Professionally Evil Insights

Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.

Welcome aboard!

    From Linux to PowerShell and Back: A Quick Command Reference
    Quick Overview If you are like me, you are switching back and forth between Linux and Windows systems while you are on a pentest. Even if you don’t use Kali, Linux is by far one of the most popular systems for pentesting as it offers a wide range of tools out there that run on it. Using Linux works ...
    Continue Reading

    Never miss a Professionally Evil update!

    Flipper Zero: Hardware Hacking JTAG and SWD Webcast
    The Flipper Zero is known as a hacking multitool. It can cover a range of hacking from sub-ghz ...
    Continue Reading
    The Client-Side Security Trap: A Warning For Developers
    Considering the inherent complexities of modern web development, understanding the distinct roles ...
    Continue Reading
    Top 5 Security Considerations for a New Web App - 5. Establishing an Dependency Patching Plan
    Welcome to our comprehensive series on the Top 5 Security Considerations for a New Web App. This ...
    Continue Reading
    Top 5 Security Considerations for a New Web App - 4. Logging and Monitoring
    Welcome to our comprehensive series on the Top 5 Security Considerations for a New Web App. This ...
    Continue Reading
    Top 5 Security Considerations for a New Web App - 3. Data Encryption and Protection
    Welcome to my comprehensive series on the Top 5 Security Considerations for a New Web App. This ...
    Continue Reading
    Top 5 Security Considerations: 2. Authentication & Authorization
    Welcome to my comprehensive series on the Top 5 Security Considerations for a New Web App. This ...
    Continue Reading
    Top 5 Security Considerations: 1. Secure Coding
    Welcome to my comprehensive series on the Top 5 Security Considerations for a New Web App. For this ...
    Continue Reading
    Top 5 Security Considerations for a New Web App
    There was a time when many folks responsible for building and deploying web applications were naive ...
    Continue Reading
    Quick Bites Episode 11 – Ranking Application Risks
    application security  |  hacking  |  pentesting  |  Quick Bites  |  risk assessment  |  appsec  |  application risk  |  ranking risk
    Threats often evolve faster than defenders can figure out how to prevent them. That’s why keeping ...
    Continue Reading
    What are SQL Injection Vulnerability (SQLi), How to Identify Them, and How to Prevent
    Recently, the FBI and CISA released a Secure by Design alert calling for the elimination of SQL ...
    Continue Reading
    Being Safe and Secure with Cross-Origin Messaging
    security  |  JavaScript  |  application  |  web  |  cross-origin
    Complex web and mobile apps often depend on cross-domain interactions between different online ...
    Continue Reading