Sleepwalking into surveillance creep

Australia’s new age assurance laws are a privacy nightmare.

‘On the internet, nobody knows you’re a dog’ … but in Australia they will soon. Introduction While seemingly innocuous, the The Online Safety Amendment (Social Media Minimum Age) Act 2024 is among the most significant changes to the internet in Austr...

Axios credential harvesters - Detection and response

Simple detection mechanisms for initial access attempts.

In modern cyber crime ecosystems, initial access (TA0001) is a red hot market. Automated tools are used to create phishing pages and harvest unsuspecting users’ credentials at scale. These credentials are often used for schemes such as business email...

More Meshtastic testing

Improvements and upgrades.

After a few weeks of playing around with Meshtastic since my last post, I wanted to share some additional findings. Revised channel configuration In my original post, I made a mistake with the channel configuration. I encrypted my default ‘LongFast’ ...

An introduction to Meshtastic

Basic setup, configuration and testing.

Meshtastic is a decentralised, wireless mesh network utilising long range (LoRa) radio waves. Meshtastic operates on low cost, low power devices using unlicensed radio bands. Devices can send encrypted text messages up to 200 characters in length. GP...

Detecting process injection

A key technique used to evade defences and achieve arbitrary code execution.

Recently I’ve been working on some detection rules to identify process injection attempts. Process injection (T1055) is a key technique used by adversaries to evade defenses and execute arbitrary code. New methods are regularly found, and there are n...

Hello world

Hello! Welcome to my website. I plan on using this site to document various projects I work on and opinion pieces or blog articles that I write. Content will likely be related to both my professional work in cyber security as a detection engineer, an...

 

rigelnoble.com

Cyber security and detection engineering. Technology, privacy and more.