Eric Hutchins
@ehutchins.bsky.social
1.7K followers
1.3K following
140 posts
Started in infosec, co-authored the kill chain paper, dabbled in countering influence operations at Meta, and now back to infosec. Lover of command line, python, and rust.
Posts
Media
Videos
Starter Packs
Reposted by Eric Hutchins
Reposted by Eric Hutchins
Reposted by Eric Hutchins
Andrew Exum
@exum.bsky.social
· 26d
Reposted by Eric Hutchins
jamelle
@jamellebouie.net
· Sep 30
Reposted by Eric Hutchins
emptywheel
@emptywheel.bsky.social
· Sep 30
Hegseth: "Today, at my direction, the era of unprofessional appearance is over. No more beardos ... if you don't meet the male-level physical standards for combat positions, cannot pass a PT test or don't want to shave and look professional, it's time for a new position."
Eric Hutchins
@ehutchins.bsky.social
· Sep 12
millennials are band directors now and I think that’s terrific
Eric Hutchins
@ehutchins.bsky.social
· Aug 25
I've been working on a new fuzzy search file picker for Toad (my terminal AI interface).
It is similar to the other terminal based agentic coding tools, but I want to address a few UX issues, and hopefully make it prettier in the process!
It is similar to the other terminal based agentic coding tools, but I want to address a few UX issues, and hopefully make it prettier in the process!
Reposted by Eric Hutchins
Zeddy
@zeddary.bsky.social
· Aug 14
Eric Hutchins
@ehutchins.bsky.social
· Aug 7
A Taxonomy and Feature set for Server-Side Identification of Proxies (Technical Report) | OSTI.GOV
Malicious actors frequently use proxies and VPNs to evade detection and hide their origin. Currentchallenges to information security include residential proxies and Man-in-the-Middle phishingproxies w...
www.osti.gov
Eric Hutchins
@ehutchins.bsky.social
· Jul 31
🆕 GreyNoise Research: Early Warning Signals Before CVEs Drop
In our latest research, we examined dozens of incidents where attacker activity — often in the form of exploit attempts — spiked weeks before a new CVE was disclosed.
One chart shows what we found (much more in the report):
In our latest research, we examined dozens of incidents where attacker activity — often in the form of exploit attempts — spiked weeks before a new CVE was disclosed.
One chart shows what we found (much more in the report):
Eric Hutchins
@ehutchins.bsky.social
· Jul 27