Andy McCarthy (@andymccarthyuk) 's Twitter Profile
Andy McCarthy

@andymccarthyuk

Researcher and SL @ University of the West of England (@UWEcyber). Interested in secure machine learning.

ID: 119757469

calendar_today04-03-2010 15:16:22

1,1K Tweet

123 Followers

1,1K Following

ACE Responder (@aceresponder) 's Twitter Profile Photo

FREE reverse engineering module now available! Learn assembly fundamentals - perfect for beginners. • Hands-on debugging with real examples • Web based: no downloads, installs, or VMs Start reversing here 👇

Privacy International (@privacyint) 's Twitter Profile Photo

📢 New research alert: SMEX has published an investigation about WANA's principal commercial spyware vendors (CSVs). The report 'Click, Load, Kill: A Look into the Cyberweapon Industry in the WANA Region' suggests that CSVs linked to Israel seem to dominate the WANA market.

Abertay Hackers (@abertayhackers) 's Twitter Profile Photo

Save the date 🗣️ Tell your friends 🗣️ Securi-Tay 2026 will be happening on February 27th, 2026! 🎉 Find out more details at securi-tay.co.uk

Save the date 🗣️ Tell your friends 🗣️ Securi-Tay 2026 will be happening on February 27th, 2026! 🎉 Find out more details at securi-tay.co.uk
Times Higher Education (@timeshighered) 's Twitter Profile Photo

Rethinking exams: how to make feedback meaningful and impactful for students: timeshighereducation.com/campus/three-s… #Academia #HigherEd #AcademicChatter

Andy McCarthy (@andymccarthyuk) 's Twitter Profile Photo

Bristol’s growing reputation in AI is no surprise, as it was named the second best UK city for AI enterprise in 2024, behind Cambridge, by Business Financed. bristol247.com/business/news-…

Andy McCarthy (@andymccarthyuk) 's Twitter Profile Photo

The security chief of SolarWinds reflects on the Russian hack that exposed US government agencies – and the heart attack he suffered in the aftermath. theguardian.com/technology/202…

Threat Insight (@threatinsight) 's Twitter Profile Photo

Proofpoint threat researchers have designed an open-source tool—named PDF Object Hashing—to track and detect the unique characteristics of PDFs used by threat actors... similar to a digital fingerprint. 🫆 We use this tool internally to help track multiple threat actors with

Proofpoint threat researchers have designed an open-source tool—named PDF Object Hashing—to track and detect the unique characteristics of PDFs used by threat actors... similar to a digital fingerprint. 🫆

We use this tool internally to help track multiple threat actors with
Software Engineering Institute (@sei_cmu) 's Twitter Profile Photo

No matter what #SBOM tool you use, output should be consistent. In our latest podcast, Dr. Jessie Jamieson, a #cyber risk engineer, discusses how to achieve more accuracy in SBOMs and present and future SEI research on this front #CyberAwareness - youtube.com/watch?v=FeA-34…

David Milner (@djjmilner) 's Twitter Profile Photo

Its almost incomprehensible in 1991 there was a dual carriageway running through the middle of Queens square, a stunning complete Georgian square, in Bristol A staggering lack of emotion and sense of reason. Hopefully a blip of insanity in human history

Its almost incomprehensible in 1991 there was a dual carriageway running through the middle of Queens square, a stunning complete Georgian square, in Bristol 

A staggering lack of emotion and sense of reason. Hopefully a blip of insanity in human history
Andy McCarthy (@andymccarthyuk) 's Twitter Profile Photo

The UN Convention against Cybercrime, 1st global treaty of its kind, extends beyond cybercrime. It obligates states to establish broad electronic surveillance powers. It does so without adequate human rights safeguards. hrw.org/news/2025/10/2…

DailyPapers (@huggingpapers) 's Twitter Profile Photo

Microsoft researchers reveal a critical discovery in LLM safety: Emergent Misalignment in In-Context Learning! Narrow in-context examples can cause LLMs to generate broadly misaligned responses on unrelated tasks, with rates up to 58%. A major concern for AI safety as ICL

Microsoft researchers reveal a critical discovery in LLM safety: Emergent Misalignment in In-Context Learning!

Narrow in-context examples can cause LLMs to generate broadly misaligned responses on unrelated tasks, with rates up to 58%. A major concern for AI safety as ICL
@zephrfish.yxz.red (@zephrfish) 's Twitter Profile Photo

While not as good as seeing a talk in the flesh, I have written up a blog post with the comparisons I discussed in my talk about the cross over between photography and the importance of picking something to get you away from your keyboard sometimes. blog.zsec.uk/chasing-the-fr…

solst/ICE (@icesolst) 's Twitter Profile Photo

Can we punish everyone that does this? They admit to exfiltrating PII. Any company doing this as a marketing stunt is irresponsible and should be banned from operating.

IAEA - International Atomic Energy Agency ⚛️ (@iaeaorg) 's Twitter Profile Photo

Pressurized water reactors are the most widely used reactors in nuclear power plants. But how do they work? This infographic explains. #NuclearExplained

Pressurized water reactors are the most widely used reactors in nuclear power plants. But how do they work? This infographic explains. 

#NuclearExplained
intellbooks (@intellbooks) 's Twitter Profile Photo

The Oxford Handbook of National Security Intelligence by Loch K. Johnson - new book out now #CIA #HUMINT  #covertaction #NIC #DCI #AI #intellbooks Oxford University Press

The Oxford Handbook of National Security Intelligence by Loch K. Johnson - new book out now #CIA #HUMINT  #covertaction #NIC #DCI #AI #intellbooks <a href="/OxUniPress/">Oxford University Press</a>
Ollie Whitehouse (@ollieatnowhere) 's Twitter Profile Photo

At NCSC UK we have just released guidance on using Privileged Access Workstations (PAWs) in Operational Technology (OT) environments.. ncsc.gov.uk/collection/ope…

Andy McCarthy (@andymccarthyuk) 's Twitter Profile Photo

Over half of children getting news from social media are worried and upset by content that involves war, violence and death, according to research that found social media companies are “pushing” distressing news to children who are not seeking it. theguardian.com/society/2025/o…

Prof Lennart Nacke, PhD (@acagamic) 's Twitter Profile Photo

Once per research article section: Highlight words like “various”, “numerous”, “nowadays”, “several”. Replace each with a specific time, quantity, or group. Example: “numerous studies” → “14 longitudinal studies since 2018”. Specificity builds credibility.

Andy McCarthy (@andymccarthyuk) 's Twitter Profile Photo

How to apply... Why do you want to study this course or subject? How have your qualifications and studies helped you to prepare for this course or subject? What else have you done to prepare outside education, and why are these experiences useful?” theguardian.com/commentisfree/…