Latest News & Articles

Secure Our World: 20 Years of CISA’s Cybersecurity Awareness Month
Every October, the United States government, in collaboration with public and private sectors, observes Cybersecurity Awareness Month. This annual event,

Honoring the Heroes of 9/11
Twenty-two years have passed, but the scars of that tragic day remain etched in our collective memory. Today, we pay

The Importance of Strong Passwords: Best Practices for Online Security
Whether it’s safeguarding personal email accounts, sensitive financial information, or even critical business data, the significance of a robust password
Security Resources
CISA's Known Exploited Vulnerabilities Catalog

Minimize Cybersecurity Risk with the Known Exploited Vulnerabilities (KEV) Catalog
In November 2021 the Cybersecurity and Infrastructure Security Agency (CISA) started the Known Exploited Vulnerabilities (KEV) Catalog and Binding Operational Directive 22-01. The KEV catalog lists only vulnerabilities known to be actively exploited.

“Dirty Pipe” Linux Kernel Vulnerability (CVE-2022-0847)
“Dirty Pipe” is a well-known Linux kernel privilege escalation vulnerability. This post includes a walkthrough of how to exploit this

“PetitPotam” Windows LSA Spoofing Vulnerability (CVE-2021-36942)
PetitPotam is a NTLM relay attack vulnerability that is often checked for in Active Directory penetration testing. Attackers can become
Active Directory Series

Active Directory Series: Introducing AD CS
This post introduces Active Directory Certificate Services (AD CS) and topics like: public key infrastructure (PKI), the Kerberos pre-authentication protocol PKINIT, Certificate Signing Requests (CSR), and templates. This overview provides a baseline for learning AD CS penetration testing.

Active Directory Series: LDAP Reconnaissance
LDAP is a protocol that is targeted by attackers to get more information about Active Directory environments. This post covers

Active Directory Series: LAPS Permissions
Local Administrator Password Solutions (LAPS) provides various security benefits in Active Directory environments. If LAPS permissions are not set correctly,

SEIZING THE SKIES: THE STRATEGIC ADVANTAGE OF AI IN A POST-BAN WORLD
Folllowing the ban of DJI drones in Florida, Secured offers a unique drone surveillance solution with its AI Object Recognition

Empowering American Heroes: The Significance of the Service-Disabled Veteran-Owned Small Business Program
We, here at Secured™, are proud to announce that we have officially achieved the highly regarded designation of “Service-Disabled Veteran-Owned

The Rise of AI-Powered Cyber Attacks: Are We Prepared?
Cybercriminals are leveraging AI’s capabilities to execute more sophisticated and evasive attacks, putting sensitive data and critical infrastructure at more

Lessons From the City Of Dallas Ransomware Attack
Two weeks ago, the City of Dallas was targeted by the suspected ransomware group Royal. There are specific best practices

Secured™ Takes Aim To Support Veterans As “Top Gun” Sponsor of BCV’s Annual Helicopter Hog Hunt Weekend
We were proud to sponsor this year’s Big Country Veterans’ (BCV) Helicopter Hog Hunt Weekend, as well as honor a

7 Locations for Unsecured Credentials
Attackers can use unsecured user credentials to access different services and pivot within a network. Malicious actors and penetration testers