Professionally Evil Insights
Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.
Welcome aboard!
Taming the Enterprise AI Beast Webcast
As artificial intelligence (AI) continues to become more and more integral to business operations, ...
Continue Reading
Encrypting Data on the Steam Deck with Plasma Vaults
encryption |
Gaming |
Privacy |
Steam Deck
In my previous post about the Steam Deck we discussed some of the privacy and security concerns ...
Continue Reading
Sailing into the Unique Security Risks of AI Systems Part 1
As we venture further into the vast ocean of Artificial Intelligence (AI) - employing it to ...
Continue Reading
Steam Deck Privacy and Security
Like any portable computing device, there are going to be questions about privacy and security. The ...
Continue Reading
Digging Between the Couch Cushions - CouchDB CVE-2021-38295 Breakdown
Vulnerability |
developers |
security |
open source |
information security |
application security |
hacking
Introduction In this blog post we’re going to take a look at the recent CouchDB vulnerability, ...
Continue Reading
Game Hacking Part 1 - Equipping Your Loadout
Why Bother with Video Game Security? Video games are more than just entertainment. Gaming is a ...
Continue Reading
Kubernetes Security - A Useful Bash One-Liner
Whether you’re an administrator, pentester, devop engineer, programmer, or some other IT person, ...
Continue Reading
It's Okay, We're All On the SameSite
With Google’s recent announcement that all cookies without a SameSite flag will be treated as ...
Continue Reading
Game Console Hacking: Part 1 Lab Setup
This is the first in a series of blog posts on my journey through video game hacking and security. ...
Continue Reading
A Container Hacker’s Guide to Living Off of the Land
hacking |
container hacking |
container security |
containerization |
pentesting |
living off the land
Sometimes as a pentester you find yourself in tricky situations. Depending on the type of ...
Continue Reading
Escaping the Whale: Things You Probably Shouldn’t Do With Docker (part 2)
This post is part 2 of a series of blog posts on container hacking. If you haven’t read the part1, ...
Continue Reading
Has contents: true
Total pages: 2
Current page: 0