Quick Cookie Notification
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.
If you continue to browse this site without changing your cookie settings, you agree to this use.
View Cookie Policy for full details
- Blog Home
- Open Source Security Meetup (OSSM): Vegas 2018
Rapid7 Blog
Open Source Security Meetup (OSSM): Vegas 2018
Want to chat with members of the Metasploit Framework core dev team about open source security in Vegas this year…without having to plan a presentation or trawl for an invitation? Metasploit is “hosting” the fourth annual Open Source Security Meetup (OSSM) in Las Vegas on August 9, and this time we’re going back to our OSSM roots: no rented space, no tickets, no guest list, no structured presentations—just a bunch of open source security developers and fans stopping by to talk shop and share ideas.
Where? When?
We’ll be hanging out around the Lobby Bar area at Caesars Palace from 4 PM – 6 PM on Thursday, August 9 to talk open source development with anyone who cares to drop by.
Are you an open source security developer yourself?
Let us know in our survey here that you’d like to come and chat about your project with attendees; we’ll have some Metasploit t-shirts on hand for OSS developers.
What’s different this year?
This year’s OSSM is a true grassroots meetup, not a hosted event. There are no formal talks or presentations, and you don’t need a ticket or an invitation to attend. Just show up, look for the folks in Metasploit shirts, and share what you’re working or what you’d like to see from the open source security world in the future.
Can’t make OSSM but still want to say hi to us in Las Vegas? Visit us at the Rapid7 booth at BSides, where there will be an instance of Metasploitable3 to play around with, or at Rapid7’s DEF CON table, where we’ll be selling limited edition Metasploit t-shirts to benefit the EFF. See everywhere you can find Rapid7 in Vegas here.
Want more? Don’t miss these posts
Password Tips from a Pen Tester: What is Your Company’s Default Password?
Welcome back to Password Tips From a Pen Tester. Last time, I exposed common password patterns we see when we perform penetration testing service engagements for our clients at Rapid7. This month, let’s dig into the amazingly weak default passwords that so many companies…
Metasploit Wrapup
Privilege Escalation Linux BPF CVE-2017-16995 is a Linux kernel vulnerability in the way that a Berkeley Packet Filter (BPF) is verified. Multiple sign extension bugs allows memory corruption by unprivileged users, which could be used for a local privilege escalation attack by overwriting a credential…
Featured Research
National Exposure Index 2018
The National Exposure Index is an exploration of data derived from Project Sonar, Rapid7’s security research project that gains insights into global exposure to common vulnerabilities through internet-wide surveys.
Toolkit
Make Your SIEM Project a Success with Rapid7
In this toolkit, get access to Gartner’s report “Overcoming Common Causes for SIEM Solution Deployment Failures,” which details why organizations are struggling to unify their data and find answers from it. Also get the Rapid7 companion guide with helpful recommendations on approaching your SIEM needs.
Featured Research
Quarterly Threat Report
Rapid7’s Quarterly Threat Report leverages intelligence from our extensive network—including the Insight platform, managed detection and response engagements, Project Sonar, Heisenberg Cloud, and the Metasploit community—to put today’s shifting threat landscape into perspective. It gives you a clear picture of the threats that you face within your unique industry, and how those threats change throughout the year.