Blog

Black Hat USA 2024: Interviews with Extorters 'Ego' and 'Reiko'

Read the full transcripts of my interviews with threat actors involved in doxing for extortion. This includes ‘Ego’, a member of the notorious doxing gang ViLE, and ‘Reiko’ a system administrator and developer of the largest online doxing community, Doxbin.

Crabby's Credential Stuffing: Australian Account Takeovers in 2024

In January 2024, breaking headlines were made, with commentary from Prime Minister Anthony Albanese, that 50+ major Australian brands had customer accounts compromised through credential stuffing attacks. This article provides threat attribution, and detailed research on the adversaries involved.

How to Rapidly Progress your Cyber Security Career

If you ever find yourself wondering how you will be able to progress your cyber security career in the direction you want, this article is for you. We all have different objectives, whether that be flexibility, a position in specialist security niche, a certain amount of remuneration or a specific title.

Answering "How do I get my first role in Cyber Security?"

Despite mainstream media, boot camps and universities claiming there is a cyber security skills shortage, and that you can become a professional “in just 24 weeks”, it hasn’t been made clear that the shortage is of experienced professionals, and not entry level candidates. This creates a “chicken and the egg” scenario, as individuals struggle to secure their first role.

Performing Re-Entrancy Attacks on the Ethereum Blockchain

A review of the most well known Ethereum smart contract flaw, known as the “re-entrancy” attack. This attack is also known as a race-to-empty attack, which intends to recursively loop a withdrawal until a smart contract balance is emptied. I presented this attack at BSides Perth 2021.

Building a Cyber Resilient Future

A journal article which was a submission to AFCEA’s The Cyber Edge Writing Contest on “The Future of Cyber Warfighting”.