Latest News & Articles
Secured™ Receives 8(a) Certification from the Small Business Administration
Secured™ is proud to announce that we have received 8(a) certification from the U.S. Small Business Administration (SBA) and Veteran
Finance By Day, Fiction By Night: Brandon Thomson’s Journey at Secured™
At Secured™, employees are more than just cogs in the machine—they’re valued members of a family, each bringing their unique
Secured™ Announces the Appointment of Kristie Bender-Carey as CEO Finance
Secured™ proudly announces the appointment of Kristie Bender-Carey as CEO Finance, bringing her extensive experience in finance and strategic growth
Security Resources
CISA's Known Exploited Vulnerabilities Catalog
Minimize Cybersecurity Risk with the Known Exploited Vulnerabilities (KEV) Catalog
In November 2021 the Cybersecurity and Infrastructure Security Agency (CISA) started the Known Exploited Vulnerabilities (KEV) Catalog and Binding Operational Directive 22-01. The KEV catalog lists only vulnerabilities known to be actively exploited.
KEV Catalog: “sAMAccountName” “noPac” Privilege Escalation (CVE-2021-42278 and CVE-2021-42287)
“sAMAcountName” and “noPac” are two critical Active Directory vulnerabilities that can lead to full Domain compromise. Learn how a dollar
KEV Catalog: ExifTool Remote Code Execution Vulnerability (CVE-2021-22204)
This vulnerability is in ExifTool, a tool for changing the metadata of video, image and pdf files. Vulnerable versions of
Active Directory Series
Active Directory Series: Introducing AD CS
This post introduces Active Directory Certificate Services (AD CS) and topics like: public key infrastructure (PKI), the Kerberos pre-authentication protocol PKINIT, Certificate Signing Requests (CSR), and templates. This overview provides a baseline for learning AD CS penetration testing.
“PetitPotam” Windows LSA Spoofing Vulnerability (CVE-2021-36942)
PetitPotam is a NTLM relay attack vulnerability that is often checked for in Active Directory penetration testing. Attackers can become
Active Directory Series: 10 Reasons to Use CrackMapExec
CrackMapExec has various modules and options for Active Directory penetration testing. Here are 10 reasons to check out CrackMapExec.
The Great Firewall Breached: China’s Hacking Shenanigans Exposed
The Cyber Battlefield: Analyzing China’s Aggressive Campaign of State-Sponsored Hacks
Drone Security: An Introduction to Blue UAS 2.0
Drone security continues to be a timely and challenging task. DIU’s Blue UAS 2.0 aims to help streamline the process
SEIZING THE SKIES: THE STRATEGIC ADVANTAGE OF AI IN A POST-BAN WORLD
Folllowing the ban of DJI drones in Florida, Secured offers a unique drone surveillance solution with its AI Object Recognition
Empowering American Heroes: The Significance of the Service-Disabled Veteran-Owned Small Business Program
We, here at Secured™, are proud to announce that we have officially achieved the highly regarded designation of “Service-Disabled Veteran-Owned
The Rise of AI-Powered Cyber Attacks: Are We Prepared?
Cybercriminals are leveraging AI’s capabilities to execute more sophisticated and evasive attacks, putting sensitive data and critical infrastructure at more
Lessons From the City Of Dallas Ransomware Attack
Two weeks ago, the City of Dallas was targeted by the suspected ransomware group Royal. There are specific best practices