Max Rogers
@MaxRogers5
Followers
3K
Following
7K
Media
135
Statuses
2K
Sr. Director of SOC at Huntress. Ex-Mandiant/FireEye. Bringing security to the Fortune 5,000,000.
Charlotte, NC
Joined January 2012
The Cybersecurity Company of the Year Award ๐ข celebrates a company delivering top-tier security services and products while leading with integrity and community spirit. The Community Winner for 2025 goes to @HuntressLabs. Congratulations! #SANSDMA
2
7
31
Congrats @RussianPanda9xx for winning the Community Cyber Defender Practitioner of the Year award in the 2025 SANS Difference Makers Awards! First award for a @HuntressLabs teammate! #SANSDMA
2
8
75
We are kicking off the SANS Difference Makers Awards! Itโs great to share space with so many people working to advance cyber security. Iโll be hanging out on behalf of @HuntressLabs. Iโm also thrilled to see many friends like @fr0gger_ nominated! #SANSDMA
1
2
15
When sharing CTI on IPs, Context is Key ๐ - First/Last Seen (Timestamps!) - Observables (like VPN brand / proxy network) - Hosting Provider (ASN) - DNS Records (relevant domains on the IP) - Purpose and/or Type (C2, Payload Host, Proxy, etc) ๐ซณ๐ค
0
9
62
Itโs SANS Difference Maker Eve! #SANSDMA @HuntressLabs has a few folks nominated and is also nominated for Cyber Security Company of the Year! If youโre attending please come find me and say hello! ๐ See you tomorrow @SANSInstitute!
0
1
7
The 2025 SANS #HolidayHack Challenge is officially open! ๐ Celebrate 10 yrs of festive hacking fun with fast micro-challenges, epic capstone puzzles, a new CTF-only mode, and more! Can you uncover whatโs stirring beneath the 8-bit neighborhood? โ๏ธ Join free โ
1
13
28
The @HuntressLabs blog has been on fire lately - tons of content and cool tradecraft around Linux, macOS & ESXi - honestly even I canโt keep up with it all and I work there and get to see all this come together ๐
Worth a bookmark: https://t.co/lbY5EiPJUL
huntress.com
Cybersecurity is dynamic and ever-changing. Stay up-to-date with the latest information about cyber threats, vulnerabilities, and news on the Huntress blog.
0
6
30
Super hyped to share that @HuntressLabs published a Rapid Response blog on the recent #React2Shell post-exploitations observed. We discovered and analyzed a few payloads that were named #PeerBlight, #CowTunnel and #ZinFoq. We also observed a variant of #Kaiji malware. 3 Modelo's
huntress.com
Huntress is seeing threat actors exploit React2Shell (CVE-2025-55182) to deploy a Linux backdoor, a reverse proxy tunnel, and a Go-based post-exploitation implant.
11
41
168
โ ๏ธ Super excited to release TWO React2Shell blogs with @xorJosh! https://t.co/eIZKQFLVBp
https://t.co/ISyb5WXHOC We've been hunting down TAs causing havoc, scanning and exploiting React2Shell on the internet. Especially the ones making OPSEC Ls... One group we've tracked
1
7
14
Errybody screaming about React2Shell so we wanted to give ya something you haven't already heard๐ Here's a beast of a blog post on malware we've seen from post-exploitation, detailing a wild Linux backdoor and more -- all from the amazing & incredible @RussianPanda9xx & co.๐
Super hyped to share that @HuntressLabs published a Rapid Response blog on the recent #React2Shell post-exploitations observed. We discovered and analyzed a few payloads that were named #PeerBlight, #CowTunnel and #ZinFoq. We also observed a variant of #Kaiji malware. 3 Modelo's
9
68
363
Itโs almost 2026 and everyone is talking about React2Shell. Wondering when @HuntressLabs is dropping something on it? We are cooking. Trust me, you will want to read this one.
4
5
99
CVE-2025-55182 (React2Shell) pre-auth RCE is likely to have a long tail time similar to Log4Shell Log4j injection and Telerik deserialisation vulnerabilities have in the past. This is already being weaponised by threat actors with public POCs available. https://t.co/DbrEsfTSrS
3
13
85
GUESS WHAT?! Our talk with @g0njxa is LIVE! https://t.co/dX4aL5zW9u Massive thank you to @virusbtn for having us - we had an amazing time! โค๏ธ
10
21
91
My first @HuntressLabs blog is live: we break down some funky ClickFix lures that lead to a loader which uses steganography to extract shellcode and ultimately deliver LummaC2/Rhadamanyths stealers. Big thanks to @RussianPanda9xx for the help! ๐ https://t.co/6bsuwotzPC
7
59
231
New report by yours truly. Censys Threat Overview: Mapping Remcos C2 Activity at Internet Scale ๐๐๐
2
13
47
Some amateur analysis of #MacSync ๐ https://t.co/98Ee3GFpjr
izzyboop.com
Most stealers are just 3 AMOSโs in a trench coat, but this oneโs just wearing an AMOS fan club T-shirt.
1
5
20
Careful not to mix them up. One builds solid security tools. The other gives you a $100 gift card to talk about theirs.
7
6
88
We're seeing active exploitation for a recent 0-Day in WSUS which received an out of band update to it. ๐ฅ CC: @HuntressLabs ๐
1
19
73
๐จ Widespread SonicWall SSLVPN Compromises Detected Starting 10/4, and as recently as 10/10, Huntress observed a surge in SonicWall SSLVPN compromises. Threat actors are rapidly authenticating across devicesโsuggesting valid cred. use, not brute force.
huntress.com
Huntress has observed a spike in compromises of SonicWall SSLVPN devices across multiple customer environments.
2
23
57