Professionally Evil Insights
Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.
Welcome aboard!
The Essential Eight
Australian Signals Directorate’s Top 8 Controls to Mitigate Cyber Security Incidents & How They Compare to NIST 800-5 Anyone who has been in Cybersecurity, from a student beginning the journey to a seasoned professional, knows about the Security and Privacy Controls for Information Systems and ...
Continue Reading
Never miss a Professionally Evil update!
From Nmap to CSV
How Experience and Management Skills Improve Data Analysis for Security Professionals The other ...
Continue Reading
You Don’t Need PKINIT To Win It
Privilege Escalation using LDAP Part 1 Pass-the-certificate has become a common method used by ...
Continue Reading
Built-In Network Capture with Windows 11
Did you know that Windows has a built-in network packet capture utility? And that it isn’t even GUI ...
Continue Reading
Running and Debugging Non-native ELF Binaries Locally Using QEMU, BINFMT, and GDB
Overview One of the common tasks that occurs when pentesting an embedded device is binary analysis ...
Continue Reading
Who Really Owns Your Data?
When we traded ownership for convenience, we never imagined that everything from our books to our ...
Continue Reading
When Algorithms Aren’t Enough: Why the Human Element Still Matters in Modern Penetration Testing
The cybersecurity industry has evolved into two distinct approaches when it comes to penetration ...
Continue Reading
OT: The Invisible World in Motion
We are surrounded by technology, not just in what we carry but in nearly every aspect of our daily ...
Continue Reading
Solicited Public Comment on HIPAA Security Rule NPRM To Strengthen the Cybersecurity of ePHI
The Department of Health and Human Services (HHS) wants to raise the benchmarks of the Security ...
Continue Reading
Building a Custom Burp Suite Collaborator Everywhere BApp
Have you ever run into an issue when using a BApp in Burp Suite that it didn’t quite work with your ...
Continue Reading
Quick Bites Episode 12 - Hidden Treasures
Ever go on a treasure hunt? Ever find any hidden treasure? It’s a blast! One of my favorite ...
Continue Reading
Operational Technology’s use of Wireless Networks
The Growing Importance and Challenges of Wireless Networks in Operational Technology
Continue Reading
Has contents: true
Total pages: 40
Current page: 1