Professionally Evil Insights

Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.

Welcome aboard!

    Introducing BILE - Groundbreaking Classification for Web App
    As a seasoned web application penetration tester, I've always felt that there should be a more ...
    Continue Reading
    Hardware Hacking: Interfacing to UART with Your Computer
    hacking  |  hardware  |  UART
    In my previous article, we covered identification and mapping of the UART interface. In that ...
    Continue Reading
    Hardware Hacking: Finding UART Pinouts on PCBs
    hacking  |  hardware  |  UART
    In my previous article, we started to explore the Universal Asynchronous Receiver/Transmitter ...
    Continue Reading
    Hardware Hacking: Introduction to the UART Interface
    hacking  |  IoT  |  hardware  |  UART
    I wanted to provide some information about hardware and firmware hacking in our blogs. To get the ...
    Continue Reading
    Introducing PETaaS: Professionally Evil Testing as a Service
    We're thrilled to announce the launch of our latest offering: Professionally Evil Testing as a ...
    Continue Reading
    Ace CISSP Exam Prep with ChatGPT: Your AI Study Buddy
    Are you preparing for the CISSP exam or any other exam that requires a deep understanding of ...
    Continue Reading
    NMAP NSE Scripting By Example: Wordpress Version Detection
    NMAP  |  version  |  NSE  |  Detection  |  WordPress
    In my last blog post, I gave a high-level introduction to the Nmap Scripting Engine (NSE). In this ...
    Continue Reading
    Why we ditched LastPass
    LastPass is a very popular password management service with both personal and business solutions. ...
    Continue Reading
    Is the CISSP Mentorship for me?
    Training  |  CISSP
    “Knowledge is power.” That quote has been said more times than you can count because it’s true. The ...
    Continue Reading
    What happened to CVE-2022-23529? And what can we learn from it?
    If you saw the disclosure notice for the flaw CVE-2022-23529, it would have been presented as a ...
    Continue Reading
    Risks of AI Generated Content, According to an AI Content Generator
    automation  |  Writing  |  Privacy  |  AI  |  machine learning  |  artificial intelligence
    AI and Machine Learning (ML) have become increasingly popular tools in various industries, ranging ...
    Continue Reading

    Never miss a professionally evil update!