Professionally Evil Insights

Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.

Welcome aboard!

    The Secret Handshake – Covertly Redirecting Mobile Traffic to a Different Backend
    Normally while performing iOS or Android mobile application penetration tests, we request a custom app from the client to circumvent controls like certificate pinning, and Android’s app certificate trust complexities. These are controls that can be bypassed, but it’s time-consuming and finicky ...
    Continue Reading

    Never miss a Professionally Evil update!

    Understanding Garbage Findings
    There is a well-meaning desire among penetration testers to produce findings. The fact of the ...
    Continue Reading
    What’s new in the OWASP Proactive Controls for 2024
    I have taught a number of application security classes to developers. When it comes to ...
    Continue Reading
    Many Hands Approach To AppSec
    "If you want to frustrate a good developer, interfere with their ability to complete work." - ...
    Continue Reading
    Tartar Sauce for your Phishing Program
    Phishing awareness exercises have become a common part of the larger security strategy for many ...
    Continue Reading
    Top 5 Security Considerations for a New Web App: 5. Establishing a Dependency Patching Plan
    Welcome to our comprehensive series on the Top 5 Security Considerations for a New Web App. This ...
    Continue Reading
    Top 5 Security Considerations for a New Web App: 4. Logging & Monitoring
    Welcome to our comprehensive series on the Top 5 Security Considerations for a New Web App. This ...
    Continue Reading
    Top 5 Security Considerations for a New Web App: 3. Data Encryption & Protection
    Welcome to my comprehensive series on the Top 5 Security Considerations for a New Web App. This ...
    Continue Reading
    Top 5 Security Considerations for a New Web App: 2. Authentication & Authorization
    Welcome to my comprehensive series on the Top 5 Security Considerations for a New Web App. This ...
    Continue Reading
    Top 5 Security Considerations for a New Web App: 1. Secure Coding
    Welcome to my comprehensive series on the Top 5 Security Considerations for a New Web App. For this ...
    Continue Reading
    Top 5 Security Considerations for a New Web App
    There was a time when many folks responsible for building and deploying web applications were naive ...
    Continue Reading
    Being Safe and Secure with Cross-Origin Messaging
    security  |  JavaScript  |  application  |  web  |  cross-origin
    Complex web and mobile apps often depend on cross-domain interactions between different online ...
    Continue Reading
    Has contents: true Total pages: 4 Current page: 1