Rapid7 Profile Banner
Rapid7 Profile
Rapid7

@rapid7

Followers
122,807
Following
2,714
Media
1,958
Statuses
14,581

With Rapid7 technology, services and research, organizations around the globe can break down barriers, accelerate innovation, and securely advance.

Boston, MA
Joined March 2009
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
Pinned Tweet
@rapid7
Rapid7
6 months
Relentless offense and tireless defense. It's a winning recipe in hockey, cybersecurity, and beyond 🏆 @RayBourque77 recently stopped by our Boston HQ – and clearly, he's made himself right at home. See how Rapid7 and #77 are commanding the attack surface together ⤵️
4
6
35
@rapid7
Rapid7
9 years
Read the full case study on the #IoTsec baby monitor vulnerabilities we disclosed today: #iot http://t.co/UbrKKk4pfL
Tweet media one
48
641
1K
@rapid7
Rapid7
2 years
We are thrilled to announce that today, the @NHLBruins named Rapid7 as their first-ever jersey patch partner and the official cybersecurity partner of the Bruins and @tdgarden – beginning with the 2022-23 season. Read the release here:
56
34
209
@rapid7
Rapid7
9 years
PsExec: How Remote Execution Works w/ @TheLightCosine [VIDEO] #rapid7WbW
Tweet media one
2
106
164
@rapid7
Rapid7
1 year
The @owasp Top 10 API Security Risks 2023 has arrived! In a new blog, we dig a little deeper into each item on the list – a key component of API security preparedness for the year. Read on:
1
35
103
@rapid7
Rapid7
7 years
Hey, offensive security fans: @Metasploit now has a YouTube channel. Check it out here!
1
78
100
@rapid7
Rapid7
2 years
Happy 25th scan-iversary, #Nmap ! 🎉 September 1, 1997 was the day Fyodor's Nmap was released to the world. Check out a quick blog post from Rapid7 Director of Research, @todb on the impact of 25 years of Nmap:
Tweet media one
6
36
93
@rapid7
Rapid7
1 year
🚨 Rapid7's ETR team has begun responding to CVE-2023-27997, a critical RCE vulnerability in Fortinet Fortigate SSL-VPN firewalls. Fortinet is expected to publish their advisory tomorrow, June 13, 2023. Find mitigation advice & more in our blog:
2
44
96
@rapid7
Rapid7
6 years
Metasploit turned 15 this year! Here are the most memorable @metasploit moments of 2018. #HaXmas
0
26
86
@rapid7
Rapid7
7 years
We probed more than 3 billion IPv4s and mapped internet exposure around the world. Get the National Exposure Index
2
59
82
@rapid7
Rapid7
7 years
You asked, we deliver: Register for the @Metasploit community CTF to hack the Linux version of Metasploitable3 (and win prizes). 500 spots. Play starts Monday!
1
56
85
@rapid7
Rapid7
7 years
What you need to know about #Meltdown and #Spectre : What they are, who's affected, and where to find help
0
46
76
@rapid7
Rapid7
1 year
On July 18, Citrix published a security bulletin warning of 3 new vulnerabilities affecting NetScaler ADC and NetScaler Gateway. CVE-2023-3519, an RCE vulnerability and the most severe of the 3, is known to be exploited in the wild. More in our blog:
0
43
79
@rapid7
Rapid7
7 years
One of @Metasploit 's strengths is the ability to offer a lingua franca for expressing vulns and exploits. @todb underscores this point with a #HaXmas story
1
26
73
@rapid7
Rapid7
7 years
The rumors are true: Rapid7's @PDXbek is hosting a Threat Intelligence Book Club! We’ll be digging into The Cuckoo’s Egg starting 2/21. Details and registration here:
4
36
74
@rapid7
Rapid7
6 years
Learn how to build your own caller ID spoofer (for more than just prank calling your buddies):
0
29
64
@rapid7
Rapid7
7 years
This isn't your average game of Capture the Flag. At #R7UNITED , you can hack with @Metasploit
0
32
64
@rapid7
Rapid7
7 years
@Bandrel @metasploit @TrevorTheRoach @egyp7 @HackingDave We've locked @metasploit in a room until they figure this out. Y'know...for Trevor.
3
11
63
@rapid7
Rapid7
2 years
CVE-2022-42889, which some have begun calling “Text4Shell,” is a vulnerability in the popular Apache Commons Text library that can result in code execution when processing malicious input. Read more & find mitigation guidance ⤵️
1
48
64
@rapid7
Rapid7
8 years
Find out how #UBA can provide you with security answers at Booth #807 at #RSAC
2
24
56
@rapid7
Rapid7
6 years
Each year, Rapid7 penetration testers complete hundreds of internally and externally based penetration testing service engagements. Check out our five-part blog series featuring testimonials of what goes on beneath the hoodie.
1
17
54
@rapid7
Rapid7
4 years
Internet researchers, security scholars, and data nerds, have we got something for you! Today we’re unveiling our National/Industry/Cloud Exposure Report (NICER), a data-rich analysis of risk across the internet complete with actionable security advice.
Tweet media one
1
32
56
@rapid7
Rapid7
6 years
Whether you’re just getting started with #pentesting , or simply interested in the basics, this blog for you. Guest author Bo Weaver walks through how to create a secure and portable Kali installation:
1
23
50
@rapid7
Rapid7
7 years
Wondering which OSINT tool is cream of the crop? @L4bF0x will analyze the most popular ones at #BSidesLV :
0
14
37
@rapid7
Rapid7
6 years
How to Build Your Own Caller ID Spoofer
0
24
52
@rapid7
Rapid7
9 years
. @hdmoore , we know you'll go far -- all the best!
Tweet media one
2
44
53
@rapid7
Rapid7
7 years
What do pen testers do w/internal network access? Why you need to detect Responder & PsExec: #infosec
Tweet media one
0
33
51
@rapid7
Rapid7
6 years
Are you an aspiring ethical hacker? Lucky for you, there are many resources available to help you get started!
4
22
47
@rapid7
Rapid7
9 years
How to use Windows event logs to detect lateral movement [VIDEO] http://t.co/82x3cA7e5L w/ @omgAPT #DFIR #rapidWbW http://t.co/Oflkw0Lzq2
Tweet media one
0
37
48
@rapid7
Rapid7
7 years
Introducing InsightPhish (beta): Unified phishing simulation, investigation, and analysis from Rapid7
2
31
44
@rapid7
Rapid7
7 years
Big thanks to @huykha10 for reporting a website vuln on one of our new sites so we could fix! Responsible disclosure always appreciated :)
2
7
43
@rapid7
Rapid7
14 years
How to set up a pentesting lab - http://bit.ly/gycS16
0
45
46
@rapid7
Rapid7
8 years
Metasploitable3 has 15 hidden flags. Can you capture them all? Join the #CTF and win stuff!
Tweet media one
0
38
44
@rapid7
Rapid7
7 years
#EternalBlue : New @Metasploit module for MS17-010 developed by contributors @zerosum0x0 and @JennaMagius
1
31
42
@rapid7
Rapid7
8 years
Attending #RSAC ? Come see "Under the Hoodie: Actionable Research from Pentesting Engagements" at Booth #807
1
6
42
@rapid7
Rapid7
8 years
Show off your hacker skills and pwn hard. Join the Metasploitable3 #CTF and win stuff!
0
30
44
@rapid7
Rapid7
6 years
RT @metasploit : Headed to #DEFCON26 ? Find us and the rest of the @Rapid7 family in the vendor hall selling limited edition #Metasploit0xf Anniversary Tour shirts to benefit @EFF . Get it.
Tweet media one
3
9
40
@rapid7
Rapid7
9 years
Visit us at #RSAC (North Hall 4215) for great presentations, demos & party reg: #RSA2016
Tweet media one
0
13
41
@rapid7
Rapid7
4 years
Thanks to @RandomDhiraj for finding and disclosing a Code Execution issue on the Nexpose installer, which we were able to remediate quickly thanks to this report.
4
5
42
@rapid7
Rapid7
5 years
We just opened our newest Rapid7 office in Arlington, VA! The Arlington office is inspired by video game platforms and is also home to our security operations center (SOC), where our hardworking team detects and responds to security issues.
Tweet media one
8
5
42
@rapid7
Rapid7
2 years
Rapid7 researchers discovered 2 high-severity vulnerabilities that, when successfully exploited, can grant attackers persistent root access to F5 device management interfaces. More from @TheHackersNews :
0
19
42
@rapid7
Rapid7
6 years
RT @metasploit : Headed to #DEFCON26 ? Find us and the rest of the @Rapid7 family in the vendor hall selling limited edition #Metasploit0xf Anniversary Tour shirts to benefit @EFF . Get it.
Tweet media one
3
12
37
@rapid7
Rapid7
6 years
Hiding Metasploit shellcode to evade Windows Defender:
0
21
39
@rapid7
Rapid7
8 years
Register for our THREAT HUNT webcast series to learn how to fend off attackers (and ninjas).
0
28
40
@rapid7
Rapid7
6 years
We conducted 268 penetration testing service engagements. In this post, we review interesting detection trends, including exactly where our red team found success.
1
28
40
@rapid7
Rapid7
7 years
The sky isn't falling, but KRACK deserves some attention. Here's what you need to know:
0
46
40
@rapid7
Rapid7
6 years
The start of a new data model for @Metasploit : The team landed the beginning of a nifty new backend service for Framework users this week—plus, a windfall of modules and several open roles!
0
20
38
@rapid7
Rapid7
2 years
New emergent threat response: "CVE-2022-42475: Unauthenticated Remote Code Execution Vulnerability in FortiOS; Exploitation Reported." More details in the blog post ⤵️
1
18
40
@rapid7
Rapid7
5 years
Today, we welcomed network traffic visibility and analytics company @NetFort to the Rapid7 family!
0
12
39
@rapid7
Rapid7
8 years
Learn about the latest in pentesting research at our #RSAC booth:
2
7
38
@rapid7
Rapid7
7 years
[blog] The Shadow Brokers Leaked Exploits Explained
0
33
36
@rapid7
Rapid7
7 years
We’re thrilled to announce plans for our new global headquarters at The Hub on Causeway, where we’ll continue to build a fantastic experience for employees and invest in the #Boston community as we grow.
Tweet media one
2
20
37
@rapid7
Rapid7
9 years
The VENOM vulnerability explained (CVE-2015-3456) [VIDEO] http://t.co/SLlcURnUmY #rapid7WbW http://t.co/ff1xCpJfRg
Tweet media one
2
38
36
@rapid7
Rapid7
9 years
#DerbyCon -- heads up! We're giving away Metasploit t-shirts to the first 750 people at the Saturday night party: http://t.co/Yu3oM4o7Rq
Tweet media one
5
14
38
@rapid7
Rapid7
7 years
Holiday classics with a Rapid7 twist. 'NOW That's What I Call HaXmas!' is here for your listening pleasure. Happy holidays!
0
26
36
@rapid7
Rapid7
2 years
Yesterday, Microsoft published CVE-2022-24527, a local privilege escalation vulnerability in Microsoft Connected Cache. Read more about exploitation and remediation in this blog write up from @Junior_Baines :
0
19
35
@rapid7
Rapid7
7 years
We've been voted the coolest T-shirt at #DEFCON !* Swing by to grab one and support the @EFF . *sample size = 3 people at the Rapid7 table
Tweet media one
2
7
35
@rapid7
Rapid7
6 years
Hard at work in the #DEFCON26 vendor hall. #Metasploit0xf tshirts. $20 to benefit @EFF .
Tweet media one
1
5
32
@rapid7
Rapid7
6 years
“This one time on a pen test…” Discover real stories of exposure, exploitability, and execution in the 2018 edition of #UnderTheHoodie :
Tweet media one
5
31
35
@rapid7
Rapid7
5 years
A new research paper from Metasploit and Rapid7 Labs looks at practical exploitation of Java serialization vulnerabilities and internet exposure of Java services.
0
14
34
@rapid7
Rapid7
5 years
What is the difference between WAF and RASP? How can you get the most out of both? Learn more about these emerging application security products.
0
9
34
@rapid7
Rapid7
7 years
You can now RF test the security of #IoT devices through @Rapid7 ’s @Metasploit : @opengarages
1
46
34
@rapid7
Rapid7
4 years
Need a social distancing hobby? This blog gives you an intro to embedded hardware hacking.
0
14
34
@rapid7
Rapid7
6 years
Learn how to build your own caller ID spoofer (for more than just prank calling your buddies):
0
11
33
@rapid7
Rapid7
7 years
Patching Samba (CVE-2017-7494): Who's affected, how to mitigate, and a word on early data from our labs
1
40
34
@rapid7
Rapid7
6 years
Securing IoT devices? Be warned that Universal Asynchronous Receiver Transmitter (UART) ports are often the keys to the kingdom. IoT Research Lead @Percent_X talks about the security impact of easily accessible UART on IoT technology:
1
14
28
@rapid7
Rapid7
9 years
We’re investigating implications of #Wassenaar for Metasploit and security research & expect to participate in the consultation process.
1
60
33
@rapid7
Rapid7
7 years
"Work like hell. Share all you know." Full text of Dan Geer's inspirational #R7UNITED closing keynote here:
0
14
33
@rapid7
Rapid7
8 years
Learn about the latest pentesting research at "Under the Hoodie: Penetration Testing Engagements" in 20 minutes at booth S807 #RSAC
0
5
30
@rapid7
Rapid7
7 years
In 2017, 225 new @Metasploit modules were developed by the Rapid7 community. Discover more key stats from our past year in review:
0
10
31
@rapid7
Rapid7
1 year
💡 Introducing Fetch Payloads to @Metasploit ! These simplify & replace some command stager use cases, providing for faster, more intuitive command injection module dev'pment – and offering a useful on-the-fly hacking tool. More in a brand new blog:
Tweet media one
0
11
31
@rapid7
Rapid7
5 years
Rapid7's Metasploit Framework research team has noticed a marked increase in both CVEs and exploit module PRs for Java serialization vulnerabilities. Security researchers @_surefire_ and @jhartftw delve into exploitation of Java Serialized Objects.
0
15
30
@rapid7
Rapid7
6 years
We simulated targeted phishing campaigns at a cybersecurity event attended by 60 CEOs. Here's how they fared.
1
16
29
@rapid7
Rapid7
7 years
#NetNeutrality matters. Today, we stand with @SenMarkey and Massachusetts technology leaders to support an open internet. Watch live at 10 AM EST: #MAnetneutrality
1
14
29
@rapid7
Rapid7
11 months
A statement from Rapid7 and CEO Corey Thomas: Much of the world awoke to the shocking news coming out of Israel this morning.
Tweet media one
1
2
31
@rapid7
Rapid7
5 years
The OWASP Top 10 is regarded as the single source of truth for the most common application security risks we see in today’s environments. Tune in for this #AppSec 101 topic in this week’s #WBW .
0
7
29
@rapid7
Rapid7
7 years
12 memorable @Metasploit moments from 2017 that inspired and connected us with our community around the world (c/o @busterbcook )
0
9
29
@rapid7
Rapid7
6 years
What’s new with @metasploit ? Read our blog to know everything you need to about external Metasploit modules.
0
14
30
@rapid7
Rapid7
6 years
Whether you’re just getting started with #pentesting , or simply interested in the basics, this blog for you. Guest author Bo Weaver walks through how to create a secure and portable Kali installation:
1
13
31
@rapid7
Rapid7
5 years
Extracting Firmware from Microchip PIC Microcontrollers Explained
0
14
30
@rapid7
Rapid7
8 years
"Behind every POS system is an outdated OS." Contributes to susceptibility of POS systems for hacking. @westonhecker #defcon
1
17
26
@rapid7
Rapid7
5 years
Today, we brought together our Boston and Cambridge teams at our brand new headquarters, right next to TD Garden. We're so excited to work and collaborate in this awesome new space!
Tweet media one
Tweet media two
Tweet media three
Tweet media four
0
3
30
@rapid7
Rapid7
7 years
Which countries are most exposed on the internet? Get Rapid7's National Exposure Index
1
14
28
@rapid7
Rapid7
6 years
Missed the past week's @Metasploit wrap-up? We've got it right here.
1
18
28
@rapid7
Rapid7
1 year
AppDomain Manager Injection can be a very powerful technique for red teams – operators can package DLLs in initial access payloads, perform lateral movement, and even utilize it for persistence. 🛡 Learn the basics in a new blog:
Tweet media one
0
5
29
@rapid7
Rapid7
8 years
Today's the last day of #defcon , which means your last chance to get this shirt to support the @EFF
Tweet media one
3
12
30
@rapid7
Rapid7
6 years
Last week’s #Metasploit Wrapup features a new EternalBlue module in everyone's favorite reptile-brain language, Python! Check it out:
2
22
26
@rapid7
Rapid7
4 years
At Rapid7, we condemn racial injustice and inequality and call upon our colleagues and communities to advocate for change together. CEO Corey Thomas shares his thoughts.
1
14
28
@rapid7
Rapid7
7 years
Don't let GDPR compliance prep get lost in your December festivities. Use this month to assess and review your security program:
0
6
15
@rapid7
Rapid7
5 months
📣 Today, we're pleased to announce the release of @metasploit Framework 6.4! Additional Kerberos capabilities, new session types, improved discoverability & much more – dive into the range of enhancements our team has made in a brand new blog:
Tweet media one
0
7
29
@rapid7
Rapid7
8 years
. @indi303 and @joshcorman lose their locks to raise money for @StBaldricks chrildren's cancer research. #RSAC2017 #shavesthatsave
Tweet media one
3
18
28
@rapid7
Rapid7
8 years
Security teams can now link hardware directly into the @Metasploit Framework for vulnerability testing: @OpenGarages
0
26
29
@rapid7
Rapid7
6 years
Are you thinking about pursuing a career in #security ? Here’s everything you need to know about building a career in infosec:
1
18
26
@rapid7
Rapid7
7 years
In 2017, Rapid7 released more than 6 TB of internet scan data from Project Sonar to the public via . Get an overview of Sonar here, and then dig into the data yourself.
1
21
28
@rapid7
Rapid7
8 years
#rapid7WBW : Security Risks of Local Admin Access. Watch now:
Tweet media one
0
27
28
@rapid7
Rapid7
2 years
We're excited to announce the release of @velocidex Version 0.6.5, highlighted by better error handling in VQL, multi-lingual localization and table transformations! Learn more and find out how to join the growing Velociraptor community here:
Tweet media one
Tweet media two
Tweet media three
0
7
28