Professionally Evil Insights

Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.

Welcome aboard!

    Navigating the Changing Regulatory Landscape: Staying Ahead in a Shifting Environment
    In today's rapidly expanding business world, the only constant seems to be change itself. One of the most crucial areas where change is often encountered is the regulatory landscape. Industries across the spectrum are witnessing unprecedented regulatory shifts, driven by technological advancements, ...
    Continue Reading

    Never miss a Professionally Evil update!

    Application Security 202: Vulnerabilities Accepted
    vul·ner·a·bil·i·ty The quality or state of being exposed to the possibility of being attacked or ...
    Continue Reading
    (Not So) Quick Bites - Episode 3 - Writing About Writer's Block
    Deliverables  |  consulting  |  application security  |  Secure Ideas  |  cybersecurity  |  methodology  |  Project  |  Writing  |  Quick Bites
    So, sometimes I have a real problem with writing, specifically reports and blog posts. Somehow, ...
    Continue Reading
    Wild West Hackin Fest 2022: The Return
    Man, San Diego is beautiful. I don't know exactly why John Strand and Black Hills Information ...
    Continue Reading
    How to Create Custom Probes For NMAP Service/Version Detection
    network  |  hacking  |  cybersecurity  |  pentesting  |  scanning  |  NMAP  |  version  |  service  |  probe  |  ports  |  match  |  chrome  |  debugging  |  nmap-service-probes  |  softmatch  |  rarity  |  directive  |  remote
    Overview NMAP is a fantastic tool for performing initial reconnaissance and enumeration. A simple ...
    Continue Reading
    Social Engineering - Why hack it, when people are just giving away their information!
    cybersecurity  |  scareware  |  social engineering  |  phishing  |  vishing
    In today’s technologically driven society, more and more criminals have turned to cyber crime as a ...
    Continue Reading