Professionally Evil Blog
A blog by experts of penetration testing and other security assessments.
Ethical hacking uses the principles and techniques of hackers to help businesses protect their infrastructure and information (You could also say it is used as an offensive part of a modern army’s arsenal, but that is not what we do). Many people wonder about our trademark tagline: “Professionally ...
Continue Reading
Never miss a Professionally Evil update!
Current State of Security in Healthcare
Healthcare organizations are a prime target for many malicious individuals and organizations in the ...
Continue Reading
Security Concerns around Remote Employees
In the cloud-based economy, businesses of every size are hiring remote employees. Remote employees ...
Continue Reading
Ransomware and Scareware Pop-ups
Every computer owner has had the heart-stopping moment where a popup comes up and says that your ...
Continue Reading
Ransomware Intelligence Briefing
Ransomware Intelligence Briefing Media reporting on the WannaCry ransomware campaign has contained ...
Continue Reading
Place Your Right Hand On This Glass
One of the hassles of the Yahoo! breach was clearly the coming-home-to-roost quality of the ...
Continue Reading
You Must Be This Tall
Imagine going in to do an incident response at a fairly large customer that has no visibility ...
Continue Reading
Statement by Nick Selby on Bishop Fox / Muddy Waters Report
FOR IMMEDIATE RELEASE: Statement by Secure Ideas Response Team Director Nick Selby on the Report ...
Continue Reading
SQLMap Beginnings: What and How
Testing web based applications is not only fun but is often multi-faceted and challenging. Often ...
Continue Reading
Reversing Type 7 Cisco Passwords
While working on a recent pen test, I came across a few Cisco routers sitting on an internal ...
Continue Reading
SamuraiWTF 3.2 RELEASED!
We are really excited to announce that SamuraiWTF 3.2 is now available publicly. This release is ...
Continue Reading
Patching binaries with Backdoor Factory
When was the last time you downloaded a binary file from the Internet or grabbed one off of a ...
Continue Reading