Professionally Evil Insights
Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.
Welcome aboard!
Sailing into the Unique Security Risks of AI Systems - Part 1 MITRE ATLAS
As we venture further into the vast ocean of Artificial Intelligence (AI) - employing it to automate tasks, solve complex problems, and make predictions - we face an unfamiliar sea full of unique security risks. This vast sea of advanced technologies, intricate models, and data islands provides ...
Continue Reading
Never miss a Professionally Evil update!
Steam Deck Privacy and Security
Like any portable computing device, there are going to be questions about privacy and security. The ...
Continue Reading
Digging Between the Couch Cushions - CouchDB CVE-2021-38295 Breakdown
Vulnerability |
developers |
security |
open source |
information security |
application security |
hacking
Introduction In this blog post we’re going to take a look at the recent CouchDB vulnerability, ...
Continue Reading
Game Hacking Part 1 - Equipping Your Loadout
Why Bother with Video Game Security? Video games are more than just entertainment. Gaming is a ...
Continue Reading
Kubernetes Security - A Useful Bash One-Liner
Whether you’re an administrator, pentester, devop engineer, programmer, or some other IT person, ...
Continue Reading
It's Okay, We're All On the SameSite
With Google’s recent announcement that all cookies without a SameSite flag will be treated as ...
Continue Reading
Game Console Hacking: Part 1 Lab Setup
This is the first in a series of blog posts on my journey through video game hacking and security. ...
Continue Reading
A Container Hacker’s Guide to Living Off of the Land
hacking |
container hacking |
container security |
containerization |
pentesting |
living off the land
Sometimes as a pentester you find yourself in tricky situations. Depending on the type of ...
Continue Reading
Escaping the Whale: Things You Probably Shouldn’t Do With Docker (part 2)
This post is part 2 of a series of blog posts on container hacking. If you haven’t read the part1, ...
Continue Reading
Escaping the Whale: Things you probably shouldn't do with Docker (Part 1)
In this blog post, I won’t spend too much time explaining what Docker is and is not. You can do ...
Continue Reading