Eric Hutchins

377 Followers
385 Following
114 Posts
Started in infosec, dabbled in countering influence operations at Meta, and now back to infosec. Lover of command line, python, and rust.
Twittertwitter.com/killchain
Keybasekeybase.io/ehutchins
Githubgithub.com/erichutchins
Blueskybsky.app/profile/ehutchins.bsky.social
Threadswww.threads.net/@eric.m.hutch

And getting your bosses to have to say it to their bosses

RE: https://hachyderm.io/@evacide/113540953769511827

evacide (@[email protected])

Sure, it's easy to make fun of the ridiculous naming conventions for APTs, but have you considered that giving a new APT a hilarious name is one of the great joys of doing infosec?

Hachyderm.io
Sure, it's easy to make fun of the ridiculous naming conventions for APTs, but have you considered that giving a new APT a hilarious name is one of the great joys of doing infosec?
We love working with industry as they research and uncover complex cyber intrusions. Sometimes it gets a little competitive though.

After reading a handful of #CTI #ThreatIntel public reports this morning, I'm just going to put this out there: one of the most effective ways to level up your #infosec game is through taking a professional or technical writing class.

That is all.

Interesting aspect of today's announcement by Microsoft that they're moving toward a new, tiered/nested #CTI #ThreatActor naming schema: in moving away from element names as placeholders for activity groups/clusters as defined through a methodology like #DiamondModel, and towards a schema that posits definite value in adversary attributes (primarily geography, for now), has Microsoft Threat Intel changed some aspects of methodology and clustering to include increasing amounts of "who-focused" linking?

FWIW, they're one of the only private shops that I think could do that sort of linking with any degree of success or accuracy on a consistent basis.

Not long now before we kick off our flagship event in the amazing city of Belfast. Looking forward to catching up with old friends and making new ones in the ever expanding cyber security community. If you’re not joining us in person, follow our YouTube channel for some great talks and speakers. https://www.cyberuk.uk
CYBERUK 2024

Discover more about the UK government's flagship cyber security conference, coming to Birmingham on 13-15 May.

21yo Air National Guard intel dweeb is responsible for the most serious intel leaks/losses of the last several years because he was trying to impress some other dweebs in a fucking gamer/influencer worshiping chat you can't make this shit up folks
#trurl by Daniel Stenberg https://youtu.be/oDL7DVszr2w - a run-through of the new tool and how to use it
trurl by Daniel Stenberg

Auf YouTube findest du die angesagtesten Videos und Tracks. Außerdem kannst du eigene Inhalte hochladen und mit Freunden oder gleich der ganzen Welt teilen.

YouTube