Max Rogers

1.8K posts

Max Rogers banner
Max Rogers

Max Rogers

@MaxRogers5

Sr. Director of SOC at Huntress. Ex-Mandiant/FireEye. Bringing security to the Fortune 5,000,000.

Charlotte, NC Katılım Ocak 2012
1.1K Takip Edilen3.4K Takipçiler
Max Rogers retweetledi
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
My team published detection content for the Notepad++ / Lotus Blossom activity - both the concrete post-compromise artifacts and more generic gup.exe updater anomaly hunting Sigma gup.exe anomalies - uncommon DNS - uncommon file drops - suspicious child processes) github.com/SigmaHQ/sigma/… by @_swachchhanda_ YARA - Chrysalis loader/backdoor - related components github.com/Neo23x0/signat… by @X__Junior IOCs (filenames etc.) #L4551" target="_blank" rel="nofollow noopener">github.com/Neo23x0/signat… #NotepadPlusPlusCompromise
Florian Roth ⚡️ tweet mediaFlorian Roth ⚡️ tweet mediaFlorian Roth ⚡️ tweet mediaFlorian Roth ⚡️ tweet media
English
7
145
579
39.2K
Max Rogers retweetledi
Jai Minton
Jai Minton@CyberRaiju·
Episode 2 of Breach Log is now available! Special thanks to Max Margolis for joining me and telling his story. If you have a story you'd like to share, get in contact and we can have some fun. open.spotify.com/episode/4SDz0R…
English
0
2
7
963
Max Rogers retweetledi
SANS Institute
SANS Institute@SANSInstitute·
The Cybersecurity Company of the Year Award 🏢 celebrates a company delivering top-tier security services and products while leading with integrity and community spirit. The Community Winner for 2025 goes to @HuntressLabs. Congratulations! #SANSDMA
SANS Institute tweet media
English
2
7
30
11.1K
Max Rogers
Max Rogers@MaxRogers5·
Congrats @RussianPanda9xx for winning the Community Cyber Defender Practitioner of the Year award in the 2025 SANS Difference Makers Awards! First award for a @HuntressLabs teammate! #SANSDMA
English
2
8
76
16.8K
Max Rogers
Max Rogers@MaxRogers5·
Congrats to @fr0gger_ for winning Innovation of the Year at the 2025 SANS Difference Makers Awards for his tool NOVA. An impressive tool enabling threat detection in a new AI based attack surface. #SANSDMA
English
2
3
19
1.3K
Max Rogers
Max Rogers@MaxRogers5·
We are kicking off the SANS Difference Makers Awards! It’s great to share space with so many people working to advance cyber security. I’ll be hanging out on behalf of @HuntressLabs. I’m also thrilled to see many friends like @fr0gger_ nominated! #SANSDMA
Max Rogers tweet media
English
1
2
15
1.8K
Will
Will@BushidoToken·
It’s always bemused me how after years of CTI sharing, we’ve still not standardised intel sharing on IP addresses… Funnily enough, Salesforce actually did the best job here IMO versus two veteran cybersecurity vendors CrowdStrike & ESET
Will tweet mediaWill tweet mediaWill tweet media
English
8
27
144
14.6K
Max Rogers retweetledi
Will
Will@BushidoToken·
When sharing CTI on IPs, Context is Key 🔑 - First/Last Seen (Timestamps!) - Observables (like VPN brand / proxy network) - Hosting Provider (ASN) - DNS Records (relevant domains on the IP) - Purpose and/or Type (C2, Payload Host, Proxy, etc) 🫳🎤
English
0
10
62
5.6K
Max Rogers
Max Rogers@MaxRogers5·
It’s SANS Difference Maker Eve! #SANSDMA @HuntressLabs has a few folks nominated and is also nominated for Cyber Security Company of the Year! If you’re attending please come find me and say hello! 👋 See you tomorrow @SANSInstitute!
English
0
1
7
854
Max Rogers retweetledi
SANS Institute
SANS Institute@SANSInstitute·
The 2025 SANS #HolidayHack Challenge is officially open! 🎄 Celebrate 10 yrs of festive hacking fun with fast micro-challenges, epic capstone puzzles, a new CTF-only mode, and more! Can you uncover what’s stirring beneath the 8-bit neighborhood? ❄️ Join free → go.sans.org/eumn5C
SANS Institute tweet media
English
1
13
28
8.5K
Max Rogers retweetledi
Anton
Anton@Antonlovesdnb·
The @HuntressLabs blog has been on fire lately - tons of content and cool tradecraft around Linux, macOS & ESXi - honestly even I can’t keep up with it all and I work there and get to see all this come together 😅 Worth a bookmark: huntress.com/blog
English
0
6
31
2.5K
Max Rogers retweetledi
RussianPanda 🐼 🇺🇦
RussianPanda 🐼 🇺🇦@RussianPanda9xx·
Super hyped to share that @HuntressLabs published a Rapid Response blog on the recent #React2Shell post-exploitations observed. We discovered and analyzed a few payloads that were named #PeerBlight, #CowTunnel and #ZinFoq. We also observed a variant of #Kaiji malware. 3 Modelo's 🍺 in and the malware started making sense. By the 4th one I was naming them like Pokémon except way more unhinged. PeerBlight, I choose you! Thank you for your contributions @sudo_Rem, @LindseyOD123, @_JohnHammond, @bumbucha, and @aaron_deal. Couldn’t have done it without your support ❤️ huntress.com/blog/peerbligh…
English
11
40
168
76.1K
Max Rogers retweetledi
Ben
Ben@polygonben·
⚠️ Super excited to release TWO React2Shell blogs with @xorJosh! ctrlaltint3l.github.io/threat%20resea… ctrlaltint3l.github.io/threat%20resea… We've been hunting down TAs causing havoc, scanning and exploiting React2Shell on the internet. Especially the ones making OPSEC Ls... One group we've tracked decided to attack a @HuntressLabs partner today. They were contained quickly and were not happy with us 😎 #React2Shell #OPSEC
Ben tweet media
English
1
7
14
1.5K
Max Rogers retweetledi
John Hammond
John Hammond@_JohnHammond·
Errybody screaming about React2Shell so we wanted to give ya something you haven't already heard😁 Here's a beast of a blog post on malware we've seen from post-exploitation, detailing a wild Linux backdoor and more -- all from the amazing & incredible @RussianPanda9xx & co.😎 huntress.com/blog/peerbligh…
John Hammond tweet media
RussianPanda 🐼 🇺🇦@RussianPanda9xx

Super hyped to share that @HuntressLabs published a Rapid Response blog on the recent #React2Shell post-exploitations observed. We discovered and analyzed a few payloads that were named #PeerBlight, #CowTunnel and #ZinFoq. We also observed a variant of #Kaiji malware. 3 Modelo's 🍺 in and the malware started making sense. By the 4th one I was naming them like Pokémon except way more unhinged. PeerBlight, I choose you! Thank you for your contributions @sudo_Rem, @LindseyOD123, @_JohnHammond, @bumbucha, and @aaron_deal. Couldn’t have done it without your support ❤️ huntress.com/blog/peerbligh…

English
9
65
365
70K
Max Rogers retweetledi
RussianPanda 🐼 🇺🇦
RussianPanda 🐼 🇺🇦@RussianPanda9xx·
It’s almost 2026 and everyone is talking about React2Shell. Wondering when @HuntressLabs is dropping something on it? We are cooking. Trust me, you will want to read this one.
GIF
English
3
5
98
4.9K
Max Rogers retweetledi
Jai Minton
Jai Minton@CyberRaiju·
CVE-2025-55182 (React2Shell) pre-auth RCE is likely to have a long tail time similar to Log4Shell Log4j injection and Telerik deserialisation vulnerabilities have in the past. This is already being weaponised by threat actors with public POCs available. react2shell.com
Jai Minton tweet media
English
3
14
87
11.2K
Max Rogers retweetledi
Ben
Ben@polygonben·
My first @HuntressLabs blog is live: we break down some funky ClickFix lures that lead to a loader which uses steganography to extract shellcode and ultimately deliver LummaC2/Rhadamanyths stealers. Big thanks to @RussianPanda9xx for the help! 😇 huntress.com/blog/clickfix-…
Ben tweet media
English
7
59
231
29.4K
Max Rogers retweetledi
Andrew Northern 𓅓
Andrew Northern 𓅓@ex_raritas·
New report by yours truly. Censys Threat Overview: Mapping Remcos C2 Activity at Internet Scale 👇👇👇
Andrew Northern 𓅓 tweet media
English
2
13
46
6.3K