Latest News & Articles
![Secured and Skull Games](https://secured.ai/wp-content/uploads/2024/07/securedskull-games-banner-720x480.png)
Secured™: The Official Cybersecurity Partner of Skull Games
Secured™ has announced its bronze-level corporate sponsorship and official cybersecurity partnership with Skull Games, a nonprofit organization dedicated to combating
![Object Recognition Equipment](https://secured.ai/wp-content/uploads/2024/02/blog-featured-object-recognition-equipment-720x450.jpg)
Unveiling the Tools Behind Object Recognition: A Deep Dive into Deep Learning Equipment
Discover the cutting-edge tools and technologies powering object recognition systems. From sophisticated hardware to advanced software frameworks, learn how these
![2023 Cyber Security Trends](https://secured.ai/wp-content/uploads/2023/12/blog-featured-2023-720x450.jpg)
Looking Back on 10 Cybersecurity Trends of 2023
This list of trends highlights the dynamic and complex nature of cybersecurity we faced in 2023, underscoring the need for
Security Resources
CISA's Known Exploited Vulnerabilities Catalog
![CISA Logo](https://secured.ai/wp-content/uploads/2022/12/cisa-logo.jpeg)
Minimize Cybersecurity Risk with the Known Exploited Vulnerabilities (KEV) Catalog
In November 2021 the Cybersecurity and Infrastructure Security Agency (CISA) started the Known Exploited Vulnerabilities (KEV) Catalog and Binding Operational Directive 22-01. The KEV catalog lists only vulnerabilities known to be actively exploited.
![](https://secured.ai/wp-content/uploads/2023/05/blog-featured-smbghost-770x423.jpg)
KEV Catalog: “SMBGhost” Microsoft SMBv3 Remote Code Execution Vulnerability (CVE-2020-0796)
“SMBGhost” is a critical vulnerability that affected SMBv3 in Windows 10 Versions 1903 and 1909. The vulnerability is an integer
![](https://secured.ai/wp-content/uploads/2023/05/featured-blog-hivenightmare3-513x770.jpg)
KEV Catalog: “HiveNightmare” aka ”SeriousSAM” Vulnerability CVE-2021-36934
CVE-201-36934 is called Microsoft Windows SAM Local Privilege Escalation Vulnerability and is also known by the nicknames “HiveNightmare” or “SeriousSAM”.
Active Directory Series
![](https://secured.ai/wp-content/uploads/2023/10/adcspart1.jpg)
Active Directory Series: Introducing AD CS
This post introduces Active Directory Certificate Services (AD CS) and topics like: public key infrastructure (PKI), the Kerberos pre-authentication protocol PKINIT, Certificate Signing Requests (CSR), and templates. This overview provides a baseline for learning AD CS penetration testing.
![](https://secured.ai/wp-content/uploads/2023/06/featured_blog-dc-sync-1-770x423.jpg)
KEV Catalog: “sAMAccountName” “noPac” Privilege Escalation (CVE-2021-42278 and CVE-2021-42287)
“sAMAcountName” and “noPac” are two critical Active Directory vulnerabilities that can lead to full Domain compromise. Learn how a dollar
![](https://secured.ai/wp-content/uploads/2023/06/featured_blog-dc-sync-770x423.jpg)
Active Directory Series: DC Sync
DC Sync attacks are a serious threat to Active Directory environments. DC Sync attacks occurred in the SolarWinds compromise in
![](https://secured.ai/wp-content/uploads/2023/03/ferrari-brno-racing-car-automobiles-770x578.jpg)
Ferrari Cyber Incident: Cyber Extortion vs Ransomware
Last week, Ferrari announced it was contacted by a cyber threat actor for a ransom demand. Their corporate response to
![](https://secured.ai/wp-content/uploads/2023/03/2023-03-20-13_33_59-Stop-Ransomware-_-CISA.jpg)
CISA Announces Ransomware Vulnerability Warning Pilot
Last week, Monday March 13, CISA announced the creation of the Ransomware Vulnerability Warning Pilot (RVWP). This program was launched
![](https://secured.ai/wp-content/uploads/2023/03/2023-03-14-09_03_54-Kali-Secured-Work-VMware-Workstation.jpg)
Introducing and Setting Up the New Kali Linux 2023.1: Kali Purple
Today, Kali Linux’s 10-year anniversary, Kali Linux released their newest Kali Linux version: Kali Purple. Kali Linux is known for
![National Cybersecurity Strategy](https://secured.ai/wp-content/uploads/2023/03/blog-nat-cyber-strat-770x423.jpg)
An Overview of the Biden-Harris New National Cyber Security Strategy
The key messages emphasize where the U.S. government wants to allocate its cybersecurity spending and who should be responsible for
![](https://secured.ai/wp-content/uploads/2023/02/2023-03-10-09_27_55-Geography-of-Cyber-Attacks-_-CyberPeace-Institute-770x440.jpg)
DDoS Attacks Emerge as Main Cyber Threat in Ukraine Conflict
The CyberPeace Institute has recorded cyber-attacks against a variety of host nations, including Ukraine and Russia. Reviewing their data from
![](https://secured.ai/wp-content/uploads/2023/02/rust-chain-weak-link-wallpaper-preview.jpg)
Reports: Rapid Rise In Open Source Supply Chain Attacks
Last month, Mend released their Open Source Risk Report which outlines the risks associated with open source vulnerabilities and software