Professionally Evil Insights
Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.
Welcome aboard!
Top 5 Security Considerations for a New Web App: 1. Secure Coding
Welcome to my comprehensive series on the Top 5 Security Considerations for a New Web App. For this ...
Continue Reading
Top 5 Security Considerations for a New Web App
There was a time when many folks responsible for building and deploying web applications were naive ...
Continue Reading
Quick Bites Episode 11 – Ranking Application Risks
application security |
hacking |
pentesting |
Quick Bites |
risk assessment |
appsec |
application risk |
ranking risk
Threats often evolve faster than defenders can figure out how to prevent them. That’s why keeping ...
Continue Reading
What are SQL Injection Vulnerability (SQLi), How to Identify Them, and How to Prevent
Recently, the FBI and CISA released a Secure by Design alert calling for the elimination of SQL ...
Continue Reading
Being Safe and Secure with Cross-Origin Messaging
security |
JavaScript |
application |
web |
cross-origin
Complex web and mobile apps often depend on cross-domain interactions between different online ...
Continue Reading
Prompt Injection
information security |
AI |
machine learning |
artificial intelligence |
cyber security |
Prompt Engineering |
AI Security |
Prompt Injection |
ML
What is Prompt Injection?
Continue Reading
QB 10 – Half Shells and Full Shells
hacking |
pentesting |
shell |
Quick Bites |
reverse shells |
terminal |
python |
python3 |
netcat |
command line |
nc
I wanted to share a really cool technique that I found out about recently. Now I will say this is ...
Continue Reading
Intro to NMAP
My journey into cybersecurity has been anything but easy. This field offers a wide range of ...
Continue Reading
What does PCI require for Developer Training?
Training |
PCI |
developers |
application security |
appsec
The Payment Card Industry Security Standards Council (PCI SSC) defines compliance standards for all ...
Continue Reading
Mitigating Exploitation Risks in Active Directory Certificate Services
A recent pentest of an Active Directory environment turned into a struggle to uncover an avenue for ...
Continue Reading
Uncharted Waters: Network Depths with runZero & OPNsense
network security |
Vagrant |
runZero |
homelab |
Series: Uncharted Waters |
OPNSense |
asset discovery
(artwork created by stable diffusion)
Continue Reading
Has contents: true
Total pages: 39
Current page: 3