Professionally Evil Insights

Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.

Welcome aboard!

    In Case of Fire: Break Windows
    When a client calls us to pentest a web application that is only available in Internet Explorer. I ...
    Continue Reading
    IAM Access Analyzer Review
    TL;DR – This is a free tool that helps solve one of the biggest security problems when working in ...
    Continue Reading
    Security Review of Nest Camera
    I love tinkering with home automation and security solutions. The simplicity of turning on a light ...
    Continue Reading
    IAM Root: AWS IAM Simulator Tutorial
    If you needed yet another reason to be paranoid about your personal information being exposed, the ...
    Continue Reading
    My Experience in the CISSP Mentorship Program
    A little while back, I was talking with a friend of mine about the different services that Secure ...
    Continue Reading
    Game Console Hacking: Part 1 Lab Setup
    This is the first in a series of blog posts on my journey through video game hacking and security. ...
    Continue Reading
    Using Components with Known Vulnerabilities
    [Note: There is an updated version of this article] When dealing with cyber vulnerabilities, there ...
    Continue Reading
    Better API Penetration Testing with Postman – Part 4
    This is the final part of this series on putting together a better API testing tool-chain. In Part ...
    Continue Reading
    Computers are People Too
    There are those rare times during pen tests, when you are on a client’s network and you don’t have ...
    Continue Reading
    OWASP's Most Wanted (Continued)
    In my last blog I talked about Command Injection and OS Injection OWASP’s Most Wanted, and will now ...
    Continue Reading
    Taming the Jungle: Hardening your AWS infrastructure
    After nine tutorials, sixteen posts on stack overflow, and several hours or workweeks of effort ...
    Continue Reading
    Has contents: true Total pages: 38 Current page: 16

    Never miss a professionally evil update!