infosec, Twitter, 5/26/2019 7:30:33 AM, 198074


FAQ | Problem?

infosec_2019-05-26_00-00-01.xlsx
infosec_2019-05-26_00-00-01.xlsx
From:
NodeXLExcelAutomator
Uploaded on:
May 26, 2019
Short Description:
infosec via NodeXL http://bit.ly/2HYim0d
@sectest9
@infosecsherpa
@cybersec_feeds
@akita_zen
@guillaume_lpl
@hacks4pancakes
@windowsatp
@kim_crawley
@whitehatscum
@trimstray

Top hashtags:
#infosec
#cybersecurity
#security
#cyberwarfare
#malware
#hacking
#privacy
#iot

Description:
Description
The graph represents a network of 3,509 Twitter users whose tweets in the requested range contained "infosec", or who were replied to or mentioned in those tweets. The network was obtained from the NodeXL Graph Server on Sunday, 26 May 2019 at 07:01 UTC.

The requested start date was Sunday, 26 May 2019 at 00:01 UTC and the maximum number of days (going backward) was 14.

The maximum number of tweets collected was 5,000.

The tweets in the network were tweeted over the 1-day, 6-hour, 48-minute period from Thursday, 23 May 2019 at 11:41 UTC to Friday, 24 May 2019 at 18:29 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 3509
Unique Edges : 5145
Edges With Duplicates : 2996
Total Edges : 8141
Number of Edge Types : 3
Mentions : 5731
Tweet : 2104
Replies to : 306
Self-Loops : 2104
Reciprocated Vertex Pair Ratio : 0.0528191154894152
Reciprocated Edge Ratio : 0.100338443161457
Connected Components : 604
Single-Vertex Connected Components : 344
Maximum Vertices in a Connected Component : 2336
Maximum Edges in a Connected Component : 6688
Maximum Geodesic Distance (Diameter) : 15
Average Geodesic Distance : 5.331623
Graph Density : 0.000408056429581792
Modularity : 0.554592
NodeXL Version : 1.0.1.412

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[41] https://github.com/trimstray/the-book-of-secret-knowledge#black_small_square-pentests-bookmarks-collection
[41] https://github.com/trimstray/the-book-of-secret-knowledge#black_small_square-web-training-apps-local-installation
[31] https://www.obsidianeagle.com/p/revolution-untelevised.html
[17] https://securitycenter.windows.com/tutorials
[14] https://cyberstartupobservatory.com/infographics/
[13] https://www.helpnetsecurity.com/2019/05/24/new-infosec-products-of-the-week-may-24-2019/
[13] https://www.sentinelone.com/blog/intel-inside-sentinelone-cryptominer-detection/
[11] http://springboard.google.com
[10] https://hackernoon.com/googles-new-look-for-mobile-search-results-will-likely-attract-people-to-phishing-scams-85bc9c0802c9
[10] https://www.csoonline.com/article/3387418/5-ways-to-curb-cybersecurity-burnout.html

Top URLs in Tweet in G1:
[13] https://www.sentinelone.com/blog/intel-inside-sentinelone-cryptominer-detection/
[10] https://hackernoon.com/googles-new-look-for-mobile-search-results-will-likely-attract-people-to-phishing-scams-85bc9c0802c9
[7] https://www.itworldcanada.com/messagent.php?ID=cNX8rayiXC3mCrvEqhZ6hVf0ZmdvdU8of%2BtnnZKHfeEdIBk696YSYgipfwdMKMeMeXw7yqBU07vYjeccc4&SOURCE=1c50e374-10e2-1753-9ed3-4d014b11ea5d&REF=Social
[7] https://www.zdnet.com/article/cybersecurity-jobs-which-roles-are-most-in-demand-and-have-the-best-pay/
[6] https://thehackernews.com/2019/05/teamviewer-software-hacked.html
[6] https://blog.appknox.com/mobile-app-security-trends-2019/?utm_content=92485541&utm_medium=social&utm_source=twitter&hss_channel=tw-2466013141
[5] https://www.tech-wonders.com/2019/04/protection-from-common-network-attacks-part-1.html
[5] https://securitytoday.com/articles/2019/05/22/6-top-information-security-risks-to-be-aware-of-in-2019.aspx?m=2
[5] https://github.com/RUB-NDS/PRET
[5] https://www.thethreatreport.com/2-25-million-russian-passport-entries-leaked-to-the-internet/

Top URLs in Tweet in G2:
[6] http://open-sez.me
[4] https://www.helpnetsecurity.com/2019/05/24/new-infosec-products-of-the-week-may-24-2019/
[3] https://www.hurricanelabs.com/blog/information-security-101-common-sense-or-arcane-magicks-part-3
[3] https://www.hurricanelabs.com/blog/information-security-101-common-sense-or-arcane-magicks-part-1
[3] https://www.hurricanelabs.com/blog/information-security-101-common-sense-of-arcane-magicks-part-2
[2] https://hmwh.shortcm.li/nCtaRS
[2] https://www.independent.co.uk/life-style/gadgets-and-tech/news/bitcoin-ransomware-baltimore-city-ransom-parking-fines-a8925216.html
[2] https://www.vox.com/recode/2019/5/21/18634505/baltimore-ransom-robbinhood-mayor-jack-young-hackers
[2] https://www.ssi.gouv.fr/publication/la-securite-des-objets-connectes-cest-possible-avec-le-logiciel-libre-la-preuve-avec-le-projet-wookey/
[2] https://threatpost.com/google-stored-passwords-in-plaintext/144967/

Top URLs in Tweet in G3:
[3] https://www.tripwire.com/state-of-security/featured/women-nonbinary-people-information-security-yaz/
[3] https://www.peerlyst.com/posts/john-mcafee-antivirus-inventor-and-walking-disaster-kimberly-crawley
[3] http://podplayer.net/?id=71291495
[3] https://searchsecurity.techtarget.com/feature/The-five-different-types-of-firewalls
[3] https://www.darkreading.com/attacks-breaches/how-to-bypass-the-ids-ips/d/d-id/1128993
[2] https://zeltser.com/build-malware-analysis-toolkit/
[2] http://securityblog.gr/2950/detect-packers-cryptors-and-compilers/
[2] https://searchnetworking.techtarget.com/tutorial/Network-penetration-testing-guide
[2] https://www.rapid7.com/resources/how-to-respond-to-an-incident/
[2] https://www.helpnetsecurity.com/2019/05/24/new-infosec-products-of-the-week-may-24-2019/

Top URLs in Tweet in G4:
[8] https://hakin9.org/download/hakin9-open-become-hacker/
[5] https://hakin9.org/product/iot-security-the-dvid-challenge-w46/
[5] https://www.infosecurity-magazine.com/infosec/americans-worried-privacy-unaware-1-1?utm_source=twitterfeed&utm_medium=twitter
[4] https://hakin9.org/product/w47-voip-pentesting/
[3] https://pentestmag.com/networks-what-do-you-mean-by-that/
[3] https://www.ssh.com/compliance/isaca/?utm_content=90486979&utm_medium=social&utm_source=twitter&hss_channel=tw-110839080
[3] https://eforensicsmag.com/product/ubuntu-forensics-w42/
[3] https://hakin9.org/course/w47-voip-pentesting/
[3] https://paper.li/nalneesh/1305818828?read=https://www.forbes.com/sites/suzannerowankelleher/2019/05/21/why-you-should-never-use-airport-usb-charging-stations/
[3] https://www.csoonline.com/article/3397044/over-90-of-data-transactions-on-iot-devices-are-unencrypted.html

Top URLs in Tweet in G5:
[2] http://r.socialstudio.radian6.com/52defe81-9a66-4891-8a7b-4fe0b7ef3e7f
[2] https://thelanguageofcybersecurity.com/
[1] https://www.infosecsummit.com/ehome/index.php?eventid=367886&
[1] http://r.socialstudio.radian6.com/f7b624fa-e4c7-448e-bb5f-cff981858786
[1] http://r.socialstudio.radian6.com/0c8ca521-0854-4423-a079-2feee5eefd62
[1] http://r.socialstudio.radian6.com/78b3d273-7e93-467a-abf3-e6acd7104c9c
[1] http://r.socialstudio.radian6.com/e13eecbc-07dc-4084-b6ff-438617e11654
[1] http://r.socialstudio.radian6.com/e9f81752-fb03-4891-b10e-07f4149d7603
[1] http://r.socialstudio.radian6.com/69713434-d986-4c0e-bad1-9831ac9bfaa6
[1] http://r.socialstudio.radian6.com/6361b9e7-76e1-4bfd-b4f9-d9ce1e704047

Top URLs in Tweet in G6:
[6] https://securepairs.org/
[6] https://www.peerlyst.com/posts/irresponsible-encryption-part-2-i-left-the-meta-running-dave-howe?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[4] https://www.peerlyst.com/posts/free-information-security-related-policies-list-peerlyst?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[4] https://www.peerlyst.com/posts/writing-infosec-fiction-dean-webb?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[4] https://www.peerlyst.com/posts/cyber-deception-wiki-guurhart?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[4] https://www.peerlyst.com/posts/irreponsible-encryption-part-3-hamsters-in-the-tunnels-dave-howe?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[3] https://www.peerlyst.com/posts/how-to-find-strip-strart-tls-systems-with-censys-chriskubecka?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[3] https://www.peerlyst.com/posts/a-modern-enterprise-password-management-policy-template-free-for-you-to-use-1337mark?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[3] https://www.peerlyst.com/posts/using-an-ip-scanner-without-domain-credentials-to-find-vulnerabilities-christopher-gebhardt?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[3] https://www.hackers-arise.com/single-post/2016/08/11/Essentials-Skills-of-a-Professional-Hacker

Top URLs in Tweet in G7:
[5] https://www.wildwesthackinfest.com/cfp/
[5] https://pulsedive.com/
[2] https://www.kickstarter.com/projects/curtbraz/m-is-for-malware
[2] https://cfptime.org/860/
[2] https://blog.threatstop.com/shooting-phish-in-a-barrel
[1] https://pulsedive.com/threat/?tid=23
[1] https://securityintelligence.com/articles/in-light-of-ever-increasing-cybersecurity-risks-boards-must-deepen-their-oversight-and-engagement/
[1] https://pulsedive.com/threat/?tid=9
[1] https://securityintelligence.com/posts/uncover-modern-identity-and-access-management-iam-challenges-with-enterprise-design-thinking/
[1] https://pulsedive.com/threat/?tid=10

Top URLs in Tweet in G8:
[6] https://github.com/khast3x/h8mail/releases/tag/2.0.pre-release
[5] https://store.steampowered.com/app/526720/Off_Grid/
[4] https://github.com/SandboxEscaper/polarbearrepo?files=1
[2] https://link.medium.com/9WtuYTZbXW
[2] https://linuxsecurity.expert/tools/sudo_pair/
[2] https://arstechnica.com/information-technology/2019/05/why-a-windows-flaw-patched-nine-days-ago-is-still-spooking-the-internet/
[2] https://packetstormsecurity.com/files/153048/cartkiller.sh.txt
[2] https://ssg.aalto.fi/events/demo-day-2019/
[2] https://hackersonlineclub.com/metasploit-tutorial-metasploit-cheatsheet/
[2] https://blog.hackersonlineclub.com/2019/05/sojobo-binary-analysis-framework-of.html

Top URLs in Tweet in G9:
[15] https://securitycenter.windows.com/tutorials
[2] https://techcommunity.microsoft.com/t5/Windows-Defender-ATP/Microsoft-Defender-ATP-for-Mac-now-in-open-public-preview/ba-p/634603
[1] https://www.pluralsight.com/courses/kusto-query-language-kql-from-scratch
[1] https://lnkd.in/grpaxSm
[1] https://techcommunity.microsoft.com/t5/Windows-Defender-ATP/Incident-response-at-your-fingertips-with-Microsoft-Defender-ATP/ba-p/614894
[1] https://blogs.technet.microsoft.com/secguide/2019/05/23/security-baseline-final-for-windows-10-v1903-and-windows-server-v1903/

Top URLs in Tweet in G10:
[10] http://springboard.google.com
[3] https://tutorgeeks.blogspot.com/2019/05/security-assessment-on-staging-domains.html
[3] https://phishstats.info/
[3] https://github.com/enaqx/awesome-pentest
[2] https://hackerone.com/reports
[2] https://wazehell.io/2019/05/22/cve-2019-0708-technical-analysis-rdp-rce/
[2] https://dropsuite.com/resources/infographics/ransomware-by-the-numbers/
[2] https://www.darkreading.com/application-security/russian-nation-state-hacking-units-tools-get-more-fancy/d/d-id/1334792
[2] https://www.vox.com/recode/2019/5/21/18634505/baltimore-ransom-robbinhood-mayor-jack-young-hackers
[1] http://google.com/search?q=inurl:hackerone.com/reports+intext

Top Domains
Top Domains in Tweet in Entire Graph:
[245] tobem.com
[132] twitter.com
[129] github.com
[73] infosecurity-magazine.com
[58] zdnet.com
[52] lnkd.in
[48] darkreading.com
[48] appknox.com
[46] peerlyst.com
[45] medium.com

Top Domains in Tweet in G1:
[46] appknox.com
[37] zdnet.com
[36] sentinelone.com
[24] infosecurity-magazine.com
[23] darkreading.com
[21] twitter.com
[19] lnkd.in
[19] sophos.com
[15] co.uk
[14] medium.com

Top Domains in Tweet in G2:
[26] twitter.com
[17] lnkd.in
[11] co.uk
[9] zdnet.com
[9] helpnetsecurity.com
[9] hurricanelabs.com
[7] darkreading.com
[6] open-sez.me
[6] okt.to
[5] infosecurity-magazine.com

Top Domains in Tweet in G3:
[10] twitter.com
[6] techtarget.com
[4] medium.com
[4] peerlyst.com
[4] lnkd.in
[3] tripwire.com
[3] podplayer.net
[3] darkreading.com
[3] alienvault.com
[2] nzzl.us

Top Domains in Tweet in G4:
[224] tobem.com
[38] hakin9.org
[30] infosecurity-magazine.com
[15] scmagazine.com
[8] informationsecuritybuzz.com
[5] pentestmag.com
[5] ssh.com
[5] paper.li
[4] ziften.com
[4] healthcareinfosecurity.com

Top Domains in Tweet in G5:
[17] radian6.com
[6] microfocus.com
[3] youtube.com
[2] thelanguageofcybersecurity.com
[1] infosecsummit.com
[1] twitter.com
[1] rmisc.org
[1] bit.ly

Top Domains in Tweet in G6:
[39] peerlyst.com
[16] tobem.com
[9] twitter.com
[8] hackers-arise.com
[7] securepairs.org
[6] threatconnect.com
[4] arstechnica.com
[4] nytimes.com
[3] com.au
[2] rmisc.org

Top Domains in Tweet in G7:
[17] pulsedive.com
[5] wildwesthackinfest.com
[3] securityintelligence.com
[2] reddit.com
[2] kickstarter.com
[2] cfptime.org
[2] threatstop.com
[1] hakin9.org
[1] infosecurity-magazine.com
[1] blackhat.com

Top Domains in Tweet in G8:
[21] packetstormsecurity.com
[15] github.com
[5] hackersonlineclub.com
[5] steampowered.com
[3] okt.to
[2] medium.com
[2] linuxsecurity.expert
[2] atopendoor.com
[2] helpnetsecurity.com
[2] arstechnica.com

Top Domains in Tweet in G9:
[15] windows.com
[4] microsoft.com
[1] pluralsight.com
[1] lnkd.in

Top Domains in Tweet in G10:
[11] google.com
[4] github.com
[3] blogspot.com
[3] phishstats.info
[2] hackerone.com
[2] twitter.com
[2] wazehell.io
[2] dropsuite.com
[2] darkreading.com
[2] vox.com

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[3155] infosec
[1615] cybersecurity
[599] security
[271] cyberwarfare
[220] malware
[214] hacking
[174] privacy
[174] iot
[165] technology
[163] cyber



Top Hashtags in Tweet in G1:
[955] infosec
[735] cybersecurity
[286] security
[115] malware
[107] databreach
[96] ransomware
[87] iot
[83] hacking
[81] tech
[65] cyberattack

Top Hashtags in Tweet in G2:
[389] infosec
[165] cybersecurity
[60] security
[20] technology
[20] privacy
[17] hacking
[17] malware
[16] data
[15] tech
[14] ciso

Top Hashtags in Tweet in G3:
[79] infosec
[29] ff
[25] cybersecurity
[15] infographic
[12] pentest
[12] exploitdev
[6] itsecurity
[6] security
[5] autism
[5] infographics

Top Hashtags in Tweet in G4:
[407] infosec
[233] cyberwarfare
[129] cybersecurity
[63] security
[52] privacy
[52] cyber
[42] risk
[42] computer
[41] hacking
[34] pentest

Top Hashtags in Tweet in G5:
[33] infosec
[22] securityandrisk
[16] cybersecurity
[13] cbusinfosec
[12] security
[10] microfocuscybersummit
[7] endpoint
[7] microfocus
[7] teammicrofocus
[5] ransomware

Top Hashtags in Tweet in G6:
[106] infosec
[24] cybersecurity
[21] cyberwarfare
[19] ransomware
[12] ciso
[10] cryptography
[9] threatintel
[8] blueteam
[7] starttls
[6] cyber

Top Hashtags in Tweet in G7:
[42] infosec
[28] cybersecurity
[9] malware
[6] osint
[3] threatintel
[3] 8years
[3] ssl
[2] cfp
[2] ff
[2] phishing

Top Hashtags in Tweet in G8:
[80] infosec
[22] cybersecurity
[12] facebook
[11] google
[8] osint
[6] 0day
[6] exploit
[6] security
[4] hackersonlineclub
[3] vulnerability

Top Hashtags in Tweet in G9:
[18] mdatp
[15] microsoftdefenderatp
[10] advancedhunting
[8] infosec
[7] cybersecurity
[5] microsoft
[4] wdatp
[3] security
[2] edr
[1] secops

Top Hashtags in Tweet in G10:
[34] infosec
[27] cybersecurity
[22] phishing
[20] malware
[16] opendir
[10] writeup
[6] bugbounty
[4] protip
[4] pentesting
[3] dataviz

Top Words
Top Words in Tweet in Entire Graph:
[3214] Words in Sentiment List#1: Positive
[2793] Words in Sentiment List#2: Negative
[17] Words in Sentiment List#3: Angry/Violent
[107668] Non-categorized Words
[113676] Total Words
[3154] #infosec
[1615] #cybersecurity
[715] security
[599] #security
[554] infosec

Top Words in Tweet in G1:
[955] #infosec
[735] #cybersecurity
[286] #security
[224] security
[142] data
[115] #malware
[111] gt
[107] #databreach
[96] #ransomware
[93] 2019

Top Words in Tweet in G2:
[388] #infosec
[165] #cybersecurity
[89] infosec
[88] security
[60] #security
[45] s
[39] more
[36] new
[34] out
[32] cybersecurity

Top Words in Tweet in G3:
[126] infosec
[79] #infosec
[53] people
[50] hacks4pancakes
[40] badassbowden
[36] infosecsherpa
[34] hacking
[30] thank
[30] look
[29] #ff

Top Words in Tweet in G4:
[407] #infosec
[233] #cyberwarfare
[129] #cybersecurity
[80] security
[63] #security
[59] cyber
[52] hakin9
[52] #privacy
[52] #cyber
[45] hacking

Top Words in Tweet in G5:
[48] ian_infosec
[37] mlb
[36] compuguy
[34] fpieces
[33] #infosec
[32] nerdpyle
[29] tyrejim
[26] summit
[25] infosec
[24] see

Top Words in Tweet in G6:
[106] #infosec
[31] peerlyst
[29] guide
[25] new
[24] #cybersecurity
[21] cybertoolsbooks
[21] #cyberwarfare
[19] using
[19] #ransomware
[16] policies

Top Words in Tweet in G7:
[42] #infosec
[29] infosec
[28] #cybersecurity
[22] circlecitycon
[18] 2019
[17] 05
[16] seen
[15] small
[15] want
[14] 1

Top Words in Tweet in G8:
[80] #infosec
[22] programs
[22] #cybersecurity
[17] list
[13] platform
[13] new
[12] #facebook
[12] day
[11] few
[11] misc

Top Words in Tweet in G9:
[95] now
[90] preview
[56] microsoft
[48] make
[47] defender
[47] atp
[47] public
[43] mac
[39] back
[39] march

Top Words in Tweet in G10:
[34] #infosec
[27] #cybersecurity
[26] com
[23] hxxp
[22] #phishing
[20] #malware
[16] #opendir
[14] fewatoms
[13] wp
[12] google

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[510] #cybersecurity,#infosec
[293] #infosec,#cybersecurity
[262] #cyberwarfare,#infosec
[207] #infosec,#security
[102] #security,#infosec
[82] #infosec,#software
[81] cyber,security
[81] #software,#technology
[66] #security,#privacy
[65] check,out

Top Word Pairs in Tweet in G1:
[234] #cybersecurity,#infosec
[112] #infosec,#cybersecurity
[81] #infosec,#security
[52] #security,#infosec
[38] data,breach
[35] #databreach,#infosec
[33] cyber,security
[32] #cybersecurity,#security
[30] #infosec,#tech
[30] gt,gt

Top Word Pairs in Tweet in G2:
[53] #cybersecurity,#infosec
[44] #infosec,#cybersecurity
[27] #infosec,#security
[14] find,out
[13] #security,#infosec
[11] 24,2019
[10] cyber,security
[10] new,infosec
[10] products,week
[10] week,24

Top Word Pairs in Tweet in G3:
[32] hacking,infosec
[28] sometimes,look
[28] look,people
[28] people,dark
[28] dark,places
[28] places,hacking
[28] infosec,marvel
[28] marvel,small
[28] small,decisions
[28] decisions,rolls

Top Word Pairs in Tweet in G4:
[233] #cyberwarfare,#infosec
[48] #infosec,#security
[45] #security,#privacy
[45] #cybersecurity,#cyber
[44] #cyber,#infosec
[42] #privacy,#risk
[42] #risk,#computer
[32] #infosec,#hacking
[28] #hacking,#hackers
[27] #hackers,#pentesting

Top Word Pairs in Tweet in G5:
[31] ian_infosec,mlb
[22] infosec,summit
[20] compuguy,ian_infosec
[18] therealprocyon,compuguy
[15] central,ohio
[15] new,#infosec
[12] ohio,infosec
[12] summit,today
[11] nerdpyle,tyrejim
[11] compuguy,nerdpyle

Top Word Pairs in Tweet in G6:
[21] cybertoolsbooks,#cyberwarfare
[21] #cyberwarfare,#infosec
[14] peerlyst,community
[13] #cybersecurity,#infosec
[10] davehowe's,guide
[10] guide,encryption
[10] encryption,paranoids
[10] paranoids,#cryptography
[10] #cryptography,#infosec
[8] need,inspiration

Top Word Pairs in Tweet in G7:
[27] #infosec,#cybersecurity
[17] 2019,05
[13] hosting,small
[13] small,job
[13] job,fair
[8] seen,2019
[8] year,hosting
[8] fair,few
[8] few,companies
[8] companies,recruiting

Top Word Pairs in Tweet in G8:
[11] list,misc
[11] misc,bugs
[11] bugs,various
[11] various,programs
[11] programs,mostly
[11] mostly,internal
[11] internal,programs
[11] programs,#facebook
[11] #facebook,#google
[11] #google,vrp

Top Word Pairs in Tweet in G9:
[47] microsoft,defender
[47] defender,atp
[47] public,preview
[42] atp,mac
[41] now,public
[39] make,preview
[39] preview,back
[39] back,march
[36] mac,now
[33] preview,make

Top Word Pairs in Tweet in G10:
[13] #cybersecurity,#opendir
[13] fewatoms,#malware
[12] #opendir,#infosec
[10] #infosec,#cybersecurity
[10] com,wp
[10] #writeup,google
[10] google,bug
[10] bug,bounty
[10] bounty,lfi
[10] lfi,production

Top Replied-To
Top Replied-To in Entire Graph:
@nerdpyle
@ian_infosec
@fpieces
@fiasco_07
@tyrejim
@badassbowden
@hacks4pancakes
@pwns4cash
@infosecsherpa
@rotate26chars

Top Replied-To in G1:
@privacypen
@buccaneeris

Top Replied-To in G3:
@fiasco_07
@badassbowden
@ian_infosec
@hacks4pancakes
@infosecsherpa
@whitehatscum
@infosec_james
@_anal0g
@cybersecstu
@infosec_samurai

Top Replied-To in G4:
@pentestmag
@nfora
@viss
@feedphish
@swagitda_
@cisagov

Top Replied-To in G5:
@nerdpyle
@fpieces
@tyrejim
@ian_infosec
@pwns4cash
@compuguy
@rotate26chars
@bentleyaudrey
@secgoblin
@therealprocyon

Top Replied-To in G6:
@0xandrew
@k8em0
@infosec_nick

Top Replied-To in G7:
@alyssam_infosec
@thepriscilla
@shesponse
@daniegee95
@jaysonstreet
@c00p3r_7
@richkolko
@dnsprincess
@hacks4pancakes
@jessfraz

Top Replied-To in G8:
@ustayready
@stuntpope
@infosec_james
@metasploit
@vysecurity
@acid_infosec

Top Replied-To in G9:
@joswr1ght

Top Replied-To in G10:
@fewatoms
@netflix

Top Mentioned
Top Mentioned in Entire Graph:
@appknox
@ian_infosec
@hacks4pancakes
@hakin9
@csobservatory
@trimstray
@cybertoolsbooks
@lago72
@uscybermag
@badassbowden

Top Mentioned in G1:
@appknox
@lago72
@uscybermag
@fisher85m
@malwarebytes
@antgrasso
@zdnet
@sentinelone
@cyberhubengage
@z3rotrust

Top Mentioned in G2:
@briskinfosec
@attomushq
@bonnardv
@sobrodomains
@shivamsingh0022
@binsecsweeper
@abhinav_demkeys
@sciencehate
@mcafee_family

Top Mentioned in G3:
@hacks4pancakes
@badassbowden
@bentleyaudrey
@infosecsherpa
@infosec_taylor
@guillaume_lpl
@blackroomsec
@hansesecure
@jackrhysider
@whitehatscum

Top Mentioned in G4:
@hakin9
@infosecuritymag
@cybertoolsbooks
@pentestmag
@swagitda_
@secarmyofficial
@eforensics_mag
@mike_julian
@realworlddevops
@zifteninc

Top Mentioned in G5:
@ian_infosec
@mlb
@compuguy
@coissa
@fpieces
@tyrejim
@nerdpyle
@therealprocyon
@hackingdave
@microfocussec

Top Mentioned in G6:
@peerlyst
@cybertoolsbooks
@belevgevgeny
@davehowe
@limorelbaz
@censysio
@securepairs
@secevangelism
@chrishinfosec
@nytimes

Top Mentioned in G7:
@circlecitycon
@blackhatevents
@pulsedive
@wwhackinfest
@cfp_time
@thecravenone
@shesponse
@0ddj0bb
@owasp_il
@toolswatch

Top Mentioned in G8:
@_bl4de
@curtbraz
@atopendoor
@geekshiv
@kh4st3x
@jan_los
@nasokan
@offgridthegame
@ankit_anubhav
@vysecurity

Top Mentioned in G9:
@windowsatp
@ryen_mac
@heikeritter
@jasonfossen
@wkahnza
@joswr1ght

Top Mentioned in G10:
@fewatoms
@omespino
@phishingai
@facebook
@phishkittracker
@vinothpkumar
@98ecf2b6e47eee
@msftsecintel
@smica83
@telstra

Top Tweeters
Top Tweeters in Entire Graph:
@amazonhelp
@sectest9
@robre62
@cyberdomain
@nosqldigest
@cybertoolsbooks
@webironbots
@gwrhelp
@evankirstel
@digestwordpress

Top Tweeters in G1:
@sectest9
@robre62
@webironbots
@evankirstel
@techl0g
@ottlegalrebels
@calcaware
@reuters
@akwyz
@iol

Top Tweeters in G2:
@it_securitynews
@marenda
@stilgherrian
@joviannfeed
@securitynewsbot
@stopmalvertisin
@thesoulfulemu
@smesecurity
@thinksnews
@emahmoudsoliman

Top Tweeters in G3:
@jovangnr
@viss
@candicelanier
@philrandal
@brianhonan
@securityblog
@xionyc
@hackerfantastic
@artfulretro
@swiftonsecurity

Top Tweeters in G4:
@cybertoolsbooks
@aaroncuddeback
@adekleine
@ashot_
@warriors_mom
@saracenconsult
@linuxmil
@lucasoft_co_uk
@noashavit
@faisal_asif

Top Tweeters in G5:
@mlb
@nerdpyle
@compuguy
@tv_hiec_chair
@girlgerms
@carmencrincoli
@essobi
@selenalarson
@r0wdy_
@techradar

Top Tweeters in G6:
@nytimes
@wjz
@theheraldsun
@arstechnica
@jenlucpiquant
@jack_daniel
@claushoumann
@mat
@cigitalgem
@infosec_tourist

Top Tweeters in G7:
@eaterofsoles
@jaysonstreet
@darksim905
@jessfraz
@lunatic_lucifer
@nomibwave
@thecravenone
@fj_twt
@thepriscilla
@0ddj0bb

Top Tweeters in G8:
@game_devbot
@rdsweb
@ovidiug
@ku5h4l
@capgemini
@aglongo
@jax_masters
@i_fagan
@materaj
@kennethholley

Top Tweeters in G9:
@severuduw
@worrelpa
@maarten_goet
@rtrouton
@helloitsliam
@dbottjer
@kingmotts
@mirkocolemberg
@perlarsen1975
@martinboller

Top Tweeters in G10:
@amazonhelp
@telstra
@godaddy
@rtehrani
@namecheap
@jaythl
@malwrhunterteam
@98ecf2b6e47eee
@dcms
@netflix


We use necessary cookies to make our site work. We’d like to set additional cookies to understand site usage, make site improvements and to remember your settings. We also use cookies set by other sites to help deliver content from their services.