https://infosec.exchange/users/Weld/statuses/113522941507693530/likes",
"type": "Collection",
"totalItems": 5
},
"shares": {
"id": "https://infosec.exchange/users/Weld/statuses/113522941507693530/shares",
"type": "Collection",
"totalItems": 2
}
}
},
{
"id": "https://infosec.exchange/users/Weld/statuses/113516927286115609/activity",
"type": "Create",
"actor": "https://infosec.exchange/users/Weld",
"published": "2024-11-20T19:27:28Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Weld/followers"
],
"object": {
"id": "https://infosec.exchange/users/Weld/statuses/113516927286115609",
"type": "Note",
"summary": null,
"inReplyTo": "https://infosec.exchange/users/Weld/statuses/113516741984754317",
"published": "2024-11-20T19:27:28Z",
"url": "https://infosec.exchange/@Weld/113516927286115609",
"attributedTo": "https://infosec.exchange/users/Weld",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Weld/followers"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/Weld/statuses/113516927286115609",
"inReplyToAtomUri": "https://infosec.exchange/users/Weld/statuses/113516741984754317",
"conversation": "tag:infosec.exchange,2024-11-20:objectId=214998437:objectType=Conversation",
"content": "<p>Note that some of the CWEs in the list do not have any corresponding instances in the KEV:</p><p>#4 CSRF</p><p>#9 Missing Auth</p><p>#10 Unrestricted Upload of a File w/Dangerous Type</p><p>#15 Improper Privilege Mgmt</p><p>#17 Exposure of Sensitive Info</p><p>#21 Null Pointer Dereference</p><p>#24 ...</p><p><a href=\"https://cwe.mitre.org/top25/archive/2024/2024_cwe_top25.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">cwe.mitre.org/top25/archive/20</span><span class=\"invisible\">24/2024_cwe_top25.html</span></a></p>",
"contentMap": {
"en": "<p>Note that some of the CWEs in the list do not have any corresponding instances in the KEV:</p><p>#4 CSRF</p><p>#9 Missing Auth</p><p>#10 Unrestricted Upload of a File w/Dangerous Type</p><p>#15 Improper Privilege Mgmt</p><p>#17 Exposure of Sensitive Info</p><p>#21 Null Pointer Dereference</p><p>#24 ...</p><p><a href=\"https://cwe.mitre.org/top25/archive/2024/2024_cwe_top25.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">cwe.mitre.org/top25/archive/20</span><span class=\"invisible\">24/2024_cwe_top25.html</span></a></p>"
},
"attachment": [],
"tag": [],
"replies": {
"id": "https://infosec.exchange/users/Weld/statuses/113516927286115609/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/Weld/statuses/113516927286115609/replies?only_other_accounts=true&page=true",
"partOf": "https://infosec.exchange/users/Weld/statuses/113516927286115609/replies",
"items": []
}
},
"likes": {
"id": "https://infosec.exchange/users/Weld/statuses/113516927286115609/likes",
"type": "Collection",
"totalItems": 4
},
"shares": {
"id": "https://infosec.exchange/users/Weld/statuses/113516927286115609/shares",
"type": "Collection",
"totalItems": 1
}
}
},
{
"id": "https://infosec.exchange/users/Weld/statuses/113516741984754317/activity",
"type": "Create",
"actor": "https://infosec.exchange/users/Weld",
"published": "2024-11-20T18:40:21Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Weld/followers"
],
"object": {
"id": "https://infosec.exchange/users/Weld/statuses/113516741984754317",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2024-11-20T18:40:21Z",
"url": "https://infosec.exchange/@Weld/113516741984754317",
"attributedTo": "https://infosec.exchange/users/Weld",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Weld/followers"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/Weld/statuses/113516741984754317",
"inReplyToAtomUri": null,
"conversation": "tag:infosec.exchange,2024-11-20:objectId=214998437:objectType=Conversation",
"content": "<p>New CWE Top 25 for 2024 just dropped</p>",
"contentMap": {
"en": "<p>New CWE Top 25 for 2024 just dropped</p>"
},
"attachment": [
{
"type": "Document",
"mediaType": "image/png",
"url": "https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/516/741/868/348/492/original/a4995e56fc5339c0.png",
"name": null,
"blurhash": "UDN^ra4mxv%NM_t7ofRiRjofofWBM{ayogWB",
"width": 1876,
"height": 1042
}
],
"tag": [],
"replies": {
"id": "https://infosec.exchange/users/Weld/statuses/113516741984754317/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/Weld/statuses/113516741984754317/replies?min_id=113516927286115609&page=true",
"partOf": "https://infosec.exchange/users/Weld/statuses/113516741984754317/replies",
"items": [
"https://infosec.exchange/users/Weld/statuses/113516927286115609"
]
}
},
"likes": {
"id": "https://infosec.exchange/users/Weld/statuses/113516741984754317/likes",
"type": "Collection",
"totalItems": 6
},
"shares": {
"id": "https://infosec.exchange/users/Weld/statuses/113516741984754317/shares",
"type": "Collection",
"totalItems": 2
}
}
},
{
"id": "https://infosec.exchange/users/Weld/statuses/113516731326695827/activity",
"type": "Create",
"actor": "https://infosec.exchange/users/Weld",
"published": "2024-11-20T18:37:38Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Weld/followers"
],
"object": {
"id": "https://infosec.exchange/users/Weld/statuses/113516731326695827",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2024-11-20T18:37:38Z",
"url": "https://infosec.exchange/@Weld/113516731326695827",
"attributedTo": "https://infosec.exchange/users/Weld",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Weld/followers"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/Weld/statuses/113516731326695827",
"inReplyToAtomUri": null,
"conversation": "tag:infosec.exchange,2024-11-20:objectId=214997777:objectType=Conversation",
"content": "<p>New technologies bring new vulnerabilities. Introducing CWE-1427: Improper Neutralization of Input Used for LLM Prompting</p><p>The product uses externally-provided data to build prompts provided to large language models (LLMs), but the way these prompts are constructed causes the LLM to fail to distinguish between user-supplied inputs and developer provided system directives.</p>",
"contentMap": {
"en": "<p>New technologies bring new vulnerabilities. Introducing CWE-1427: Improper Neutralization of Input Used for LLM Prompting</p><p>The product uses externally-provided data to build prompts provided to large language models (LLMs), but the way these prompts are constructed causes the LLM to fail to distinguish between user-supplied inputs and developer provided system directives.</p>"
},
"attachment": [],
"tag": [],
"replies": {
"id": "https://infosec.exchange/users/Weld/statuses/113516731326695827/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/Weld/statuses/113516731326695827/replies?only_other_accounts=true&page=true",
"partOf": "https://infosec.exchange/users/Weld/statuses/113516731326695827/replies",
"items": []
}
},
"likes": {
"id": "https://infosec.exchange/users/Weld/statuses/113516731326695827/likes",
"type": "Collection",
"totalItems": 3
},
"shares": {
"id": "https://infosec.exchange/users/Weld/statuses/113516731326695827/shares",
"type": "Collection",
"totalItems": 0
}
}
},
{
"id": "https://infosec.exchange/users/Weld/statuses/113515974234114412/activity",
"type": "Create",
"actor": "https://infosec.exchange/users/Weld",
"published": "2024-11-20T15:25:06Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Weld/followers"
],
"object": {
"id": "https://infosec.exchange/users/Weld/statuses/113515974234114412",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2024-11-20T15:25:06Z",
"url": "https://infosec.exchange/@Weld/113515974234114412",
"attributedTo": "https://infosec.exchange/users/Weld",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Weld/followers"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/Weld/statuses/113515974234114412",
"inReplyToAtomUri": null,
"conversation": "tag:infosec.exchange,2024-11-20:objectId=214941166:objectType=Conversation",
"content": "<p>After 18 yrs as Veracode's CTO I have transitioned to Chief Security Evangelist. I'm excited to have more time to engage developers at meetups & conferences. You'll still see me at all the cybersecurity cons. This & the future of AppSec w/Jens Wessling & Alan Shimel: <a href=\"https://techstrong.tv/videos/interviews/the-evolution-of-application-security-integration-with-veracodes-jens-wessling-and-chris-wysopal\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">techstrong.tv/videos/interview</span><span class=\"invisible\">s/the-evolution-of-application-security-integration-with-veracodes-jens-wessling-and-chris-wysopal</span></a></p>",
"contentMap": {
"en": "<p>After 18 yrs as Veracode's CTO I have transitioned to Chief Security Evangelist. I'm excited to have more time to engage developers at meetups & conferences. You'll still see me at all the cybersecurity cons. This & the future of AppSec w/Jens Wessling & Alan Shimel: <a href=\"https://techstrong.tv/videos/interviews/the-evolution-of-application-security-integration-with-veracodes-jens-wessling-and-chris-wysopal\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">techstrong.tv/videos/interview</span><span class=\"invisible\">s/the-evolution-of-application-security-integration-with-veracodes-jens-wessling-and-chris-wysopal</span></a></p>"
},
"attachment": [],
"tag": [],
"replies": {
"id": "https://infosec.exchange/users/Weld/statuses/113515974234114412/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/Weld/statuses/113515974234114412/replies?only_other_accounts=true&page=true",
"partOf": "https://infosec.exchange/users/Weld/statuses/113515974234114412/replies",
"items": []
}
},
"likes": {
"id": "https://infosec.exchange/users/Weld/statuses/113515974234114412/likes",
"type": "Collection",
"totalItems": 18
},
"shares": {
"id": "https://infosec.exchange/users/Weld/statuses/113515974234114412/shares",
"type": "Collection",
"totalItems": 4
}
}
},
{
"id": "https://infosec.exchange/users/Weld/statuses/113515273427871241/activity",
"type": "Create",
"actor": "https://infosec.exchange/users/Weld",
"published": "2024-11-20T12:26:52Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Weld/followers",
"https://infosec.exchange/users/Defcon"
],
"object": {
"id": "https://infosec.exchange/users/Weld/statuses/113515273427871241",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2024-11-20T12:26:52Z",
"url": "https://infosec.exchange/@Weld/113515273427871241",
"attributedTo": "https://infosec.exchange/users/Weld",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Weld/followers",
"https://infosec.exchange/users/Defcon"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/Weld/statuses/113515273427871241",
"inReplyToAtomUri": null,
"conversation": "tag:infosec.exchange,2024-11-20:objectId=214893830:objectType=Conversation",
"content": "<p>It was so great to be part of this amazing panel this year at <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@Defcon\" class=\"u-url mention\">@<span>Defcon</span></a></span> - Bricked & Abandoned: How To Keep IoT From Becoming An IoTrash. <a href=\"https://securityboulevard.com/2024/11/def-con-32-bricked-abandoned-how-to-keep-iot-from-becoming-an-iotrash/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">securityboulevard.com/2024/11/</span><span class=\"invisible\">def-con-32-bricked-abandoned-how-to-keep-iot-from-becoming-an-iotrash/</span></a></p>",
"contentMap": {
"en": "<p>It was so great to be part of this amazing panel this year at <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@Defcon\" class=\"u-url mention\">@<span>Defcon</span></a></span> - Bricked & Abandoned: How To Keep IoT From Becoming An IoTrash. <a href=\"https://securityboulevard.com/2024/11/def-con-32-bricked-abandoned-how-to-keep-iot-from-becoming-an-iotrash/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">securityboulevard.com/2024/11/</span><span class=\"invisible\">def-con-32-bricked-abandoned-how-to-keep-iot-from-becoming-an-iotrash/</span></a></p>"
},
"attachment": [],
"tag": [
{
"type": "Mention",
"href": "https://infosec.exchange/users/Defcon",
"name": "@Defcon"
}
],
"replies": {
"id": "https://infosec.exchange/users/Weld/statuses/113515273427871241/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/Weld/statuses/113515273427871241/replies?only_other_accounts=true&page=true",
"partOf": "https://infosec.exchange/users/Weld/statuses/113515273427871241/replies",
"items": []
}
},
"likes": {
"id": "https://infosec.exchange/users/Weld/statuses/113515273427871241/likes",
"type": "Collection",
"totalItems": 6
},
"shares": {
"id": "https://infosec.exchange/users/Weld/statuses/113515273427871241/shares",
"type": "Collection",
"totalItems": 4
}
}
},
{
"id": "https://infosec.exchange/users/Weld/statuses/113504823188431402/activity",
"type": "Create",
"actor": "https://infosec.exchange/users/Weld",
"published": "2024-11-18T16:09:14Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Weld/followers"
],
"object": {
"id": "https://infosec.exchange/users/Weld/statuses/113504823188431402",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2024-11-18T16:09:14Z",
"url": "https://infosec.exchange/@Weld/113504823188431402",
"attributedTo": "https://infosec.exchange/users/Weld",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Weld/followers"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/Weld/statuses/113504823188431402",
"inReplyToAtomUri": null,
"conversation": "tag:infosec.exchange,2024-11-18:objectId=214282345:objectType=Conversation",
"content": "<p>Are you going to Black Hat MEA in Riyadh next week? If so I would love the see you there. I am speaking on Wednesday about the future of automated vulnerability repair. <br /><a href=\"https://attend.blackhatevents.virtual.informatech.com/event/black-hat-mea-2024/planning/UGxhbm5pbmdfMjIyNzk2NQ\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">attend.blackhatevents.virtual.</span><span class=\"invisible\">informatech.com/event/black-hat-mea-2024/planning/UGxhbm5pbmdfMjIyNzk2NQ</span></a>==</p>",
"contentMap": {
"en": "<p>Are you going to Black Hat MEA in Riyadh next week? If so I would love the see you there. I am speaking on Wednesday about the future of automated vulnerability repair. <br /><a href=\"https://attend.blackhatevents.virtual.informatech.com/event/black-hat-mea-2024/planning/UGxhbm5pbmdfMjIyNzk2NQ\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">attend.blackhatevents.virtual.</span><span class=\"invisible\">informatech.com/event/black-hat-mea-2024/planning/UGxhbm5pbmdfMjIyNzk2NQ</span></a>==</p>"
},
"attachment": [],
"tag": [],
"replies": {
"id": "https://infosec.exchange/users/Weld/statuses/113504823188431402/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/Weld/statuses/113504823188431402/replies?only_other_accounts=true&page=true",
"partOf": "https://infosec.exchange/users/Weld/statuses/113504823188431402/replies",
"items": []
}
},
"likes": {
"id": "https://infosec.exchange/users/Weld/statuses/113504823188431402/likes",
"type": "Collection",
"totalItems": 4
},
"shares": {
"id": "https://infosec.exchange/users/Weld/statuses/113504823188431402/shares",
"type": "Collection",
"totalItems": 1
}
}
},
{
"id": "https://infosec.exchange/users/Weld/statuses/113498435991464688/activity",
"type": "Create",
"actor": "https://infosec.exchange/users/Weld",
"published": "2024-11-17T13:04:53Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Weld/followers"
],
"object": {
"id": "https://infosec.exchange/users/Weld/statuses/113498435991464688",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2024-11-17T13:04:53Z",
"url": "https://infosec.exchange/@Weld/113498435991464688",
"attributedTo": "https://infosec.exchange/users/Weld",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Weld/followers"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/Weld/statuses/113498435991464688",
"inReplyToAtomUri": null,
"conversation": "tag:infosec.exchange,2024-11-17:objectId=213935032:objectType=Conversation",
"content": "<p>3 years later log4j vuln is #8 most exploited. The hype was justified. Also, why are people still using vulnerable versions and still not updating?</p><p><a href=\"https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-317a\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">cisa.gov/news-events/cybersecu</span><span class=\"invisible\">rity-advisories/aa24-317a</span></a></p>",
"contentMap": {
"en": "<p>3 years later log4j vuln is #8 most exploited. The hype was justified. Also, why are people still using vulnerable versions and still not updating?</p><p><a href=\"https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-317a\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">cisa.gov/news-events/cybersecu</span><span class=\"invisible\">rity-advisories/aa24-317a</span></a></p>"
},
"attachment": [],
"tag": [],
"replies": {
"id": "https://infosec.exchange/users/Weld/statuses/113498435991464688/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/Weld/statuses/113498435991464688/replies?only_other_accounts=true&page=true",
"partOf": "https://infosec.exchange/users/Weld/statuses/113498435991464688/replies",
"items": []
}
},
"likes": {
"id": "https://infosec.exchange/users/Weld/statuses/113498435991464688/likes",
"type": "Collection",
"totalItems": 53
},
"shares": {
"id": "https://infosec.exchange/users/Weld/statuses/113498435991464688/shares",
"type": "Collection",
"totalItems": 35
}
}
},
{
"id": "https://infosec.exchange/users/Weld/statuses/113487710040136880/activity",
"type": "Create",
"actor": "https://infosec.exchange/users/Weld",
"published": "2024-11-15T15:37:08Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Weld/followers"
],
"object": {
"id": "https://infosec.exchange/users/Weld/statuses/113487710040136880",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2024-11-15T15:37:08Z",
"url": "https://infosec.exchange/@Weld/113487710040136880",
"attributedTo": "https://infosec.exchange/users/Weld",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Weld/followers"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/Weld/statuses/113487710040136880",
"inReplyToAtomUri": null,
"conversation": "tag:infosec.exchange,2024-11-15:objectId=213379982:objectType=Conversation",
"content": "<p>Have you ever wanted to find BIP39 seed phrase files on a filesystem? I wrote a python program to do that. <a href=\"https://github.com/weldp/seed_phrase_search\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">github.com/weldp/seed_phrase_s</span><span class=\"invisible\">earch</span></a> <a href=\"https://infosec.exchange/tags/Crypto\" class=\"mention hashtag\" rel=\"tag\">#<span>Crypto</span></a></p>",
"contentMap": {
"en": "<p>Have you ever wanted to find BIP39 seed phrase files on a filesystem? I wrote a python program to do that. <a href=\"https://github.com/weldp/seed_phrase_search\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">github.com/weldp/seed_phrase_s</span><span class=\"invisible\">earch</span></a> <a href=\"https://infosec.exchange/tags/Crypto\" class=\"mention hashtag\" rel=\"tag\">#<span>Crypto</span></a></p>"
},
"attachment": [],
"tag": [
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/crypto",
"name": "#crypto"
}
],
"replies": {
"id": "https://infosec.exchange/users/Weld/statuses/113487710040136880/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/Weld/statuses/113487710040136880/replies?only_other_accounts=true&page=true",
"partOf": "https://infosec.exchange/users/Weld/statuses/113487710040136880/replies",
"items": []
}
},
"likes": {
"id": "https://infosec.exchange/users/Weld/statuses/113487710040136880/likes",
"type": "Collection",
"totalItems": 0
},
"shares": {
"id": "https://infosec.exchange/users/Weld/statuses/113487710040136880/shares",
"type": "Collection",
"totalItems": 3
}
}
},
{
"id": "https://infosec.exchange/users/Weld/statuses/113482521747942757/activity",
"type": "Create",
"actor": "https://infosec.exchange/users/Weld",
"published": "2024-11-14T17:37:41Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Weld/followers"
],
"object": {
"id": "https://infosec.exchange/users/Weld/statuses/113482521747942757",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2024-11-14T17:37:41Z",
"url": "https://infosec.exchange/@Weld/113482521747942757",
"attributedTo": "https://infosec.exchange/users/Weld",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Weld/followers"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/Weld/statuses/113482521747942757",
"inReplyToAtomUri": null,
"conversation": "tag:infosec.exchange,2024-11-14:objectId=213080460:objectType=Conversation",
"content": "<p>Interesting approach of combining static analysis with LLM reasoning to find vulnerabilities in code. <a href=\"https://www.linkedin.com/posts/ai4code_neurosymbolic-llms-codeql-activity-7254846670666899456-CofX/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">linkedin.com/posts/ai4code_neu</span><span class=\"invisible\">rosymbolic-llms-codeql-activity-7254846670666899456-CofX/</span></a></p>",
"contentMap": {
"en": "<p>Interesting approach of combining static analysis with LLM reasoning to find vulnerabilities in code. <a href=\"https://www.linkedin.com/posts/ai4code_neurosymbolic-llms-codeql-activity-7254846670666899456-CofX/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">linkedin.com/posts/ai4code_neu</span><span class=\"invisible\">rosymbolic-llms-codeql-activity-7254846670666899456-CofX/</span></a></p>"
},
"attachment": [],
"tag": [],
"replies": {
"id": "https://infosec.exchange/users/Weld/statuses/113482521747942757/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/Weld/statuses/113482521747942757/replies?only_other_accounts=true&page=true",
"partOf": "https://infosec.exchange/users/Weld/statuses/113482521747942757/replies",
"items": []
}
},
"likes": {
"id": "https://infosec.exchange/users/Weld/statuses/113482521747942757/likes",
"type": "Collection",
"totalItems": 1
},
"shares": {
"id": "https://infosec.exchange/users/Weld/statuses/113482521747942757/shares",
"type": "Collection",
"totalItems": 4
}
}
},
{
"id": "https://infosec.exchange/users/Weld/statuses/113482374440188338/activity",
"type": "Create",
"actor": "https://infosec.exchange/users/Weld",
"published": "2024-11-14T17:00:13Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Weld/followers",
"https://infosec.exchange/users/bradlarsen"
],
"object": {
"id": "https://infosec.exchange/users/Weld/statuses/113482374440188338",
"type": "Note",
"summary": null,
"inReplyTo": "https://infosec.exchange/users/bradlarsen/statuses/113482308730596943",
"published": "2024-11-14T17:00:13Z",
"url": "https://infosec.exchange/@Weld/113482374440188338",
"attributedTo": "https://infosec.exchange/users/Weld",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Weld/followers",
"https://infosec.exchange/users/bradlarsen"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/Weld/statuses/113482374440188338",
"inReplyToAtomUri": "https://infosec.exchange/users/bradlarsen/statuses/113482308730596943",
"conversation": "tag:infosec.exchange,2024-11-14:objectId=213061348:objectType=Conversation",
"content": "<p><span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@bradlarsen\" class=\"u-url mention\">@<span>bradlarsen</span></a></span> It's a startup o perhaps it was inexperience on the team. Obviously not acceptable.</p>",
"contentMap": {
"en": "<p><span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@bradlarsen\" class=\"u-url mention\">@<span>bradlarsen</span></a></span> It's a startup o perhaps it was inexperience on the team. Obviously not acceptable.</p>"
},
"attachment": [],
"tag": [
{
"type": "Mention",
"href": "https://infosec.exchange/users/bradlarsen",
"name": "@bradlarsen"
}
],
"replies": {
"id": "https://infosec.exchange/users/Weld/statuses/113482374440188338/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/Weld/statuses/113482374440188338/replies?only_other_accounts=true&page=true",
"partOf": "https://infosec.exchange/users/Weld/statuses/113482374440188338/replies",
"items": []
}
},
"likes": {
"id": "https://infosec.exchange/users/Weld/statuses/113482374440188338/likes",
"type": "Collection",
"totalItems": 1
},
"shares": {
"id": "https://infosec.exchange/users/Weld/statuses/113482374440188338/shares",
"type": "Collection",
"totalItems": 0
}
}
},
{
"id": "https://infosec.exchange/users/Weld/statuses/113482371025100645/activity",
"type": "Create",
"actor": "https://infosec.exchange/users/Weld",
"published": "2024-11-14T16:59:21Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Weld/followers",
"https://infosec.exchange/users/malanalysis"
],
"object": {
"id": "https://infosec.exchange/users/Weld/statuses/113482371025100645",
"type": "Note",
"summary": null,
"inReplyTo": "https://infosec.exchange/users/malanalysis/statuses/113482338544674910",
"published": "2024-11-14T16:59:21Z",
"url": "https://infosec.exchange/@Weld/113482371025100645",
"attributedTo": "https://infosec.exchange/users/Weld",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Weld/followers",
"https://infosec.exchange/users/malanalysis"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/Weld/statuses/113482371025100645",
"inReplyToAtomUri": "https://infosec.exchange/users/malanalysis/statuses/113482338544674910",
"conversation": "tag:infosec.exchange,2024-11-14:objectId=213065765:objectType=Conversation",
"content": "<p><span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@malanalysis\" class=\"u-url mention\">@<span>malanalysis</span></a></span> Is that because it is clear the threat actors have access to the data? Would that have to be proven with evidence of exfltration?</p>",
"contentMap": {
"en": "<p><span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@malanalysis\" class=\"u-url mention\">@<span>malanalysis</span></a></span> Is that because it is clear the threat actors have access to the data? Would that have to be proven with evidence of exfltration?</p>"
},
"attachment": [],
"tag": [
{
"type": "Mention",
"href": "https://infosec.exchange/users/malanalysis",
"name": "@malanalysis"
}
],
"replies": {
"id": "https://infosec.exchange/users/Weld/statuses/113482371025100645/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/Weld/statuses/113482371025100645/replies?only_other_accounts=true&page=true",
"partOf": "https://infosec.exchange/users/Weld/statuses/113482371025100645/replies",
"items": []
}
},
"likes": {
"id": "https://infosec.exchange/users/Weld/statuses/113482371025100645/likes",
"type": "Collection",
"totalItems": 0
},
"shares": {
"id": "https://infosec.exchange/users/Weld/statuses/113482371025100645/shares",
"type": "Collection",
"totalItems": 0
}
}
},
{
"id": "https://infosec.exchange/users/Weld/statuses/113482334707766458/activity",
"type": "Create",
"actor": "https://infosec.exchange/users/Weld",
"published": "2024-11-14T16:50:07Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Weld/followers"
],
"object": {
"id": "https://infosec.exchange/users/Weld/statuses/113482334707766458",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2024-11-14T16:50:07Z",
"url": "https://infosec.exchange/@Weld/113482334707766458",
"attributedTo": "https://infosec.exchange/users/Weld",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Weld/followers"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/Weld/statuses/113482334707766458",
"inReplyToAtomUri": null,
"conversation": "tag:infosec.exchange,2024-11-14:objectId=213065765:objectType=Conversation",
"content": "<p>Ransomware actors encrypted 1.4TB data at American Assoc. Pharmacies (AAP) which oversees 2K pharmacies. AAP paid $1.3M to decrypt the data. Now the criminals want another $1.3M or they will release the data. I'm not an expert on HIPAA but I think this would have a $1.5M fine cap so the criminals are coming in just under that.</p>",
"contentMap": {
"en": "<p>Ransomware actors encrypted 1.4TB data at American Assoc. Pharmacies (AAP) which oversees 2K pharmacies. AAP paid $1.3M to decrypt the data. Now the criminals want another $1.3M or they will release the data. I'm not an expert on HIPAA but I think this would have a $1.5M fine cap so the criminals are coming in just under that.</p>"
},
"attachment": [],
"tag": [],
"replies": {
"id": "https://infosec.exchange/users/Weld/statuses/113482334707766458/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/Weld/statuses/113482334707766458/replies?only_other_accounts=true&page=true",
"partOf": "https://infosec.exchange/users/Weld/statuses/113482334707766458/replies",
"items": []
}
},
"likes": {
"id": "https://infosec.exchange/users/Weld/statuses/113482334707766458/likes",
"type": "Collection",
"totalItems": 4
},
"shares": {
"id": "https://infosec.exchange/users/Weld/statuses/113482334707766458/shares",
"type": "Collection",
"totalItems": 3
}
}
},
{
"id": "https://infosec.exchange/users/Weld/statuses/113482277110067630/activity",
"type": "Create",
"actor": "https://infosec.exchange/users/Weld",
"published": "2024-11-14T16:35:28Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Weld/followers"
],
"object": {
"id": "https://infosec.exchange/users/Weld/statuses/113482277110067630",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2024-11-14T16:35:28Z",
"url": "https://infosec.exchange/@Weld/113482277110067630",
"attributedTo": "https://infosec.exchange/users/Weld",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Weld/followers"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/Weld/statuses/113482277110067630",
"inReplyToAtomUri": null,
"conversation": "tag:infosec.exchange,2024-11-14:objectId=213061348:objectType=Conversation",
"content": "<p>It's mind boggling that in 2024 companies with access to credit score data are publishing APIs that have inadequate authorization and allow a client who should have access to just their data access any data. This just happened to itsmydata in Germany. Hackers helping companies.</p>",
"contentMap": {
"en": "<p>It's mind boggling that in 2024 companies with access to credit score data are publishing APIs that have inadequate authorization and allow a client who should have access to just their data access any data. This just happened to itsmydata in Germany. Hackers helping companies.</p>"
},
"attachment": [],
"tag": [],
"replies": {
"id": "https://infosec.exchange/users/Weld/statuses/113482277110067630/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/Weld/statuses/113482277110067630/replies?only_other_accounts=true&page=true",
"partOf": "https://infosec.exchange/users/Weld/statuses/113482277110067630/replies",
"items": []
}
},
"likes": {
"id": "https://infosec.exchange/users/Weld/statuses/113482277110067630/likes",
"type": "Collection",
"totalItems": 5
},
"shares": {
"id": "https://infosec.exchange/users/Weld/statuses/113482277110067630/shares",
"type": "Collection",
"totalItems": 2
}
}
},
{
"id": "https://infosec.exchange/users/Weld/statuses/113482236941893645/activity",
"type": "Create",
"actor": "https://infosec.exchange/users/Weld",
"published": "2024-11-14T16:25:15Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Weld/followers"
],
"object": {
"id": "https://infosec.exchange/users/Weld/statuses/113482236941893645",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2024-11-14T16:25:15Z",
"url": "https://infosec.exchange/@Weld/113482236941893645",
"attributedTo": "https://infosec.exchange/users/Weld",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Weld/followers"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/Weld/statuses/113482236941893645",
"inReplyToAtomUri": null,
"conversation": "tag:infosec.exchange,2024-11-14:objectId=213058336:objectType=Conversation",
"content": "<p>The Google Meet ClickFix attack reminds me of the days when you had to install a codec to watch a video. Now they are automating the social engineering attack the fake customer support scmmers use to get you to type or copy commands into a command window to fix your computer.</p>",
"contentMap": {
"en": "<p>The Google Meet ClickFix attack reminds me of the days when you had to install a codec to watch a video. Now they are automating the social engineering attack the fake customer support scmmers use to get you to type or copy commands into a command window to fix your computer.</p>"
},
"attachment": [],
"tag": [],
"replies": {
"id": "https://infosec.exchange/users/Weld/statuses/113482236941893645/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/Weld/statuses/113482236941893645/replies?only_other_accounts=true&page=true",
"partOf": "https://infosec.exchange/users/Weld/statuses/113482236941893645/replies",
"items": []
}
},
"likes": {
"id": "https://infosec.exchange/users/Weld/statuses/113482236941893645/likes",
"type": "Collection",
"totalItems": 0
},
"shares": {
"id": "https://infosec.exchange/users/Weld/statuses/113482236941893645/shares",
"type": "Collection",
"totalItems": 0
}
}
},
{
"id": "https://infosec.exchange/users/Weld/statuses/113477001856943076/activity",
"type": "Create",
"actor": "https://infosec.exchange/users/Weld",
"published": "2024-11-13T18:13:54Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Weld/followers",
"https://infosec.exchange/users/roblemos"
],
"object": {
"id": "https://infosec.exchange/users/Weld/statuses/113477001856943076",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2024-11-13T18:13:54Z",
"url": "https://infosec.exchange/@Weld/113477001856943076",
"attributedTo": "https://infosec.exchange/users/Weld",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Weld/followers",
"https://infosec.exchange/users/roblemos"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/Weld/statuses/113477001856943076",
"inReplyToAtomUri": null,
"conversation": "tag:infosec.exchange,2024-11-13:objectId=212754170:objectType=Conversation",
"content": "<p>I shared my thoughts on how AI and LLMs are reshaping software security in <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@roblemos\" class=\"u-url mention\">@<span>roblemos</span></a></span>'s latest article. Discussed automating bug fixes to eliminate vulnerabilities. Check it out: <a href=\"https://www.darkreading.com/application-security/ai-llms-show-promise-squashing-software-bugs\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">darkreading.com/application-se</span><span class=\"invisible\">curity/ai-llms-show-promise-squashing-software-bugs</span></a></p>",
"contentMap": {
"en": "<p>I shared my thoughts on how AI and LLMs are reshaping software security in <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@roblemos\" class=\"u-url mention\">@<span>roblemos</span></a></span>'s latest article. Discussed automating bug fixes to eliminate vulnerabilities. Check it out: <a href=\"https://www.darkreading.com/application-security/ai-llms-show-promise-squashing-software-bugs\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">darkreading.com/application-se</span><span class=\"invisible\">curity/ai-llms-show-promise-squashing-software-bugs</span></a></p>"
},
"attachment": [],
"tag": [
{
"type": "Mention",
"href": "https://infosec.exchange/users/roblemos",
"name": "@roblemos"
}
],
"replies": {
"id": "https://infosec.exchange/users/Weld/statuses/113477001856943076/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/Weld/statuses/113477001856943076/replies?only_other_accounts=true&page=true",
"partOf": "https://infosec.exchange/users/Weld/statuses/113477001856943076/replies",
"items": []
}
},
"likes": {
"id": "https://infosec.exchange/users/Weld/statuses/113477001856943076/likes",
"type": "Collection",
"totalItems": 3
},
"shares": {
"id": "https://infosec.exchange/users/Weld/statuses/113477001856943076/shares",
"type": "Collection",
"totalItems": 3
}
}
},
{
"id": "https://infosec.exchange/users/Weld/statuses/113476798269472890/activity",
"type": "Create",
"actor": "https://infosec.exchange/users/Weld",
"published": "2024-11-13T17:22:08Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Weld/followers"
],
"object": {
"id": "https://infosec.exchange/users/Weld/statuses/113476798269472890",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2024-11-13T17:22:08Z",
"url": "https://infosec.exchange/@Weld/113476798269472890",
"attributedTo": "https://infosec.exchange/users/Weld",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Weld/followers"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/Weld/statuses/113476798269472890",
"inReplyToAtomUri": null,
"conversation": "tag:infosec.exchange,2024-11-13:objectId=212739382:objectType=Conversation",
"content": "<p>Thrilled to share my interview with Help Net Security! 🎙️ We discuss how CISOs can quantify application risk in financial terms, manage third-party dependencies, and embed continuous risk management into <a href=\"https://infosec.exchange/tags/DevSecOps\" class=\"mention hashtag\" rel=\"tag\">#<span>DevSecOps</span></a>. <a href=\"https://www.helpnetsecurity.com/2024/11/12/chris-wysopal-veracode-application-risk-management/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">helpnetsecurity.com/2024/11/12</span><span class=\"invisible\">/chris-wysopal-veracode-application-risk-management/</span></a> <a href=\"https://infosec.exchange/tags/AppSec\" class=\"mention hashtag\" rel=\"tag\">#<span>AppSec</span></a> <a href=\"https://infosec.exchange/tags/CyberSecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>CyberSecurity</span></a></p>",
"contentMap": {
"en": "<p>Thrilled to share my interview with Help Net Security! 🎙️ We discuss how CISOs can quantify application risk in financial terms, manage third-party dependencies, and embed continuous risk management into <a href=\"https://infosec.exchange/tags/DevSecOps\" class=\"mention hashtag\" rel=\"tag\">#<span>DevSecOps</span></a>. <a href=\"https://www.helpnetsecurity.com/2024/11/12/chris-wysopal-veracode-application-risk-management/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">helpnetsecurity.com/2024/11/12</span><span class=\"invisible\">/chris-wysopal-veracode-application-risk-management/</span></a> <a href=\"https://infosec.exchange/tags/AppSec\" class=\"mention hashtag\" rel=\"tag\">#<span>AppSec</span></a> <a href=\"https://infosec.exchange/tags/CyberSecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>CyberSecurity</span></a></p>"
},
"attachment": [],
"tag": [
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/devsecops",
"name": "#devsecops"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/appsec",
"name": "#appsec"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/cybersecurity",
"name": "#cybersecurity"
}
],
"replies": {
"id": "https://infosec.exchange/users/Weld/statuses/113476798269472890/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/Weld/statuses/113476798269472890/replies?only_other_accounts=true&page=true",
"partOf": "https://infosec.exchange/users/Weld/statuses/113476798269472890/replies",
"items": []
}
},
"likes": {
"id": "https://infosec.exchange/users/Weld/statuses/113476798269472890/likes",
"type": "Collection",
"totalItems": 2
},
"shares": {
"id": "https://infosec.exchange/users/Weld/statuses/113476798269472890/shares",
"type": "Collection",
"totalItems": 0
}
}
},
{
"id": "https://infosec.exchange/users/Weld/statuses/113476386370261651/activity",
"type": "Create",
"actor": "https://infosec.exchange/users/Weld",
"published": "2024-11-13T15:37:23Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Weld/followers"
],
"object": {
"id": "https://infosec.exchange/users/Weld/statuses/113476386370261651",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2024-11-13T15:37:23Z",
"url": "https://infosec.exchange/@Weld/113476386370261651",
"attributedTo": "https://infosec.exchange/users/Weld",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Weld/followers"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/Weld/statuses/113476386370261651",
"inReplyToAtomUri": null,
"conversation": "tag:infosec.exchange,2024-11-13:objectId=212708664:objectType=Conversation",
"content": "<p>Thrilled to share my BlueHat keynote is now live! 🎤</p><p>"A Clash of Cultures Comes Together to Change Software" dives into how early hacker groups like the L0pht began collaborating with tech companies, reshaping software security.</p><p>Watch here: <a href=\"https://www.youtube.com/watch?v=w6SAqT4ZQik\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">youtube.com/watch?v=w6SAqT4ZQi</span><span class=\"invisible\">k</span></a></p><p><a href=\"https://infosec.exchange/tags/BlueHat\" class=\"mention hashtag\" rel=\"tag\">#<span>BlueHat</span></a> <a href=\"https://infosec.exchange/tags/Cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>Cybersecurity</span></a> <a href=\"https://infosec.exchange/tags/Infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>Infosec</span></a> <a href=\"https://infosec.exchange/tags/Hackers\" class=\"mention hashtag\" rel=\"tag\">#<span>Hackers</span></a></p>",
"contentMap": {
"en": "<p>Thrilled to share my BlueHat keynote is now live! 🎤</p><p>"A Clash of Cultures Comes Together to Change Software" dives into how early hacker groups like the L0pht began collaborating with tech companies, reshaping software security.</p><p>Watch here: <a href=\"https://www.youtube.com/watch?v=w6SAqT4ZQik\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">youtube.com/watch?v=w6SAqT4ZQi</span><span class=\"invisible\">k</span></a></p><p><a href=\"https://infosec.exchange/tags/BlueHat\" class=\"mention hashtag\" rel=\"tag\">#<span>BlueHat</span></a> <a href=\"https://infosec.exchange/tags/Cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>Cybersecurity</span></a> <a href=\"https://infosec.exchange/tags/Infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>Infosec</span></a> <a href=\"https://infosec.exchange/tags/Hackers\" class=\"mention hashtag\" rel=\"tag\">#<span>Hackers</span></a></p>"
},
"attachment": [],
"tag": [
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/bluehat",
"name": "#bluehat"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/cybersecurity",
"name": "#cybersecurity"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/infosec",
"name": "#infosec"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/hackers",
"name": "#hackers"
}
],
"replies": {
"id": "https://infosec.exchange/users/Weld/statuses/113476386370261651/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/Weld/statuses/113476386370261651/replies?only_other_accounts=true&page=true",
"partOf": "https://infosec.exchange/users/Weld/statuses/113476386370261651/replies",
"items": []
}
},
"likes": {
"id": "https://infosec.exchange/users/Weld/statuses/113476386370261651/likes",
"type": "Collection",
"totalItems": 13
},
"shares": {
"id": "https://infosec.exchange/users/Weld/statuses/113476386370261651/shares",
"type": "Collection",
"totalItems": 6
}
}
}
]
}