Professionally Evil Insights
Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.
Welcome aboard!
In Case of Fire: Break Windows
When a client calls us to pentest a web application that is only available in Internet Explorer. I ...
Continue Reading
IAM Access Analyzer Review
TL;DR – This is a free tool that helps solve one of the biggest security problems when working in ...
Continue Reading
Security Review of Nest Camera
I love tinkering with home automation and security solutions. The simplicity of turning on a light ...
Continue Reading
IAM Root: AWS IAM Simulator Tutorial
If you needed yet another reason to be paranoid about your personal information being exposed, the ...
Continue Reading
My Experience in the CISSP Mentorship Program
A little while back, I was talking with a friend of mine about the different services that Secure ...
Continue Reading
Game Console Hacking: Part 1 Lab Setup
This is the first in a series of blog posts on my journey through video game hacking and security. ...
Continue Reading
Using Components with Known Vulnerabilities
[Note: There is an updated version of this article] When dealing with cyber vulnerabilities, there ...
Continue Reading
Better API Penetration Testing with Postman – Part 4
This is the final part of this series on putting together a better API testing tool-chain. In Part ...
Continue Reading
Computers are People Too
There are those rare times during pen tests, when you are on a client’s network and you don’t have ...
Continue Reading
OWASP's Most Wanted (Continued)
In my last blog I talked about Command Injection and OS Injection OWASP’s Most Wanted, and will now ...
Continue Reading
Taming the Jungle: Hardening your AWS infrastructure
After nine tutorials, sixteen posts on stack overflow, and several hours or workweeks of effort ...
Continue Reading
Has contents: true
Total pages: 38
Current page: 16