Professionally Evil Insights

Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.

Welcome aboard!

    PCI-DSS 4.0.1 - Proving Security: A Penetration Testing Series
    The Illusion of Security In many organizations, there is a quiet confidence in the state of Security. Teams patch systems, complete vulnerability scans on schedule, and perform annual assessments with diligence. Reports are delivered, reviewed, and ultimately filed away as evidence that the right ...
    Continue Reading

    Never miss a Professionally Evil update!

    Rolling for Resilience Part 5 - Side Quests: Not Every Member of the Party Swings a Sword!
    This is the fifth post in this series addressing my perspective on the current state of ...
    Continue Reading
    The AI Arms Race Just Went Public: What Project Glasswing Means for You
    penetration testing  |  AI  |  Mythios  |  Anthropic AI  |  Project Glasswing
    Anthropic's announcement this week isn't just a product launch. It's a public acknowledgment that ...
    Continue Reading
    The Secret Handshake – Covertly Redirecting Mobile Traffic to a Different Backend
    Normally while performing iOS or Android mobile application penetration tests, we request a custom ...
    Continue Reading
    Paths to Power in Active Directory Part 4: ESC3 – In The Name of The Crown
    In Part 2, ESC1 – No One, Yet Everyone, we examined a misconfiguration that allows a low-privileged ...
    Continue Reading
    Understanding MFA Fatigue Attacks
    Multi-factor authentication has become one of the most widely recommended controls in security. The ...
    Continue Reading
    Rolling for Resilience Part 4 - Boots in the Field: Manuals for Real-Time Action
    This is the fourth post in this series addressing my perspective on the current state of ...
    Continue Reading
    Paths to Power in Active Directory Part 3: ESC2 – The Seal of Any Purpose
    “ Power in Active Directory, much like power in Westeros, often changes hands not through force, ...
    Continue Reading
    Supply Chain Security: Trust Is the New Attack Surface
    In February 2026, while participating in a panel at IT Expo, one statement kept resonating ...
    Continue Reading
    SaaS Sprawl, Identity, and the Illusion of Control
    While participating in the SaaS Sprawl and Shared Responsibility: Regaining Control and Assuring ...
    Continue Reading
    Detecting Dangling SaaS Subdomains and Real Subdomain Takeovers
    Subdomain takeover is one of those vulnerabilities that refuses to die. Every few years it gets ...
    Continue Reading
    AI Agents: Clippy With Root Access
    There’s a new kind of software showing up in your Slack, IDE, and cloud console and it’s AI agents. ...
    Continue Reading
    Has contents: true Total pages: 33 Current page: 1