Professionally Evil Insights

Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.

Welcome aboard!

    Beyond the Browser: The Questions That Expanded the Attack Surface
    After presenting this research at security conferences this year, I was expecting the usual post-talk questions like "what tools did you use?", "does this also work on mobile?", or a compliance officer asking if PDF forms are covered under their DLP policy. What the audience did instead was take ...
    Continue Reading

    Never miss a Professionally Evil update!

    Supply Chain Security: Trust Is the New Attack Surface
    In February 2026, while participating in a panel at IT Expo, one statement kept resonating ...
    Continue Reading
    SaaS Sprawl, Identity, and the Illusion of Control
    While participating in the SaaS Sprawl and Shared Responsibility: Regaining Control and Assuring ...
    Continue Reading
    Detecting Dangling SaaS Subdomains and Real Subdomain Takeovers
    Subdomain takeover is one of those vulnerabilities that refuses to die. Every few years it gets ...
    Continue Reading
    Bypassing Browser PDF Security: Using Embedded JavaScript Forms for Social Engineering
    I can say that, since I started my journey at Secure Ideas, I’ve felt extremely fortunate. Not only ...
    Continue Reading
    From Nmap to CSV
    How Experience and Management Skills Improve Data Analysis for Security Professionals The other ...
    Continue Reading
    Best Practices and Risks Considerations in Automation like LCNC and RPA
    best practices  |  LCNC  |  RPA
    The Rise of Low-Code/No-Code and RPA in Digital Transformation Technologies such as ...
    Continue Reading
    The CISO's Myopia
    Fifteen years ago, I wrote an article entitled "The CSO’s Myopia." At the time, I aimed to ...
    Continue Reading
    Has contents: true Total pages: 1 Current page: 1