Michael Rogers

933 posts

Michael Rogers banner
Michael Rogers

Michael Rogers

@ANC13NT

Don't be a Cyber Zero be a Cyber Hero. Interesting in Threat Hunting, Forensics, Incident Response, Threat Intel, and 'hack all of the things'.

Tampa, FL Katılım Mart 2011
1.8K Takip Edilen559 Takipçiler
Michael Rogers
Michael Rogers@ANC13NT·
Lets go!! Be sure to check out Unicon 2026. cc: @mox_five
SCYTHE@scythe_io

🦄 Unicon 2026 is here! On April 9 from 11 AM to 5:30 PM ET, we're bringing together some of the sharpest minds in cybersecurity to tackle one of the most pressing topics in our industry: Continuous Validation in the Age of AI. Hear from practitioners and leaders working at the intersection of threat emulation, detection engineering, and AI-driven threats: Bryson Bort (@brysonbort) Caroline Wong Jason Christopher (@jdchristopher) Scott Hamilton Alex Waitkus Michael Rogers (@ANC13NT) AI-driven threats are accelerating, but most security teams are still validating controls the same way they did two years ago. That gap between your testing cadence and the adversary's pace is where breaches happen. Join us for a full day of insights, real-world strategies, and the kind of candid conversations that only UniCon delivers. Register here: scythe.io/join-unicon-20… #UniCon2026 #ContinuousValidation #ThreatEmulation

English
0
0
3
58
Michael Rogers retweetledi
NSA Cyber
NSA Cyber@NSACyber·
Improper Secure Boot configuration could be putting your organizations at a greater risk of exposure to threats. Our guidance outlines how to check for proper configuration and recover if needed. Review here! 🔗media.defense.gov/2025/Dec/11/20…
NSA Cyber@NSACyber

We recently published guidance on how to addresses challenges associated with Secure Boot configuration. If you’re a network defender or device owner who’s unclear on how Secure Boot interacts with other protective tech, read on. 🔗media.defense.gov/2025/Dec/11/20…

English
38
108
450
57K
Michael Rogers retweetledi
BSides Tampa IT Security Conference
🍂 Happy Thanksgiving! 🍂 We are profoundly thankful for each one of you and the joy you bring into our lives. This special holiday is a wonderful occasion to express our gratitude and appreciation for the support and
BSides Tampa IT Security Conference tweet media
English
1
2
4
116
Michael Rogers
Michael Rogers@ANC13NT·
@IAMERICAbooted I think you are onto something here.. Config management needs to be taken more seriously.
English
0
0
0
12
Michael Rogers
Michael Rogers@ANC13NT·
Made it back to vegas! Looking forward to catching up with everyone.
Michael Rogers tweet media
The Las Vegas Strip, Paradise 🇺🇸 English
2
0
4
98
Michael Rogers
Michael Rogers@ANC13NT·
@DJRorok Hackers always wear hoodies. Ignore the fact that it's 96 degrees right now in Vegas.
English
0
0
0
9
Tyler
Tyler@DJRorok·
@ANC13NT Nice black hoodie (it’s literally summer time)
English
1
0
1
15
Michael Rogers
Michael Rogers@ANC13NT·
@brysonbort 🧠30 Minute Talk - 15 Minute Questions - 15 Minute Walk Up/Networking
English
0
0
2
43
Bryson 🦄
Bryson 🦄@brysonbort·
How long should a talk be at a conference?
English
32
0
19
5.8K
Michael Rogers
Michael Rogers@ANC13NT·
Heading to Fal.Con tomorrow! cc: @CrowdStrike - If you're there, send me a note to meet up!
English
0
0
1
84
Michael Rogers retweetledi
MOXFIVE
MOXFIVE@mox_five·
Our latest MOXFIVE Monthly Insights is out! July brought a surge in ransomware activity with Inc. emerging as the most deployed variant, overtaking Akira and Qilin. The Technology sector was the most targeted, followed by Healthcare and Manufacturing. Several campaigns deploying Akira ransomware were linked to a previously disclosed vulnerability in the SonicWall SSL VPM (CVE-2024-40766). In our Case Study, we look at the SharePoint Zero-Day (CVE-2025-49704/06) which was used by multiple threat actors including state-backed groups. 🛡️ What Organizations Should Do: • Patch fast, rotate credentials, and harden external-facing apps • Segment networks, protect backups, and test recovery • Use EDR and monitor for post-exploit behavior As threat actors evolve, so must your defenses. MOXFIVE is here to help with response, recovery, and building resilient environments. Read the full Monthly Insights at bit.ly/3V9t7Ts #CyberSecurity #Ransomware #ThreatIntel #IncidentResponse #Akira #Qilin
MOXFIVE tweet media
English
0
3
3
162
Michael Rogers
Michael Rogers@ANC13NT·
Client’s vendor sent 4 hashes to them… almost 3 weeks after a breach. 🤦‍♂️ ✅ Good: full IOC set (IPs/domains, file hashes, shared compromised accounts, general TTPs) ⚠️ Okay: partial list 🚩 Bad: just hashes, late 🤮 #CyberSecurity #IOCs
English
0
0
0
68
Michael Rogers retweetledi
Dave Kennedy
Dave Kennedy@HackingDave·
Johnny be good
English
11
15
162
6.6K