Professionally Evil Insights

Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.

Welcome aboard!

    Decoding F5 Cookie
    As a Penetration Tester, there are many different things you come across while performing a test. ...
    Continue Reading
    Introduction to MobiSec video
    We just wanted to post a quick update to let you know about a new video. Kevin (working with James) ...
    Continue Reading
    Reading the Mandiant APT1 Report
    Like a lot of folks, I downloaded and read through the Mandiant APT1 report as soon as I could. ...
    Continue Reading
    Active Defenses?
    Active defense, often mistakenly called hacking back, is a common topic thrown around the security ...
    Continue Reading
    Where in the RSA is Kevin?
    So RSA 2013 in San Francisco is coming up and I will be there for two different parts of the event. ...
    Continue Reading
    Grab a CORS Light
    Many of you already know that any cross-site HTTP requests invoked from scripts running within a ...
    Continue Reading
    Laudanum by Example: Shell
    Previously, I wrote a post providing a brief introduction to Laudanum. If you haven’t read it, or ...
    Continue Reading
    Introduction to Laudanum
    As a security consultant, there are so many scenarios that I run into every day that there is no ...
    Continue Reading
    Hi, I'm with IT and I'm Here to Steal From You
    Beware of the Unknown IT Grunt I decided to continue on with the same theme as Kevin’s post about ...
    Continue Reading
    WinPhone 7: Fiddler Setup
    One of the many tasks on any penetration tester’s to-do list is to set up a web proxy for debugging ...
    Continue Reading
    Finding the Leaks
    One of the common vulnerabilities we find when performing internal network penetration testing is ...
    Continue Reading
    Has contents: true Total pages: 38 Current page: 36

    Never miss a professionally evil update!