infosec, Twitter, 4/14/2019 7:22:40 AM, 193665


FAQ | Problem?

infosec_2019-04-14_00-00-02.xlsx
infosec_2019-04-14_00-00-02.xlsx
From:
NodeXLExcelAutomator
Uploaded on:
April 14, 2019
Short Description:
infosec via NodeXL http://bit.ly/2UVqdUN
@sectest9
@evacide
@reach2ratan
@fisher85m
@rfidgroup
@uscert_gov
@hansesecure
@stephandsec
@paula_piccard
@appsecbloke

Top hashtags:
#infosec
#cybersecurity
#security
#hacker
#cyberwarfare
#cyber
#iot
#malware
#hackers
#tech

Description:
Description
The graph represents a network of 3,507 Twitter users whose tweets in the requested range contained "infosec", or who were replied to or mentioned in those tweets. The network was obtained from the NodeXL Graph Server on Sunday, 14 April 2019 at 07:01 UTC.

The requested start date was Sunday, 14 April 2019 at 00:01 UTC and the maximum number of days (going backward) was 14.

The maximum number of tweets collected was 5,000.

The tweets in the network were tweeted over the 1-day, 11-hour, 30-minute period from Friday, 12 April 2019 at 12:30 UTC to Sunday, 14 April 2019 at 00:01 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 3507
Unique Edges : 4060
Edges With Duplicates : 2877
Total Edges : 6937
Number of Edge Types : 3
Mentions : 4288
Tweet : 2448
Replies to : 201
Self-Loops : 2448
Reciprocated Vertex Pair Ratio : 0.0222222222222222
Reciprocated Edge Ratio : 0.0434782608695652
Connected Components : 763
Single-Vertex Connected Components : 402
Maximum Vertices in a Connected Component : 1787
Maximum Edges in a Connected Component : 4632
Maximum Geodesic Distance (Diameter) : 21
Average Geodesic Distance : 5.661324
Graph Density : 0.000306777854933113
Modularity : 0.551273
NodeXL Version : 1.0.1.410

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[39] https://go.usa.gov/xm4Nn
[29] https://go.usa.gov/xm4F4
[24] http://securenetworkmanagement.com/recon-ng-tutorial-part-1/
[24] http://securenetworkmanagement.com/recon-ng-tutorial-part-2/
[22] https://go.usa.gov/xm4Q8
[17] https://searchsecurity.techtarget.com/tip/Top-5-reasons-for-a-zero-trust-approach-to-network-security
[16] https://vpnpro.com/blog/how-to-protect-personal-information-online/?utm_campaign=9%20Ways%20to%20Protect%20Personal%20Information%20Online%20%7C%20VPNpro&utm_medium=ContentAmp&utm_source=twitter
[15] https://www.analyticsvidhya.com/blog/2019/01/comprehensive-learning-path-deep-learning-2019/
[14] https://xlab.tencent.com/en/2019/03/18/ghidra-from-xxe-to-rce/
[13] http://open-sez.me

Top URLs in Tweet in G1:
[5] https://phishstats.info/
[4] https://www.hackread.com/nasty-android-ios-malware-found-using-govt-surveillance-tech/
[3] https://www.zdnet.com/article/internet-explorer-zero-day-lets-hackers-steal-files-from-windows-pcs/
[3] https://go.usa.gov/xm4Nn
[3] http://Matrix.org
[3] https://www.youtube.com/watch?v=ik3C5vF3HBc

[2] https://stateofsecurity.com/vendor-printer-management-and-security/?utm_campaign=vendor-printer-management-and-security&utm_medium=social_link&utm_source=missinglettr
[2] https://go.usa.gov/xm4Q8
[2] https://krebsonsecurity.com/2019/04/android-7-0-phones-can-now-double-as-google-security-keys/
[2] https://twitter.com/aneeshnair/status/1116560582549753856

Top URLs in Tweet in G2:
[13] http://open-sez.me
[8] https://blog.pradeo.com/google-play-app-peel-smart-remote-data-leakage
[8] https://packetstormsecurity.com/news/view/30027/Internet-Archive-Denies-Hosting-Terrorist-Content.html
[7] https://www.sentinelone.com/blog/dnsmessenger-powershell-malware-analysis-2
[7] https://www.lastline.com/blog/how-machine-learning-for-cybersecurity-can-thwart-insider-threats/?twitter=@aneeshnair
[6] https://hakin9.org/beginners-guide-how-to-become-an-ethical-hacker/
[6] https://www.uscybersecurity.net/cybersecurity-drought/
[6] https://twitter.com/aneeshnair/status/1116560582549753856
[6] https://www.deccanchronicle.com/technology/in-other-news/030219/5g-vulnerable-to-snooping.html
[6] https://www.computerweekly.com/news/252461400/A-quarter-of-phishing-emails-bypass-Office-365-security

Top URLs in Tweet in G3:
[12] https://www.analyticsvidhya.com/blog/2019/01/comprehensive-learning-path-deep-learning-2019/
[6] http://feedproxy.google.com/~r/TheHackersNews/~3/_GY6GC5vRE0/facebook-app-database.html
[6] https://www.cpomagazine.com/cyber-security/5g-and-the-future-of-cybersecurity/
[6] https://www.techrepublic.com/videos/how-to-use-ssh-as-a-vpn-with-sshuttle/#ftag=RSS56d97e7
[5] https://packetstormsecurity.com/news/view/30002/Computer-Virus-Alters-Cancer-Scan-Images.html
[5] http://feedproxy.google.com/~r/TheHackersNews/~3/n96Imf1QyoE/georgia-tech-data-breach.html
[5] https://packetstormsecurity.com/news/view/30010/FIN6-Evolves-From-POS-Malware-To-Ransomware.html
[5] https://packetstormsecurity.com/news/view/29997/Games-Of-Thrones-Has-The-Most-Malware-Of-Any-Pirated-TV-Show.html
[5] https://www.techrepublic.com/videos/what-is-a-sql-injection-attack/#ftag=RSS56d97e7
[5] https://www.techrepublic.com/article/sql-injection-attacks-a-cheat-sheet-for-business-pros/#ftag=RSS56d97e7

Top URLs in Tweet in G4:
[1] https://twitter.com/i/web/status/1117202520755986432
[1] https://twitter.com/i/web/status/1116779544277426177
[1] https://twitter.com/i/web/status/1116806056410095618
[1] https://twitter.com/i/web/status/1116806030740955136
[1] https://twitter.com/i/web/status/1116974797974466560
[1] https://twitter.com/i/web/status/1116907557833068544
[1] https://twitter.com/i/web/status/1116843696425558016
[1] https://twitter.com/i/web/status/1116839945094737920
[1] https://www.oneplus.com/
[1] https://twitter.com/i/web/status/1116822831541686274

Top URLs in Tweet in G5:
[4] https://www.peerlyst.com/posts/a-byod-wiki-peerlyst?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[4] https://www.peerlyst.com/posts/a-small-script-for-cron-a-giant-leap-seconds-file-for-ntp-martin-boller?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[4] https://securelist.com/large-scale-sim-swap-fraud/90353/
[3] https://www.peerlyst.com/posts/top-posts-about-email-security-on-peerlyst-an-email-security-wiki-peerlyst?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[3] https://www.zdnet.com/article/noscript-extension-officially-released-for-google-chrome/
[3] https://www.tripwire.com/state-of-security/featured/hacker-jailed-launching-malware-attacks/#.XK9NhDkI6M4.twitter
[2] https://www.peerlyst.com/posts/how-mature-is-your-infosec-program-jerod-brennen-cissp?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[2] https://www.peerlyst.com/posts/level-up-your-infosec-career-part-8-j-geno?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[2] https://lnkd.in/dwaK26N
[2] https://www.tripwire.com/state-of-security/featured/women-nonbinary-nicola-whiting/

Top URLs in Tweet in G6:
[22] http://securenetworkmanagement.com/recon-ng-tutorial-part-1/
[22] http://securenetworkmanagement.com/recon-ng-tutorial-part-2/
[13] https://xlab.tencent.com/en/2019/03/18/ghidra-from-xxe-to-rce/
[8] https://redcanary.com/blog/lateral-movement-winrm-wmi/
[6] https://www.kitploit.com/
[5] https://cxsecurity.com/issue/WLB-2019030140
[3] https://www.darkreading.com/
[3] https://bugs.python.org/issue35907
[2] https://github.com/almandin/fuxploider
[2] https://hansesecure.de/backdooring-pe-file-with-aslr/

Top URLs in Tweet in G7:
[34] https://go.usa.gov/xm4Nn
[29] https://go.usa.gov/xm4F4
[18] https://go.usa.gov/xm4Q8
[9] https://go.usa.gov/xmg6t
[4] https://securityaffairs.co/wordpress/83653/hacking/wpa3-security-flaws.html
[2] https://go.usa.gov/xmYCY
[2] https://go.usa.gov/xmg3m
[2] https://www.bleepingcomputer.com/news/security/home-office-leaks-the-emails-of-hundreds-of-eu-citizens/
[2] https://www.bleepingcomputer.com/news/security/threat-group-uses-pastebin-github-in-sneakypastes-operation/
[2] https://lazarusalliance.com/5-tips-keeping-ecommerce-store-secure-holidays/

Top URLs in Tweet in G8:
[1] https://twitter.com/i/web/status/1116916002158260225

Top URLs in Tweet in G9:
[2] https://josephsteinberg.com/five-backup-disasters-to-avoid/
[2] https://www.pcmag.com/news/367705/symantec-2-out-of-3-hotels-leak-your-personal-details
[2] https://www.zdnet.com/article/internet-explorer-zero-day-lets-hackers-steal-files-from-windows-pcs/
[1] https://twitter.com/i/web/status/1116422463120920576
[1] https://twitter.com/i/web/status/1116434747591282688
[1] https://twitter.com/i/web/status/1116816775880921088
[1] https://twitter.com/i/web/status/1115974110234935297
[1] https://www.schneier.com/blog/archives/2019/04/tajmahal_spywar.html
[1] https://twitter.com/i/web/status/1117006671262433280
[1] https://twitter.com/i/web/status/1116704750563745793

Top URLs in Tweet in G10:
[3] https://podtail.com/en/podcast/trill-tech-culture/
[2] https://securityaffairs.co/wordpress/83715/malware/cryptopokemon-ransomare-decryptor.html
[2] https://techcrunch.com/2019/04/13/tesla-is-raising-the-price-on-the-future/
[2] https://nakedsecurity.sophos.com/2019/04/12/assange-arrested-faces-extradition-for-hacking/
[2] https://www.threatshub.org/blog/amazon-auditors-listen-to-echo-recordings-report-says/
[2] https://www.ilsoftware.it/articoli.asp?tag=VirusTotal-guida-all-uso-del-servizio-per-controllare-l-identita-dei-file_19076
[2] http://newsography.com
[1] https://twitter.com/BobViolino/status/1116732595734077441
[1] https://blog.threatxlabs.com/attacks-against-iot-devices-through-apis-and-how-to-prevent-them?utm_content=89053058&utm_medium=social&utm_source=twitter&hss_channel=tw-3118384454
[1] https://techcrunch.com/2019/04/12/did-you-fly-a-drone-over-fenway-park-the-faa-would-like-a-chat/

Top Domains
Top Domains in Tweet in Entire Graph:
[1421] twitter.com
[210] tobem.com
[206] paper.li
[105] usa.gov
[91] packetstormsecurity.com
[88] feedburner.com
[71] securityaffairs.co
[65] techrepublic.com
[58] pastebeen.com
[54] google.com

Top Domains in Tweet in G1:
[445] twitter.com
[58] pastebeen.com
[37] paper.li
[16] securityaffairs.co
[16] webiron.com
[11] zdnet.com
[9] youtube.com
[8] threatpost.com
[8] bankinfosecurity.com
[8] tenable.com

Top Domains in Tweet in G2:
[202] twitter.com
[30] hakin9.org
[15] paper.li
[15] securityonline.info
[15] sentinelone.com
[14] packetstormsecurity.com
[13] scmagazine.com
[13] open-sez.me
[12] medium.com
[11] techrepublic.com

Top Domains in Tweet in G3:
[112] twitter.com
[55] packetstormsecurity.com
[41] techrepublic.com
[38] google.com
[33] viruss.eu
[33] securityaffairs.co
[19] cpomagazine.com
[18] welivesecurity.com
[16] latesthackingnews.com
[14] ehackingnews.com

Top Domains in Tweet in G4:
[11] twitter.com
[1] oneplus.com

Top Domains in Tweet in G5:
[197] tobem.com
[140] twitter.com
[86] feedburner.com
[25] peerlyst.com
[5] packetstormsecurity.com
[5] tripwire.com
[5] zdnet.com
[4] hakin9.org
[4] securelist.com
[3] viruss.eu

Top Domains in Tweet in G6:
[45] securenetworkmanagement.com
[24] twitter.com
[13] tencent.com
[10] darkreading.com
[8] redcanary.com
[6] kitploit.com
[5] cxsecurity.com
[3] medium.com
[3] thehackernews.com
[3] python.org

Top Domains in Tweet in G7:
[94] usa.gov
[7] twitter.com
[4] bleepingcomputer.com
[4] securityaffairs.co
[3] lazarusalliance.com
[2] us-cert.gov
[1] zdnet.com
[1] europa.eu
[1] yoroi.company
[1] peerlyst.com

Top Domains in Tweet in G8:
[1] twitter.com

Top Domains in Tweet in G9:
[6] twitter.com
[2] josephsteinberg.com
[2] pcmag.com
[2] zdnet.com
[1] schneier.com

Top Domains in Tweet in G10:
[29] techcrunch.com
[27] twitter.com
[6] securityaffairs.co
[5] darkreading.com
[3] threatpost.com
[3] securityweekly.com
[3] threatshub.org
[3] podtail.com
[2] sophos.com
[2] thehackernews.com

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[3283] infosec
[1989] cybersecurity
[618] security
[356] hacker
[341] cyberwarfare
[310] cyber
[225] iot
[219] malware
[158] hackers
[152] tech



Top Hashtags in Tweet in G1:
[345] infosec
[256] cybersecurity
[44] security
[34] hacking
[33] databreach
[29] breach
[27] leak
[20] iot
[20] technology
[18] itsecurity

Top Hashtags in Tweet in G2:
[593] infosec
[358] cybersecurity
[202] security
[74] hacker
[67] malware
[65] hacking
[60] privacy
[50] cyber
[46] machinelearning
[43] hackers

Top Hashtags in Tweet in G3:
[518] cybersecurity
[463] infosec
[247] hacker
[228] security
[116] cyber
[83] ransomware
[81] malware
[80] hackers
[78] tech
[68] iot

Top Hashtags in Tweet in G4:
[15] infosec
[1] cybersecurity
[1] cybersec
[1] infosecurity
[1] soc
[1] ciso

Top Hashtags in Tweet in G5:
[485] infosec
[270] cyberwarfare
[79] cybersecurity
[33] binary
[31] cmcp
[24] winlooping
[14] hacker
[10] ff
[9] security
[9] ciso

Top Hashtags in Tweet in G6:
[119] infosec
[39] cybersecurity
[28] pentest
[24] pentesting
[21] redteam
[20] exploitdev
[18] vulnerability
[13] toussecnum
[13] ghidra
[12] security

Top Hashtags in Tweet in G7:
[122] infosec
[102] cybersecurity
[94] cyber
[6] hackers
[6] malware
[4] privacy
[4] wpa3
[4] attacks
[4] wifi
[4] password

Top Hashtags in Tweet in G8:
[1] anotherlevel
[1] infosec
[1] badusb
[1] usbninja

Top Hashtags in Tweet in G9:
[72] infosec
[71] cybersecurity
[66] iot
[65] 3dprinting
[3] security
[2] dataprivacy
[2] hacked
[1] spyware

Top Hashtags in Tweet in G10:
[67] infosec
[42] software
[41] technology
[12] cybersecurity
[6] blacktechtwitter
[3] osint
[3] followfriday
[2] poc
[2] secdevops
[2] engineer

Top Words
Top Words in Tweet in Entire Graph:
[2185] Words in Sentiment List#1: Positive
[2484] Words in Sentiment List#2: Negative
[11] Words in Sentiment List#3: Angry/Violent
[86091] Non-categorized Words
[90760] Total Words
[3288] #infosec
[1990] #cybersecurity
[732] security
[618] #security
[531] infosec

Top Words in Tweet in G1:
[345] #infosec
[256] #cybersecurity
[76] emails
[74] security
[71] infosec
[60] id
[59] dump
[59] paste
[53] passwords
[44] #security

Top Words in Tweet in G2:
[594] #infosec
[358] #cybersecurity
[202] #security
[98] security
[74] #hacker
[69] reach2ratan
[67] #malware
[65] #hacking
[60] #privacy
[54] s

Top Words in Tweet in G3:
[518] #cybersecurity
[463] #infosec
[280] reach2ratan
[247] #hacker
[228] #security
[149] fisher85m
[118] #cyber
[101] infographic
[83] #ransomware
[81] #malware

Top Words in Tweet in G4:
[142] infosec
[138] evacide
[137] women
[136] things
[136] better
[135] getting
[134] man
[134] surely
[134] nope
[133] woman

Top Words in Tweet in G5:
[487] #infosec
[270] #cyberwarfare
[123] security
[79] #cybersecurity
[49] hacking
[43] cyber
[33] male
[33] #binary
[31] ian_infosec
[31] normal

Top Words in Tweet in G6:
[119] #infosec
[66] hansesecure
[59] part
[41] 2
[39] #cybersecurity
[38] security
[30] s
[30] check
[30] 1
[29] dog

Top Words in Tweet in G7:
[122] #infosec
[102] #cybersecurity
[94] #cyber
[90] uscert_gov
[65] multiple
[34] vulnerability
[34] vpn
[34] applications
[29] vulnerabilities
[29] wpa3

Top Words in Tweet in G8:
[76] someone
[76] told
[76] making
[76] usbninja
[76] type
[76] socket
[76] crazy
[76] enough
[76] ble
[76] hall

Top Words in Tweet in G9:
[72] #infosec
[71] #cybersecurity
[70] paula_piccard
[67] someone
[67] used
[67] 3d
[67] printer
[67] spoof
[67] fingerprint
[67] sensor

Top Words in Tweet in G10:
[67] #infosec
[42] #software
[41] #technology
[27] techcrunch
[19] security
[14] infosec
[12] cybersecurity
[12] #cybersecurity
[11] news
[11] infosecsherpa

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[780] #cybersecurity,#infosec
[362] #infosec,#security
[299] #cyberwarfare,#infosec
[287] #cybersecurity,#hacker
[275] #hacker,#infosec
[236] #infosec,#cybersecurity
[142] women,infosec
[140] things,getting
[140] getting,better
[139] man,surely

Top Word Pairs in Tweet in G1:
[84] #cybersecurity,#infosec
[59] emails,paste
[59] paste,id
[57] #infosec,#cybersecurity
[49] passwords,emails
[29] #cybersecurity,#databreach
[29] #databreach,#infosec
[27] #infosec,#leak
[27] #leak,#breach
[21] r,t

Top Word Pairs in Tweet in G2:
[139] #infosec,#security
[94] #cybersecurity,#infosec
[49] #cybersecurity,#hacker
[44] #hacker,#infosec
[41] #security,#cybersecurity
[38] cheat,sheet
[35] #infosec,#cybersecurity
[34] commands,cheat
[34] sheet,#computerscience
[34] #computerscience,#computerengineering

Top Word Pairs in Tweet in G3:
[215] #cybersecurity,#hacker
[208] #hacker,#infosec
[152] #infosec,#security
[116] #security,#cyber
[98] #cybersecurity,#infosec
[77] #cyber,#tech
[74] infographic,#cybersecurity
[57] #tech,#gdpr
[42] #databreach,#ransomware
[42] #gdpr,reach2ratan

Top Word Pairs in Tweet in G4:
[135] things,getting
[135] getting,better
[135] women,infosec
[134] man,surely
[134] surely,things
[134] better,women
[134] infosec,nope
[133] nope,woman
[133] woman,dinner
[133] dinner,table

Top Word Pairs in Tweet in G5:
[270] #cyberwarfare,#infosec
[48] #cybersecurity,#infosec
[29] #binary,#cmcp
[25] cybertoolsbooks,#cyberwarfare
[20] #cmcp,#winlooping
[18] ajohnsocyber,carmencrincoli
[17] normal,male
[17] markmorow,eric_conrad
[16] male,#binary
[16] eric_conrad,ajohnsocyber

Top Word Pairs in Tweet in G6:
[33] part,2
[31] #cybersecurity,#infosec
[29] dog,whisperer
[29] whisperer,s
[29] s,handbook
[29] handbook,doing
[29] doing,ad
[29] ad,security
[29] security,blue
[29] blue,red

Top Word Pairs in Tweet in G7:
[95] #cybersecurity,#infosec
[94] #cyber,#cybersecurity
[34] vulnerability,multiple
[34] multiple,vpn
[34] vpn,applications
[34] applications,#cyber
[33] uscert_gov,vulnerability
[29] multiple,vulnerabilities
[29] vulnerabilities,wpa3
[29] wpa3,protocol

Top Word Pairs in Tweet in G8:
[76] someone,told
[76] told,making
[76] making,usbninja
[76] usbninja,type
[76] type,socket
[76] socket,crazy
[76] crazy,enough
[76] enough,ble
[76] ble,hall
[76] hall,sensor

Top Word Pairs in Tweet in G9:
[68] #cybersecurity,#infosec
[67] someone,used
[67] used,3d
[67] 3d,printer
[67] printer,spoof
[67] spoof,fingerprint
[67] fingerprint,sensor
[67] sensor,galaxy
[67] galaxy,s10
[66] s10,#cybersecurity

Top Word Pairs in Tweet in G10:
[42] #infosec,#software
[41] #software,#technology
[25] techcrunch,#infosec
[9] #infosec,#cybersecurity
[8] threatshub,cybersecurity
[8] cybersecurity,news
[6] security,weekly
[5] looking,infosec
[5] infosec,mentor
[5] mentor,coach

Top Replied-To
Top Replied-To in Entire Graph:
@evacide
@rohk_infosec
@tyrejim
@ian_infosec
@bentleyaudrey
@nerdpyle
@tenablesecurity
@hacks4pancakes
@bdankenbring
@infosec_samurai

Top Replied-To in G2:
@swarupnanda

Top Replied-To in G4:
@evacide
@chican3ry
@zmingyu
@beccanalia

Top Replied-To in G5:
@tyrejim
@ian_infosec
@bentleyaudrey
@nerdpyle
@rotate26chars
@fpieces
@eric_conrad
@simonzerafa
@fs0c131y
@bsidesmcr

Top Replied-To in G10:
@badassbowden
@infosecjon
@jaidbarrett
@emdott_e

Top Mentioned
Top Mentioned in Entire Graph:
@reach2ratan
@evacide
@fisher85m
@uscert_gov
@rfidgroup
@paula_piccard
@hansesecure
@cybertoolsbooks
@ai__tech
@imariajohnsen

Top Mentioned in G1:
@markquinn_vo
@webhostingsaver
@cryptofrieza
@skip7547
@gtpintado

Top Mentioned in G2:
@reach2ratan
@bamitav
@gopalsamy_
@cybertoolsbooks
@hakin9
@fernandohuamanx
@mirko_ross
@uscybermag
@1davidclarke
@cloudexpo

Top Mentioned in G3:
@reach2ratan
@fisher85m
@rpuettner
@antgrasso
@ipfconline1
@observatore2
@agoeskoes
@analyti
@cybersecboardrm
@mikequindazzi

Top Mentioned in G4:
@evacide
@zmingyu
@marasawr
@tarah
@mirko_ross

Top Mentioned in G5:
@ian_infosec
@cybertoolsbooks
@whitehatscum
@archonsec
@eric_conrad
@markmorow
@bentleyaudrey
@ajohnsocyber
@carmencrincoli
@j_opdenakker

Top Mentioned in G6:
@hansesecure
@sadprocessor
@ptracesecurity
@three_cube
@digbei
@laughing_mantis
@ydklijnsma
@cyberdian_news
@cyberdian_tools
@rfidgroup

Top Mentioned in G7:
@uscert_gov
@teamcymru
@claushoumann
@marco_ramilli
@ersincmt
@lazarusalliance
@vishne0
@exigeken
@reach2ratan
@unamcert

Top Mentioned in G8:
@rfidgroup
@evacide
@qubesos

Top Mentioned in G9:
@paula_piccard
@josephsteinberg
@vernitayountda4
@threatx_inc

Top Mentioned in G10:
@is_vix
@jaidbarrett
@infosecsherpa
@stephandsec
@sirmudbl00d
@nuzzel
@bsidesatl
@princ3sskia
@cybergent_101
@madblkman

Top Tweeters
Top Tweeters in Entire Graph:
@americanair
@arkangelscrap
@sectest9
@o2
@robre62
@applesupport
@cybertoolsbooks
@deejayiwan
@webironbots
@evankirstel

Top Tweeters in G1:
@webironbots
@aldoceccarelli
@villamizaritpro
@floridarussian
@thestartupper
@hotjobfinder
@gtpintado
@dailyjobupdates
@infopronetwork
@orlandorussian

Top Tweeters in G2:
@sectest9
@techl0g
@chidambara09
@fintechna
@aaroncuddeback
@valaafshar
@pdfstreaming
@andrewmorrisuk
@mgzallp
@machinelearn_d

Top Tweeters in G3:
@arkangelscrap
@deejayiwan
@evankirstel
@gamergeeknews
@startupsbot
@timesofindia
@lelkan
@machinelearnflx
@baldev_bahl
@sequoia2001

Top Tweeters in G4:
@jhamby
@arioldo
@ilovaussiesheps
@threadreaderapp
@beccanalia
@femme_mal
@538355
@gert001badger
@maelorin
@skry

Top Tweeters in G5:
@cybertoolsbooks
@it_securitynews
@arichduvet
@tendellshow
@forbes
@santchiweb
@cliffsull
@sustainabldylan
@opexxx
@pharniel

Top Tweeters in G6:
@esherislow
@jedisct1
@whenonkstreet
@gardenersantana
@nuria_pp
@materaj
@nikothedove
@ximad
@98ecf2b6e47eee
@g33kspeed

Top Tweeters in G7:
@agedchild003
@adekleine
@unrealallan
@candicelanier
@416ash
@red_shirt_no2
@wulf_bloody
@lynngr
@rval10s
@savagejen

Top Tweeters in G8:
@drizzt__dourden
@hackerfantastic
@f0o0
@ku5h4l
@singsingarsing
@bison_42
@jmsl
@deepquest
@yrthy
@romaa13

Top Tweeters in G9:
@jrobertson
@paula_piccard
@benedicterios
@abhy_mjee
@tinyweb20215958
@louisevanbram10
@julianf89909901
@emmystorm10
@bokcarew1
@melanygoncalv12

Top Tweeters in G10:
@rdsweb
@digitalempress
@cheeseplus
@_mrbyte
@tprophet
@littleidea
@infointuitive
@podfish
@iot_technojeder
@infosecsherpa