Matt Anderson (@nosecurething) 's Twitter Profile
Matt Anderson

@nosecurething

Senior Detection Engineer @HuntressLabs
Threat Research | Threat Hunting | Malware Analysis

ID: 233421524

calendar_today03-01-2011 05:19:39

632 Tweet

1,1K Takipçi

1,1K Takip Edilen

✞ inversecos (@inversecos) 's Twitter Profile Photo

Become a contributor at XINTRA XINTRA 🔎 We're looking for RED and BLUE team contributors 🔴Red Team – Emulate real APT groups 🔵Blue Team – Investigate & respond to emulations What you get: - Challenging, realistic emulations - Hack & forensicate vendor devices -

Become a contributor at XINTRA <a href="/XintraOrg/">XINTRA</a> 🔎

We're looking for RED and BLUE team contributors 

🔴Red Team – Emulate real APT groups
🔵Blue Team – Investigate &amp; respond to emulations

What you get:
- Challenging, realistic emulations
- Hack &amp; forensicate vendor devices
-
Anton (@antonlovesdnb) 's Twitter Profile Photo

Got a new Huntress blog out today taking a look at some intrusion analysis methodology with practical examples - check it out! huntress.com/blog/intrusion…

Dray Agha (@purp1ew0lf) 's Twitter Profile Photo

🚨 SonicWall Exploitation (Zero Day?) 🚨 Huntress is tracking active intrusions via SonicWall devices. Threat actors are bypassing MFA, pivoting to domain controllers, deploying ransomware (likely Akira), and creating users for persistence. Pace suggests possible zero-day

🚨 SonicWall Exploitation (Zero Day?) 🚨

Huntress is tracking active intrusions via SonicWall devices.

Threat actors are bypassing MFA, pivoting to domain controllers, deploying ransomware (likely Akira), and creating users for persistence.

Pace suggests possible zero-day
Huntress (@huntresslabs) 's Twitter Profile Photo

⚠️ Huntress has been responding to an ongoing wave of high-severity Akira ransomware incidents originating from SonicWall devices. Learn more about this active exploit and get an up-to-date list of indicators of compromise: huntress.com/blog/exploitat…

Windy City Sports Cards (@312sportscards1) 's Twitter Profile Photo

Alright 3 lucky 🍀 winners will snag a #DaBears sideline hat 🧢 Pick any style that’s in stock! To Enter: 1️⃣ Like & RT 👍 ⏰ Winners Announced - Halftime Tomorrow

Alright 3 lucky 🍀 winners will snag a #DaBears sideline hat 🧢 Pick any style that’s in stock!

To Enter:

1️⃣ Like &amp; RT 👍
⏰ Winners Announced - Halftime Tomorrow
Ame (@pe4chscreeching) 's Twitter Profile Photo

🚨 Case from Huntress 🔎 Cephalus seen side loading DLL 'SentinelAgentCore.dll' into legitimate 'SentinelBrowserNativeHost.exe' for ransomware execution ✏️ File extension for encrypted files - '.sss'

🚨 Case from <a href="/HuntressLabs/">Huntress</a> 

🔎 Cephalus seen side loading DLL 'SentinelAgentCore.dll' into legitimate 'SentinelBrowserNativeHost.exe' for ransomware execution 

✏️ File extension for encrypted files - '.sss'
Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

⚠️ Alert: Widespread data theft campaign by UNC6395. The threat actor is targeting Salesforce instances via Salesloft Drift, targeting sensitive data. Organizations should investigate, rotate credentials, and harden access controls. More here: bit.ly/3HviIi1

⚠️ Alert: Widespread data theft campaign by UNC6395. 

The threat actor is targeting Salesforce instances via Salesloft Drift, targeting sensitive data. Organizations should investigate, rotate credentials, and harden access controls.

More here: bit.ly/3HviIi1
Jai Minton (@cyberraiju) 's Twitter Profile Photo

If you have a Cisco ASA 5500-X series you'll want to be aware that an espionage related TA was exploiting multiple 0-days against these devices for months which now have patches available. 🔥 sec.cloudapps.cisco.com/security/cente…

If you have a Cisco ASA 5500-X series you'll want to be aware that an espionage related TA was exploiting multiple 0-days against these devices for months which now have patches available. 🔥
sec.cloudapps.cisco.com/security/cente…
Nick VanGilder (@nickvangilder) 's Twitter Profile Photo

9/26/2025: Every week I share a curated list of red team-specific jobs (or similar) that caught my attention or were shared with me by others in the community. My goal is to help job hunters in the offensive security space find a red team-specific role. 🏛 Company + Role:

9/26/2025: Every week I share a curated list of red team-specific jobs (or similar) that caught my attention or were shared with me by others in the community. My goal is to help job hunters in the offensive security space find a red team-specific role. 

🏛 Company + Role:
John Hammond (@_johnhammond) 's Twitter Profile Photo

Hello. The Huntress CTF is back for its third year. October 1st through October 31st with new challenges each and every day, all month long. Free to play, register at any time (even while the game is running!) and play whenever you want at your leisure. ctf.huntress.com

Hello.

The Huntress CTF is back for its third year. October 1st through October 31st with new challenges each and every day, all month long. Free to play, register at any time (even while the game is running!) and play whenever you want at your leisure. 

ctf.huntress.com
Max Rogers (@maxrogers5) 's Twitter Profile Photo

1⃣ The 𝓮𝓻𝓲𝓬𝓪 team uncovered a campaign by a likely China-nexus threat actor. The most novel finding is use of a publicly available tool called Nezha as a post-exploitation C2 agent. This is the first public reporting of the tool I've seen. huntress.com/blog/nezha-chi…

Jai Minton (@cyberraiju) 's Twitter Profile Photo

WSUS shouldn't be exposed to the internet (and honestly shouldn't be used), but unfortunately it is in many locations, and this being RCE with a CVSS of 9.8 makes it bad.

WSUS shouldn't be exposed to the internet (and honestly shouldn't be used), but unfortunately it is in many locations, and this being RCE with a CVSS of 9.8 makes it bad.
Jai Minton (@cyberraiju) 's Twitter Profile Photo

I don't like being the Friday security issue messenger man, but at least we can provide some detection guidance and forensic artifacts showing exploitation occurring and provide it to the community. ❤️ huntress.com/blog/exploitat…

Huntress (@huntresslabs) 's Twitter Profile Photo

⚠️ Threat actors exploiting a recent Microsoft WSUS vulnerability (CVE-2025-59287) - Microsoft released an out-of-band update for the flaw on 10/24 ✅ Apply the update as soon as possible IOCs, examples of adversary tradecraft, and remediations: okt.to/0eJ3zw

⚠️ Threat actors exploiting a recent Microsoft WSUS vulnerability (CVE-2025-59287)

- Microsoft released an out-of-band update for the flaw on 10/24
✅ Apply the update as soon as possible

IOCs, examples of adversary tradecraft, and remediations: okt.to/0eJ3zw
Bert-Jan 🛡️ (@bertjancyber) 's Twitter Profile Photo

Huntress has now also published a blog about it: huntress.com/blog/exploitat… The blog contains a sigma rule with the logic to build detections based on your EDR/logs.

RussianPanda 🐼 🇺🇦 (@russianpanda9xx) 's Twitter Profile Photo

Good morning! ☀️ #GootLoader woke up and chose violence (again) Grab your coffee, this one's JUICY 💣 huntress.com/blog/gootloade…

Jamie Levy🦉 (@gleeda) 's Twitter Profile Photo

There's an open role for a Staff CTI Analyst on my team here Huntress 📢💫 ✨Do you love doing correlations between different incidents, sometimes digging into them, or doing malware analysis? ✨Do you like doing data analysis, and using this to make threat reports? 👇