Professionally Evil Insights

Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.

Welcome aboard!

    Sailing into the Unique Security Risks of AI Systems - Part 1 MITRE ATLAS
    As we venture further into the vast ocean of Artificial Intelligence (AI) - employing it to automate tasks, solve complex problems, and make predictions - we face an unfamiliar sea full of unique security risks. This vast sea of advanced technologies, intricate models, and data islands provides ...
    Continue Reading

    Never miss a Professionally Evil update!

    Steam Deck Privacy and Security
    security  |  Gaming  |  Privacy
    Like any portable computing device, there are going to be questions about privacy and security. The ...
    Continue Reading
    Digging Between the Couch Cushions - CouchDB CVE-2021-38295 Breakdown
    Introduction In this blog post we’re going to take a look at the recent CouchDB vulnerability, ...
    Continue Reading
    Game Hacking Part 1 - Equipping Your Loadout
    Why Bother with Video Game Security? Video games are more than just entertainment. Gaming is a ...
    Continue Reading
    Kubernetes Security - A Useful Bash One-Liner
    Whether you’re an administrator, pentester, devop engineer, programmer, or some other IT person, ...
    Continue Reading
    It's Okay, We're All On the SameSite
    With Google’s recent announcement that all cookies without a SameSite flag will be treated as ...
    Continue Reading
    Game Console Hacking: Part 1 Lab Setup
    This is the first in a series of blog posts on my journey through video game hacking and security. ...
    Continue Reading
    A Container Hacker’s Guide to Living Off of the Land
    Sometimes as a pentester you find yourself in tricky situations. Depending on the type of ...
    Continue Reading
    Escaping the Whale: Things You Probably Shouldn’t Do With Docker (part 2)
    This post is part 2 of a series of blog posts on container hacking. If you haven’t read the part1, ...
    Continue Reading
    Escaping the Whale: Things you probably shouldn't do with Docker (Part 1)
    In this blog post, I won’t spend too much time explaining what Docker is and is not. You can do ...
    Continue Reading