Latest News & Articles
Secured™ Receives 8(a) Certification from the Small Business Administration
Secured™ is proud to announce that we have received 8(a) certification from the U.S. Small Business Administration (SBA) and Veteran
Finance By Day, Fiction By Night: Brandon Thomson’s Journey at Secured™
At Secured™, employees are more than just cogs in the machine—they’re valued members of a family, each bringing their unique
Secured™ Announces the Appointment of Kristie Bender-Carey as CEO Finance
Secured™ proudly announces the appointment of Kristie Bender-Carey as CEO Finance, bringing her extensive experience in finance and strategic growth
Security Resources
CISA's Known Exploited Vulnerabilities Catalog
Minimize Cybersecurity Risk with the Known Exploited Vulnerabilities (KEV) Catalog
In November 2021 the Cybersecurity and Infrastructure Security Agency (CISA) started the Known Exploited Vulnerabilities (KEV) Catalog and Binding Operational Directive 22-01. The KEV catalog lists only vulnerabilities known to be actively exploited.
“Dirty Pipe” Linux Kernel Vulnerability (CVE-2022-0847)
“Dirty Pipe” is a well-known Linux kernel privilege escalation vulnerability. This post includes a walkthrough of how to exploit this
“PetitPotam” Windows LSA Spoofing Vulnerability (CVE-2021-36942)
PetitPotam is a NTLM relay attack vulnerability that is often checked for in Active Directory penetration testing. Attackers can become
Active Directory Series
Active Directory Series: Introducing AD CS
This post introduces Active Directory Certificate Services (AD CS) and topics like: public key infrastructure (PKI), the Kerberos pre-authentication protocol PKINIT, Certificate Signing Requests (CSR), and templates. This overview provides a baseline for learning AD CS penetration testing.
Active Directory Series: LDAP Reconnaissance
LDAP is a protocol that is targeted by attackers to get more information about Active Directory environments. This post covers
Active Directory Series: LAPS Permissions
Local Administrator Password Solutions (LAPS) provides various security benefits in Active Directory environments. If LAPS permissions are not set correctly,
From Above: A Comprehensive Guide to Choosing Between In-house or Outsourced Drone Operations
In the rapidly evolving landscape of drone technology, organizations face a pivotal decision: whether to establish an in-house drone program
Unleashing the Power of GenAI: Exploring the Dark Side of Shadow IT in the Age of Artificial Intelligence
GenAI is a groundbreaking AI platform that can revolutionize industries. But, it can also lead to dangerous Shadow IT on
White House Unveils Comprehensive Cybersecurity Implementation Plan
On July 13, 2023, the Biden administration issued the first iteration of its National Cybersecurity Strategy Implementation Plan. Some experts
Cybersecurity In Real Time: Network Tech For Identifying Attacks
An effective cyber defense strategy should not only include preventative measures but also focus on identifying attacks as they happen
Fort Worth Under Digital Siege: City’s Cyber Defenses Breached
Forth Worth’s cybersecurity was tested by the hacktivist group SiegedSec this past week. This article delves into the motivations behind
Precision From Above: Drones Exploring the Unreachable and Securing Our World
Drones have emerged as the go-to solution to complete dangerous tasks that often put humans at great risk. Drone are