Latest News & Articles
![Secured and Skull Games](https://secured.ai/wp-content/uploads/2024/07/securedskull-games-banner-720x480.png)
Secured™: The Official Cybersecurity Partner of Skull Games
Secured™ has announced its bronze-level corporate sponsorship and official cybersecurity partnership with Skull Games, a nonprofit organization dedicated to combating
![Object Recognition Equipment](https://secured.ai/wp-content/uploads/2024/02/blog-featured-object-recognition-equipment-720x450.jpg)
Unveiling the Tools Behind Object Recognition: A Deep Dive into Deep Learning Equipment
Discover the cutting-edge tools and technologies powering object recognition systems. From sophisticated hardware to advanced software frameworks, learn how these
![2023 Cyber Security Trends](https://secured.ai/wp-content/uploads/2023/12/blog-featured-2023-720x450.jpg)
Looking Back on 10 Cybersecurity Trends of 2023
This list of trends highlights the dynamic and complex nature of cybersecurity we faced in 2023, underscoring the need for
Security Resources
CISA's Known Exploited Vulnerabilities Catalog
![CISA Logo](https://secured.ai/wp-content/uploads/2022/12/cisa-logo.jpeg)
Minimize Cybersecurity Risk with the Known Exploited Vulnerabilities (KEV) Catalog
In November 2021 the Cybersecurity and Infrastructure Security Agency (CISA) started the Known Exploited Vulnerabilities (KEV) Catalog and Binding Operational Directive 22-01. The KEV catalog lists only vulnerabilities known to be actively exploited.
![](https://secured.ai/wp-content/uploads/2023/08/blog_featured_dirty_pipe-770x423.jpg)
“Dirty Pipe” Linux Kernel Vulnerability (CVE-2022-0847)
“Dirty Pipe” is a well-known Linux kernel privilege escalation vulnerability. This post includes a walkthrough of how to exploit this
![](https://secured.ai/wp-content/uploads/2023/06/featured_blog-petitpotam-770x423.jpg)
“PetitPotam” Windows LSA Spoofing Vulnerability (CVE-2021-36942)
PetitPotam is a NTLM relay attack vulnerability that is often checked for in Active Directory penetration testing. Attackers can become
Active Directory Series
![](https://secured.ai/wp-content/uploads/2023/10/adcspart1.jpg)
Active Directory Series: Introducing AD CS
This post introduces Active Directory Certificate Services (AD CS) and topics like: public key infrastructure (PKI), the Kerberos pre-authentication protocol PKINIT, Certificate Signing Requests (CSR), and templates. This overview provides a baseline for learning AD CS penetration testing.
![](https://secured.ai/wp-content/uploads/2023/08/blog_featured-LDAP820-×-450-px-770x423.jpg)
Active Directory Series: LDAP Reconnaissance
LDAP is a protocol that is targeted by attackers to get more information about Active Directory environments. This post covers
![](https://secured.ai/wp-content/uploads/2023/07/Untitled-820-×-450-px-1-770x423.jpg)
Active Directory Series: LAPS Permissions
Local Administrator Password Solutions (LAPS) provides various security benefits in Active Directory environments. If LAPS permissions are not set correctly,
![Network Security Technology](https://secured.ai/wp-content/uploads/2023/07/blog-featured-network-tech-770x423.jpeg)
Cybersecurity In Real Time: Network Tech For Identifying Attacks
An effective cyber defense strategy should not only include preventative measures but also focus on identifying attacks as they happen
![](https://secured.ai/wp-content/uploads/2023/06/blog-featured-fort-worth9642-770x423.jpeg)
Fort Worth Under Digital Siege: City’s Cyber Defenses Breached
Forth Worth’s cybersecurity was tested by the hacktivist group SiegedSec this past week. This article delves into the motivations behind
![](https://secured.ai/wp-content/uploads/2023/06/blog-featured-power-lines9464-770x423.jpeg)
Precision From Above: Drones Exploring the Unreachable and Securing Our World
Drones have emerged as the go-to solution to complete dangerous tasks that often put humans at great risk. Drone are
![](https://secured.ai/wp-content/uploads/2023/06/blog_featured_greatwall-770x423.jpg)
The Great Firewall Breached: China’s Hacking Shenanigans Exposed
The Cyber Battlefield: Analyzing China’s Aggressive Campaign of State-Sponsored Hacks
![](https://secured.ai/wp-content/uploads/2023/06/2023-06-14-15_52_07-UAS-solutions-for-the-U.S.-DoD.jpg)
Drone Security: An Introduction to Blue UAS 2.0
Drone security continues to be a timely and challenging task. DIU’s Blue UAS 2.0 aims to help streamline the process
![](https://secured.ai/wp-content/uploads/2023/06/blog-featured-FL-ban-770x423.jpg)
SEIZING THE SKIES: THE STRATEGIC ADVANTAGE OF AI IN A POST-BAN WORLD
Folllowing the ban of DJI drones in Florida, Secured offers a unique drone surveillance solution with its AI Object Recognition