Presentations, Publications & Podcasts

My features in research, publications and other media.

Black Hat USA 2024: From Doxing to Doorstep (YouTube)
Black Hat USA 2024: From Doxing to Doorstep (YouTube)

Watch the recorded presentation showcasing privacy intrusion techniques used by hackers for extortion.

Mar 22, 2025

Cyber Crime Meets Real World Threats
Cyber Crime Meets Real World Threats

Man In The Middle Podcast

Feb 19, 2025

How Hackers Use Emergency Data Requests to Steal User Data
How Hackers Use Emergency Data Requests to Steal User Data

Video interview with Information Security Media Group on email compromise, doxing, and violence-as-a-service attacks.

Aug 22, 2024

Mega money, unfathomable violence pervade thriving underground doxxing scene
Mega money, unfathomable violence pervade thriving underground doxxing scene

It also attracts exactly the type of unempathetic people you would think it does.

Aug 12, 2024

Inside the Dark World of Doxing for Profit
Inside the Dark World of Doxing for Profit

From tricking companies into handing over victims’ personal data to offering violence as a service, the online doxing ecosystem is not just still a problem—it’s getting more extreme.

Aug 8, 2024

Black Hat USA 2024: From Doxing to Doorstep
Black Hat USA 2024: From Doxing to Doorstep

Exposing Privacy Intrusion Techniques used by Hackers for Extortion

Aug 7, 2024

Crabby's Credential Stuffing: Australian Account Takeovers in 2024
Crabby's Credential Stuffing: Australian Account Takeovers in 2024

Threat Research

May 20, 2024

Catching up with Jacob, Penetration Testing Lead
Catching up with Jacob, Penetration Testing Lead

Hardly Adequate Podcast

Jan 1, 2024

Bolstering Your Incident Response Capability Using Tabletop Exercises
Bolstering Your Incident Response Capability Using Tabletop Exercises

AISA Cyber Conference Melbourne 2022 & Canberra 2023

Mar 21, 2023

Cyber Security, Career Development, Networking, Leadership and GRC
Cyber Security, Career Development, Networking, Leadership and GRC

Andy Li Podcast

Nov 6, 2022

Analysis of Real Cybercrime Operators
Analysis of Real Cybercrime Operators

AISA Cyber Today Magazine, Edition 1, 2022

Apr 6, 2022

Performing Re-Entrancy Attacks on the Ethereum Blockchain
Performing Re-Entrancy Attacks on the Ethereum Blockchain

BSides Perth 2021

Aug 15, 2021

Building a Cyber Resilient Future
Building a Cyber Resilient Future

Journal Article Publication for AFCEA on "The Future of Cyber Warfighting"

Aug 14, 2021