Rich Macfarlane (@rjmacfarlane) 's Twitter Profile
Rich Macfarlane

@rjmacfarlane

Associate Professor Cyber Security, Edinburgh Napier University. Course Leader for NCSC certified MSc Cyber Security courses. CSC @SecScotland Moderator.

ID: 411151160

linkhttps://napier-repository.worktribe.com/person/110757/rich-macfarlane calendar_today13-11-2011 02:03:12

4,4K Tweet

1,1K Followers

1,1K Following

LaurieWired (@lauriewired) 's Twitter Profile Photo

Ghidra 11.3 is OUT! PyGhidra is the new feature to be excited about. It’s a Python library providing direct access to the Ghidra API. I expect this to massively increase Reverse Engineering tool development, as it significantly reduces the barrier to entry.

Johann Rehberger (@wunderwuzzi23) 's Twitter Profile Photo

👉 ChatGPT Operator: Prompt Injection Exploits & Defenses Latest blog post on how a GitHub Issue (or other websites for that matter) can hijack your AI + a sneaky data exfiltration technique that tricked Operator to leaking private data. embracethered.com/blog/posts/202…

Edinburgh Napier University Security Society (@enusec) 's Twitter Profile Photo

🚨 EARLY BIRD TICKETS BATCH 2 IS NOW LIVE! 🚨 The second batch of Early Bird tickets is now available for Le Tour Du Hack 2025! 🔥 This is the final batch of Early Bird tickets. After these sell out, there won't be any more! Get your ticket now at ltdh.enusec.org

🚨 EARLY BIRD TICKETS BATCH 2 IS NOW LIVE! 🚨

The second batch of Early Bird tickets is now available for Le Tour Du Hack 2025! 🔥

This is the final batch of Early Bird tickets. After these sell out, there won't be any more!

Get your ticket now at ltdh.enusec.org
rez0 (@rez0__) 's Twitter Profile Photo

I'm a hacker and AI researcher who has reported vulnerabilities to OpenAI, Google, and others. I wrote this guide as a reference of all of the ways that you can hack AI. It has saved me hours. Bookmark this if you need a reference for what all to try (AND includes mitigations).

I'm a hacker and AI researcher who has reported vulnerabilities to OpenAI, Google, and others. I wrote this guide as a reference of all of the ways that you can hack AI. 

It has saved me hours. Bookmark this if you need a reference for what all to try (AND includes mitigations).
Itay Cohen 🌱 (@megabeets_) 's Twitter Profile Photo

I analyzed thousands of messages from 35+ suspected state-sponsored hacktivist groups using machine learning—uncovering hidden connections through writing styles, language and topics. After a year of research, here’s what we found and how we did it. 👇 research.checkpoint.com/2025/modern-ap… 1/

DarkFeed (@ido_cohen2) 's Twitter Profile Photo

🚨 Cyber Alert: The ransomware group FOG has added a Ukrainian government office to its list of victims. 🇺🇦💻 While the war between Ukraine and Russia continues, cybercriminal groups sometimes intertwine cyberattacks with political motives. This latest breach raises concerns

🚨 Cyber Alert: The ransomware group FOG has added a Ukrainian government office to its list of victims. 🇺🇦💻

While the war between Ukraine and Russia continues, cybercriminal groups sometimes intertwine cyberattacks with political motives. 
This latest breach raises concerns
Rich Macfarlane (@rjmacfarlane) 's Twitter Profile Photo

Our recent Ransomware network analysis research highlighted this encryption remotely over SMB shares ... didn't see it being used from a vulnerable webcam ... clever that is

SANS Offensive Operations (@sansoffensive) 's Twitter Profile Photo

🚨 NEXT WEEK, FOR ONE DAY ONLY 🚨 Join in this fun opportunity for some amazing hands-on challenges based on our SANS Offensive Operations courses! Tuesday, Mar 18, 2025 10am - 4pm EDT Details and registration here: sans.org/webcasts/offen…

🚨 NEXT WEEK,  FOR ONE DAY ONLY 🚨 

Join in this fun opportunity for some amazing hands-on challenges based on our SANS Offensive Operations courses!

Tuesday, Mar 18, 2025 10am - 4pm EDT

Details and registration here: sans.org/webcasts/offen…
Barracuda Networks (@barracuda) 's Twitter Profile Photo

Black Basta was one of the fastest-growing ransomware threats in the last couple of years. Now it's gone silent. What happened? Find out here: bit.ly/4kw81uc #ransomware #cybercrime

Black Basta was one of the fastest-growing ransomware threats in the last couple of years. Now it's gone silent. What happened? Find out here: bit.ly/4kw81uc 

#ransomware #cybercrime
Department for Science, Innovation and Technology (@scitechgovuk) 's Twitter Profile Photo

The CyberFirst Girls Competition empowers 12 to 13 year-old girls to develop cyber security skills, diversifying the UK’s tech space 👾 We're partnering with IBM who will be hosting the online platform for the 2025 round. Find out more 👉 gov.uk/government/new…

The CyberFirst Girls Competition empowers 12 to 13 year-old girls to develop cyber security skills, diversifying the UK’s tech space 👾

We're partnering with <a href="/IBM/">IBM</a> who will be hosting the online platform for the 2025 round.

Find out more 👉 gov.uk/government/new…
Edinburgh Napier University Security Society (@enusec) 's Twitter Profile Photo

🚨 Upcoming events for April 🚨 Save the dates! 🗓 💻What Makes a Home(Lab) by Benjamin and Cameron 👂You're Talking But Who's Listening? By Fraser Wilson 🐞And a session by Joseph Thacker from Bugcrowd! And on the 23rd, We'll be heading to NQ64 for our April Social! 🎮🕹

🚨 Upcoming events for April 🚨

Save the dates! 🗓

💻What Makes a Home(Lab) by Benjamin and Cameron
👂You're Talking But Who's Listening? By Fraser Wilson
🐞And a session by Joseph Thacker from Bugcrowd!

And on the 23rd, We'll be heading to NQ64 for our April Social!  🎮🕹
DarkFeed (@ido_cohen2) 's Twitter Profile Photo

🚨 Kill Security ransomware group has claimed a new high-profile target: the Royal Saudi Air Force 🇸🇦. We're only days into April, and Kill Security is already leading the global ransomware activity charts — by a wide margin. Will they keep this aggressive pace? This group is

🚨 Kill Security ransomware group has claimed a new high-profile target: the Royal Saudi Air Force 🇸🇦.

We're only days into April, and Kill Security is already leading the global ransomware activity charts — by a wide margin.

Will they keep this aggressive pace?
This group is
Edinburgh Napier University Security Society (@enusec) 's Twitter Profile Photo

We're happy to announce the launch of #ENUSEC_X We'd love to see the memories our members, both current and former, have had of ENUSEC. Be it CTFs, regular sessions, or perhaps one of our socials. We'd like you all to share pics of your memories and use #ENUSEC_X so we see it!

We're happy to announce the launch of #ENUSEC_X

We'd love to see the memories our members, both current and former, have had of ENUSEC.
Be it CTFs, regular sessions, or perhaps one of our socials. We'd like you all to share pics of your memories and use #ENUSEC_X so we see it!
vx-underground (@vxunderground) 's Twitter Profile Photo

This random document fell off the back of a bus. Weird. This random document which randomly fell off the back of a bus (randomly) says MITRE is no longer supporting the CVE program as of April 16th, 2025. Which is crazy, because this random document is dated April 15th, 2025.

This random document fell off the back of a bus. Weird.

This random document which randomly fell off the back of a bus (randomly) says MITRE is no longer supporting the CVE program as of April 16th, 2025. Which is crazy, because this random document is dated April 15th, 2025.
BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

MITRE warns that funding for critical CVE program expires today - Sergiu Gatlan bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…

Rich Macfarlane (@rjmacfarlane) 's Twitter Profile Photo

Really looking forward to our big annual event this weekend ... great our ENUSEC students have produced such an amazing range of talks, workshops and this discussion session sounds particularly interesting

Jamie O'Hare (@thehairyj) 's Twitter Profile Photo

In Edinburgh today for Edinburgh Napier University Security Society’s #LTDH25, can’t believe it’s already been 10 years of ENUSEC! As part of #enusec_X, this throwback to arcade night is a great reminder of the fun beyond cybersecurity and studies.