Oct 14, 2025
Australia’s new age assurance laws are a privacy nightmare.
‘On the internet, nobody knows you’re a dog’ … but in Australia they will soon.
Introduction While seemingly innocuous, the The Online Safety Amendment (Social Media Minimum Age) Act 2024 is among the most significant changes to the internet in Austr...
Jul 21, 2025
Simple detection mechanisms for initial access attempts.
In modern cyber crime ecosystems, initial access (TA0001) is a red hot market. Automated tools are used to create phishing pages and harvest unsuspecting users’ credentials at scale. These credentials are often used for schemes such as business email...
Jun 22, 2025
Improvements and upgrades.
After a few weeks of playing around with Meshtastic since my last post, I wanted to share some additional findings.
Revised channel configuration In my original post, I made a mistake with the channel configuration. I encrypted my default ‘LongFast’ ...
Jun 2, 2025
Basic setup, configuration and testing.
Meshtastic is a decentralised, wireless mesh network utilising long range (LoRa) radio waves.
Meshtastic operates on low cost, low power devices using unlicensed radio bands. Devices can send encrypted text messages up to 200 characters in length. GP...
May 25, 2025
A key technique used to evade defences and achieve arbitrary code execution.
Recently I’ve been working on some detection rules to identify process injection attempts.
Process injection (T1055) is a key technique used by adversaries to evade defenses and execute arbitrary code. New methods are regularly found, and there are n...
May 15, 2025
Hello! Welcome to my website.
I plan on using this site to document various projects I work on and opinion pieces or blog articles that I write. Content will likely be related to both my professional work in cyber security as a detection engineer, an...