Westbam on Nostr: From Vulnerability to Exploitation TTE (Time-to-Exploit) measures the gap between CVE ...
From Vulnerability to Exploitation
TTE (Time-to-Exploit) measures the gap between CVE disclosure and confirmed exploitation. #nostr #nostrfr #cybersecurity
https://zerodayclock.com/Published at
2026-04-01 17:52:56 UTCEvent JSON
{
"id": "00008140f6249e635dc9356788971a8ea2631c1038d61fd5d81223e5f5c67bcd",
"pubkey": "3ed7fd020e113dfdb66ba2129f131ce7a46b9fb6b7838eb5a5d660dbc0d0e745",
"created_at": 1775065976,
"kind": 1,
"tags": [
[
"t",
"nostr"
],
[
"t",
"nostrfr"
],
[
"t",
"cybersecurity"
],
[
"client",
"Wisp"
],
[
"nonce",
"43590",
"16"
]
],
"content": "From Vulnerability to Exploitation\nTTE (Time-to-Exploit) measures the gap between CVE disclosure and confirmed exploitation. #nostr #nostrfr #cybersecurity \nhttps://zerodayclock.com/",
"sig": "ca50535df627adc13ab313b0a00bb3a59733f98d4ce039d52632a3802e8a6f02ebc3a370e2fef9e4790e41f635a8f9cf706329bd8eb61585eb48b4564f35165e"
}