infosec, Twitter, 6/17/2019 7:26:50 AM, 200220


FAQ | Problem?

infosec_2019-06-17_00-00-01.xlsx
infosec_2019-06-17_00-00-01.xlsx
From:
NodeXLExcelAutomator
Uploaded on:
June 17, 2019
Short Description:
infosec via NodeXL http://bit.ly/2Ikdi82
@cybersec_feeds
@sectest9
@isee2it
@evacide
@infosec_taylor
@beaker
@guillaume_lpl
@cybersecstu
@hacks4pancakes
@kim_crawley

Top hashtags:
#infosec
#cybersecurity
#security
#hacking
#cyberwarfare
#malware
#technology
#privacy

Description:
Description
The graph represents a network of 3,535 Twitter users whose tweets in the requested range contained "infosec", or who were replied to or mentioned in those tweets. The network was obtained from the NodeXL Graph Server on Monday, 17 June 2019 at 07:01 UTC.

The requested start date was Sunday, 16 June 2019 at 00:01 UTC and the maximum number of days (going backward) was 14.

The maximum number of tweets collected was 5,000.

The tweets in the network were tweeted over the 1-day, 6-hour, 45-minute period from Thursday, 13 June 2019 at 11:44 UTC to Friday, 14 June 2019 at 18:29 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 3535
Unique Edges : 5343
Edges With Duplicates : 2960
Total Edges : 8303
Number of Edge Types : 3
Mentions : 6020
Tweet : 1924
Replies to : 359
Self-Loops : 1924
Reciprocated Vertex Pair Ratio : 0.0478971962616822
Reciprocated Edge Ratio : 0.0914158305462653
Connected Components : 491
Single-Vertex Connected Components : 309
Maximum Vertices in a Connected Component : 2642
Maximum Edges in a Connected Component : 7202
Maximum Geodesic Distance (Diameter) : 15
Average Geodesic Distance : 5.221038
Graph Density : 0.000430811938821823
Modularity : 0.557306
NodeXL Version : 1.0.1.413

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[24] https://dy.si/PgUGM
[17] https://go.usa.gov/xmSwJ
[17] https://phishstats.info/
[16] https://codewhitesec.blogspot.com/2018/07/lethalhta.html
[14] https://hansesecure.de/2018/06/backdooring-pe-file-with-aslr/
[12] https://www.infosecurity-magazine.com:443/infosec/the-rise-of-automated-hacking-1-1-1/?utm_source=twitterfeed&utm_medium=twitter
[11] https://twitter.com/danluu/status/1139011843844788224
[10] https://censys.io/
[10] https://www.shodan.io/
[10] https://viz.greynoise.io/table

Top URLs in Tweet in G1:
[23] https://dy.si/PgUGM
[9] http://pearltrees.com/p/VnZXi?utm_sq=fomzedon3p&utm_source=Twitter&utm_medium=social&utm_campaign=1DavidClarke&utm_content=GDPR
[8] https://techcrunch.com/2019/06/12/facebook-project-atlas-research-apple-banned/
[7] https://www.sentinelone.com/blog/how-hackers-use-social-media-profile-targets/
[7] https://cyberstartupobservatory.com/the-methodology-for-ics-cyber-preparedness/
[6] https://www.helpnetsecurity.com/2019/06/13/whitepaper-maturing-a-threat-intelligence-program/
[6] https://www.sentinelone.com/edr-demo-video/
[5] https://phishstats.info/
[5] https://www.helpnetsecurity.com/2019/06/12/framework-agility-cyber-attackers-and-defenders/
[5] https://www.helpnetsecurity.com/2019/06/13/ciso-board-reporting/

Top URLs in Tweet in G2:
[16] https://codewhitesec.blogspot.com/2018/07/lethalhta.html
[14] https://hansesecure.de/2018/06/backdooring-pe-file-with-aslr/
[6] https://www.isdecisions.com/cloud-storage-security-issues/
[4] http://www.pentesteracademy.com/course?id=3
[3] https://github.com/netevert/pockint
[3] https://securitydatapro.com/shop/website-coupon-5
[3] https://accoladetechnology.com/portfolio-item/telecom-carriers/?platform=hootsuite
[3] https://www.zdnet.com/article/for-two-hours-a-large-chunk-of-european-mobile-traffic-was-rerouted-through-china/
[3] https://dfw.cbslocal.com/2019/06/13/evite-data-breach-hacker-dark-web/
[3] http://erinassociates.com/jobs.php

Top URLs in Tweet in G3:
[6] http://open-sez.me
[4] https://www.computerweekly.com/opinion/Security-Think-Tank-Infosec-needs-to-avoid-FUD-and-keep-it-real
[3] https://stateofsecurity.com/sunshine-on-a-cloudy-day/?utm_campaign=sunshine-on-a-cloudy-day&utm_medium=social_link&utm_source=missinglettr-twitter
[3] https://www.helpnetsecurity.com/2019/06/14/new-infosec-products-of-the-week-june-14-2019/
[2] https://arstechnica.com/information-technology/2019/06/if-you-havent-patched-vim-or-neovim-text-editors-you-really-really-should/
[2] https://www.eventbrite.com/e/cyfir-is-sponsoring-the-ig3-mid-atlantic-conference-tickets-62153322260?utm_campaign=new_event_email&utm_term=viewmyevent_button&utm_content=93883642&utm_medium=social&utm_source=twitter&hss_channel=tw-1325321983
[2] https://sites.ziftsolutions.com/vmware.ziftsolutions.com/ff808181580b743f01581b0eba23011e?cid=8a9982ec6b202add016b2d6611d67cad&url=https%3A%2F%2Fblogs.vmware.com%2Fvov%2F2019%2F05%2F28%2Fintroducing-the-new-math-how-five-pillars-of-security-on-a-solid-foundation-enabled-vmware-infosec-to-create-the-perfect-10%2F
[2] https://unaaldia.hispasec.com/
[2] https://www.computerweekly.com/opinion/Security-Think-Tank-Infosec-needs-to-avoid-FUD-and-keep-it-real?utm_source=dlvr.it&utm_medium=twitter
[2] https://www.youtube.com/watch?v=I2f6luWzK04&feature=youtu.be


Top URLs in Tweet in G4:
[2] https://securityonline.info/cardpwn/
[2] https://www.itworldcanada.com/event/w/ITWC-June18.php?source=social
[2] https://securityonline.info/digital-forensic-acquisition-tool-for-windows/
[2] https://securityonline.info/dll-to-shellcode/
[2] https://hackercombat.com/a-guide-to-network-security-vulnerability-assessment/
[1] https://twitter.com/stokedenton/status/1139585158254907394
[1] https://twitter.com/jedimammoth/status/1138953018106351617
[1] https://medium.com/@jedimammoth/hacking-smb-country-by-country-b326723619e1
[1] https://www.scmagazineuk.com/airplane-parts-maker-asco-ransomware-attack/article/1587573
[1] https://securityboulevard.com/2019/06/women-in-cybersecurity-no-longer-an-anomaly/

Top URLs in Tweet in G5:
[8] https://www.microsoft.com/en-us/download/details.aspx?id=58366&WT.mc_id=rss_alldownloads_al
[3] http://www.indicerh.net/la-cybersecurite-en-entreprise-quelle-est-son-importance%E2%80%89/
[3] https://bit.ly/2M6D8ij?utm_campaign=2019_Cybersecurity&utm_content=94063863&utm_medium=social&utm_source=twitter&hss_channel=tw-128587267
[3] https://twitter.com/cellebrite_ufed/status/1139569499206643715
[3] https://www.vice.com/en_us/article/ywyxex/deepfake-of-mark-zuckerberg-facebook-fake-video-policy
[2] https://www.darkreading.com/network-and-perimeter-security/dns-firewalls-could-prevent-billions-in-losses-to-cybercrime/d/d-id/1334965
[2] https://www.esecurityplanet.com/applications/email-security.html
[2] https://www.darkreading.com/attacks-breaches/suppliers-spotlighted-after-breach-of-border-agency-subcontractor/d/d-id/1334936?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple
[2] https://hackersonlineclub.com/ftp-server-commands-and-error-codes-cheatsheet/
[2] https://hackersonlineclub.com/telegram-messenger-faces-ddos-attack/

Top URLs in Tweet in G6:
[2] https://www.defendcon.org/scholarships/
[1] https://tomgraves.house.gov/contact/
[1] https://twitter.com/InfoSecSherpa/status/1139184882154967040
[1] https://forms.gle/1gRBcmHznYAgzJTv7
[1] https://twitter.com/InfoSecSherpa/status/1138623318578409472
[1] https://nzzl.us/KMAcL2j
[1] http://nuzzel.com/InfoSecSherpa
[1] https://nzzl.us/zePvnpM
[1] https://www.eventbrite.com/e/defendcon-2019-tickets-57371979134
[1] https://twitter.com/jwgoerlich/status/1139558593601126405

Top URLs in Tweet in G7:
[8] https://censys.io/
[8] https://www.shodan.io/
[8] https://viz.greynoise.io/table
[8] https://www.zoomeye.org/
[3] https://gitlab.com/secbsd/ports/tree/master/secbsd/tools/sublist3r
[2] https://gitlab.com/secbsd/ports/tree/master/secbsd/devel/py-argparse
[1] https://leplat.pro/jackpotting.html
[1] https://www.sans.org/u/QIt
[1] https://medium.com/girls-go-cyberstart/the-winners-of-the-national-championship-for-girls-go-cyberstart-2019-d8586d9f2d37
[1] https://wigle.net/

Top URLs in Tweet in G8:
[4] https://operacionbitcoins.com
[4] https://albertohill.com/2019/05/01/dfm-issue-38-operation-bitcoins/
[3] http://www.irongeek.com/i.php?page=videos/showmecon2019/showmecon-2019-00-a-practical-approach-to-purple-teaming-matt-thelen
[2] https://operacionbitcoins.com/
[2] https://www.crowdstrike.com/blog/credential-theft-mimikatz-techniques/
[2] https://artintoscience.com/
[2] https://confidence-conference.org/
[2] https://twitter.com/irongeek_adc/status/1139515782642036736
[2] https://github.com/teemu-l/execution-trace-viewer
[2] https://www.kali.org/news/wsl2-and-kali/

Top URLs in Tweet in G9:
[3] https://www.eventbrite.com/e/logiclounge-spouseware-and-stalkerware-where-do-we-go-from-here-tickets-63013928356
[3] https://go.usa.gov/xmS8b
[1] https://techcrunch.com/2019/06/13/black-hat-keynote-will-hurd/
[1] https://www.linkedin.com/pulse/ifttt-what-happens-when-banking-finally-hits-cloud-anne-leslie
[1] https://twitter.com/cybercityconf/status/1139529925956968448
[1] https://cfptime.org/853/
[1] https://www.nbcnews.com/tech/tech-news/viral-schwarzenegger-deepfake-isn-t-just-entertaining-it-s-warning-n1016851
[1] https://opensoc.io/
[1] https://twitter.com/Recon_InfoSec/status/1088639762783719424
[1] http://go.usa.gov/xmS84

Top URLs in Tweet in G10:
[4] https://www.peerlyst.com/posts/a-list-of-certifications-related-to-doing-offensive-security-and-red-teaming-peerlyst?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[4] https://www.peerlyst.com/posts/so-you-re-looking-for-a-new-vpn-kimberly-crawley
[3] https://www.peerlyst.com/posts/level-up-your-infosec-career-part-7-j-geno?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[3] https://www.peerlyst.com/posts/level-up-your-infosec-career-part-9-j-geno?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[3] https://www.peerlyst.com/posts/level-up-your-infosec-career-series-resource-page-j-geno?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[3] https://www.peerlyst.com/posts/level-up-your-infosec-career-part-10-j-geno?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[3] https://www.peerlyst.com/posts/level-up-your-infosec-career-part-8-j-geno?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[3] https://www.peerlyst.com/posts/cybersecurity-journalism-podcast-dean-webb?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[2] https://www.wsj.com/articles/cfos-grapple-with-how-much-cybersecurity-spending-is-enough-11560378386
[2] https://www.peerlyst.com/posts/free-trainings-and-presentations-at-the-peerlyst-san-francisco-office-during-rsa-peerlyst?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post

Top Domains
Top Domains in Tweet in Entire Graph:
[204] tobem.com
[169] twitter.com
[71] zdnet.com
[56] techcrunch.com
[52] infosecurity-magazine.com
[50] sentinelone.com
[50] dy.si
[47] usa.gov
[46] helpnetsecurity.com
[45] peerlyst.com

Top Domains in Tweet in G1:
[204] tobem.com
[51] techcrunch.com
[41] sentinelone.com
[31] helpnetsecurity.com
[29] dy.si
[24] cyberstartupobservatory.com
[22] webiron.com
[21] oldergeeks.com
[20] darkreading.com
[18] pearltrees.com

Top Domains in Tweet in G2:
[16] blogspot.com
[14] hansesecure.de
[11] itspmagazine.com
[9] twitter.com
[9] pentesteracademy.com
[6] youtube.com
[6] isdecisions.com
[5] tripwire.com
[5] zdnet.com
[5] pivotpointsecurity.com

Top Domains in Tweet in G3:
[32] twitter.com
[13] lnkd.in
[13] packetstormsecurity.com
[9] threatpost.com
[8] computerweekly.com
[7] co.uk
[6] infosecurity-magazine.com
[6] helpnetsecurity.com
[6] google.com
[6] lttr.ai

Top Domains in Tweet in G4:
[12] securityonline.info
[6] twitter.com
[3] xtontech.com
[2] securityboulevard.com
[2] joesecurity.org
[2] itworldcanada.com
[2] hackercombat.com
[1] medium.com
[1] scmagazineuk.com
[1] infosecurity-magazine.com

Top Domains in Tweet in G5:
[10] darkreading.com
[8] microsoft.com
[6] hackersonlineclub.com
[6] twitter.com
[4] zdnet.com
[4] dy.si
[4] vice.com
[3] indicerh.net
[3] lesechos.fr
[3] bit.ly

Top Domains in Tweet in G6:
[4] twitter.com
[2] nzzl.us
[2] defendcon.org
[2] eventbrite.com
[1] house.gov
[1] forms.gle
[1] nuzzel.com
[1] wisp.org

Top Domains in Tweet in G7:
[8] censys.io
[8] shodan.io
[8] greynoise.io
[8] zoomeye.org
[5] gitlab.com
[2] twitter.com
[1] leplat.pro
[1] sans.org
[1] medium.com
[1] wigle.net

Top Domains in Tweet in G8:
[12] twitter.com
[6] operacionbitcoins.com
[4] albertohill.com
[4] github.com
[3] irongeek.com
[2] crowdstrike.com
[2] artintoscience.com
[2] confidence-conference.org
[2] fireeye.com
[2] kali.org

Top Domains in Tweet in G9:
[5] usa.gov
[4] twitter.com
[3] eventbrite.com
[1] techcrunch.com
[1] linkedin.com
[1] cfptime.org
[1] nbcnews.com
[1] opensoc.io
[1] tisiphone.net

Top Domains in Tweet in G10:
[44] peerlyst.com
[7] medium.com
[6] radian6.com
[5] cylance.com
[4] ow.ly
[4] dy.si
[3] threatpost.com
[3] lnkd.in
[3] microfocus.com
[2] twitter.com

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[3124] infosec
[1580] cybersecurity
[473] security
[231] hacking
[210] cyberwarfare
[204] malware
[191] technology
[189] privacy
[177] cyber
[153] tech



Top Hashtags in Tweet in G1:
[1118] infosec
[763] cybersecurity
[216] security
[204] cyberwarfare
[143] technology
[99] software
[98] ai
[95] privacy
[89] malware
[77] cyberattack

Top Hashtags in Tweet in G2:
[296] infosec
[128] cybersecurity
[39] pentest
[35] malware
[34] security
[23] redteam
[19] tech
[19] hacking
[18] cyberattack
[18] ff

Top Hashtags in Tweet in G3:
[292] infosec
[93] cybersecurity
[25] security
[22] hacking
[14] privacy
[12] gdpr
[12] cyber
[8] data
[8] tech
[7] ai

Top Hashtags in Tweet in G4:
[106] infosec
[44] ff
[29] cybersecurity
[19] security
[12] opensource
[9] pentest
[5] hacking
[5] ransomware
[5] malware
[4] xtontech

Top Hashtags in Tweet in G5:
[140] infosec
[68] cybersecurity
[14] tech
[14] security
[10] infosecjobs
[8] hacking
[8] cyber
[7] hackersonlineclub
[7] musiccitycon
[6] highered

Top Hashtags in Tweet in G6:
[11] infosec
[6] cybersecurity
[3] womenintech
[2] informationsecurity
[2] ethicalhacking
[1] infographic
[1] diversityandinclusion
[1] blackexcellence
[1] latinageeks
[1] womenwhocode

Top Hashtags in Tweet in G7:
[62] infosec
[16] ff
[13] cybersecurity
[9] infographic
[8] phishing
[5] secbsd
[5] openbsd
[5] togetherwehitharder
[5] unix
[4] security

Top Hashtags in Tweet in G8:
[26] infosec
[8] uruguay
[7] hacker
[7] cybersecurity
[4] podcast
[3] anonymoius
[3] freedom
[3] ff
[3] redteam
[3] pentesting

Top Hashtags in Tweet in G9:
[19] infosec
[7] cybersecurity
[5] cyber
[3] privacy
[3] logicloungeny
[3] ics
[2] cloud
[2] security
[2] newyork
[2] freeevent

Top Hashtags in Tweet in G10:
[121] infosec
[75] cybersecurity
[23] security
[16] ciso
[12] pentesting
[8] malware
[8] cybersec
[8] hacking
[7] offensivesecurity
[7] securityandrisk

Top Words
Top Words in Tweet in Entire Graph:
[3187] Words in Sentiment List#1: Positive
[2805] Words in Sentiment List#2: Negative
[16] Words in Sentiment List#3: Angry/Violent
[105256] Non-categorized Words
[111249] Total Words
[3124] #infosec
[1584] #cybersecurity
[654] security
[595] infosec
[473] #security

Top Words in Tweet in G1:
[1118] #infosec
[764] #cybersecurity
[249] security
[216] #security
[204] #cyberwarfare
[143] #technology
[116] data
[113] gt
[99] #software
[98] #ai

Top Words in Tweet in G2:
[296] #infosec
[129] #cybersecurity
[63] infosec_taylor
[57] security
[52] infosec
[44] new
[39] #pentest
[39] know
[38] one
[38] hansesecure

Top Words in Tweet in G3:
[292] #infosec
[93] #cybersecurity
[85] infosec
[56] security
[28] data
[27] out
[25] #security
[23] s
[22] more
[22] #hacking

Top Words in Tweet in G4:
[106] #infosec
[44] #ff
[40] cybersecstu
[33] m49d4ch3lly
[30] seanwrightsec
[29] #cybersecurity
[27] infosec
[25] j_opdenakker
[24] jenny_radcliffe
[23] happygeek

Top Words in Tweet in G5:
[140] #infosec
[68] #cybersecurity
[31] security
[18] trust
[16] nci_isacs
[16] out
[14] #tech
[14] #security
[12] more
[12] à

Top Words in Tweet in G6:
[93] infosec
[65] beaker
[64] great
[63] entry
[63] level
[63] right
[62] called
[62] talent
[62] shortage
[62] especially

Top Words in Tweet in G7:
[62] #infosec
[28] guillaume_lpl
[18] notdan
[18] fs0c131y
[18] x0rz
[18] malwaretechblog
[18] alisaesage
[18] fox0x01
[18] malwareunicorn
[18] hasherezade

Top Words in Tweet in G8:
[29] infosec
[26] #infosec
[17] adanielhill
[15] 1
[13] t
[13] ian_infosec
[10] infosec_samurai
[9] dirtywhitehat
[9] alert
[8] #uruguay

Top Words in Tweet in G9:
[110] women
[63] t
[58] evacide
[57] make
[56] way
[56] great
[55] keynote
[55] rights
[54] lawmaker
[54] doesn

Top Words in Tweet in G10:
[121] #infosec
[75] #cybersecurity
[39] security
[25] part
[24] up
[23] #security
[22] vpn
[21] peerlyst
[21] career
[20] use

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[493] #cybersecurity,#infosec
[327] #infosec,#cybersecurity
[208] #cyberwarfare,#infosec
[148] #infosec,#security
[98] #infosec,#software
[97] #software,#technology
[71] entry,level
[71] #infosec,#hacking
[68] called,infosec
[68] infosec,talent

Top Word Pairs in Tweet in G1:
[237] #cybersecurity,#infosec
[204] #cyberwarfare,#infosec
[152] #infosec,#cybersecurity
[93] #infosec,#software
[91] #software,#technology
[51] #infosec,#security
[42] gt,gt
[40] techcrunch,#infosec
[37] #dataprotection,#privacy
[36] #cybersecurity,#bigdata

Top Word Pairs in Tweet in G2:
[37] #infosec,#pentest
[32] #cybersecurity,#infosec
[22] #pentest,#redteam
[21] #infosec,#cybersecurity
[16] lethalhta,new
[16] new,lateral
[16] lateral,movement
[16] movement,technique
[16] technique,using
[16] using,dcom

Top Word Pairs in Tweet in G3:
[33] #cybersecurity,#infosec
[30] #infosec,#cybersecurity
[10] security,think
[10] think,tank
[10] tank,infosec
[10] infosec,needs
[10] needs,avoid
[10] avoid,fud
[10] fud,keep
[10] keep,real

Top Word Pairs in Tweet in G4:
[27] cybersecstu,m49d4ch3lly
[23] #infosec,#ff
[18] seanwrightsec,jenny_radcliffe
[16] #cybersecurity,#infosec
[14] appsecbloke,cybersecstu
[14] #infosec,#security
[13] j_opdenakker,appsecbloke
[12] #opensource,#infosec
[11] #ff,cybersecstu
[11] m49d4ch3lly,dafthack

Top Word Pairs in Tweet in G5:
[23] #infosec,#cybersecurity
[11] #cybersecurity,#tech
[9] #cybersecurity,#infosec
[9] #tech,#infosec
[9] #infosec,#infosecjobs
[8] asked,jonathan
[8] jonathan,kyle
[8] kyle,senior
[8] senior,security
[8] security,architect

Top Word Pairs in Tweet in G6:
[63] entry,level
[62] called,infosec
[62] infosec,talent
[62] talent,shortage
[62] shortage,especially
[62] especially,great
[62] great,entry
[62] level,candidates
[62] candidates,right
[62] right,attitude

Top Word Pairs in Tweet in G7:
[18] notdan,fs0c131y
[18] fs0c131y,x0rz
[18] x0rz,malwaretechblog
[18] malwaretechblog,alisaesage
[18] alisaesage,fox0x01
[18] fox0x01,malwareunicorn
[18] malwareunicorn,hasherezade
[16] #ff,cool
[16] cool,#infosec
[16] #infosec,folks

Top Word Pairs in Tweet in G8:
[8] alert,1
[7] jackrhysider,darknetdiaries
[7] https,t
[7] t,co
[6] hacker,infosec
[5] #hacker,#uruguay
[5] dpcybuck,_sn0ww
[5] com,objects
[5] cve,2019
[4] operacion,bitcoins

Top Word Pairs in Tweet in G9:
[54] keynote,lawmaker
[54] lawmaker,doesn
[54] doesn,t
[54] t,believe
[54] believe,women
[54] women,fundamental
[54] fundamental,human
[54] human,rights
[54] rights,great
[54] great,way

Top Word Pairs in Tweet in G10:
[25] #cybersecurity,#infosec
[17] level,up
[17] up,#infosec
[17] #infosec,career
[17] j,geno
[14] #infosec,#cybersecurity
[14] career,j
[14] geno,explores
[11] care,online
[11] online,security

Top Replied-To
Top Replied-To in Entire Graph:
@infosec_taylor
@ian_infosec
@infosec_samurai
@franksec42
@fiasco_07
@sawaba
@cynjachasec
@badassbowden
@abluegorilla
@isee2it

Top Replied-To in G1:
@carbonblack_inc
@apple
@farsightsecinc
@cfp_time
@it_infosec_girl
@smr_foundation

Top Replied-To in G2:
@infosec_taylor
@fiasco_07
@hacks4pancakes
@sheliaksec
@idgtechtalk
@digitalempress
@dicty_dave
@drinfosec
@vessonsecurity
@michelled190

Top Replied-To in G4:
@franksec42
@drjessicabarker
@isee2it
@how2cloud
@dcuthbert
@catbailey
@infosec_taylor
@sb101sb
@largecardinal
@reelchutney

Top Replied-To in G5:
@darkreading
@vadesecure
@nccsecurityus

Top Replied-To in G6:
@beaker
@blowdart
@vrimj
@markwarner
@evanmcmullin
@maddowblog
@jennycohn1
@barbararacek
@6thfairway
@infosec_taylor

Top Replied-To in G7:
@toxicsilence80
@fir3wa1k3r
@guillaume_lpl
@heyalliehansen
@infosec12202869
@bsdbandit

Top Replied-To in G8:
@ian_infosec
@infosec_samurai
@sawaba
@abluegorilla
@badassbowden
@dirtywhitehat
@selenalarson
@bentleyaudrey
@fpieces
@rotate26chars

Top Replied-To in G9:
@jwgoerlich
@mtanotok
@racheltobac
@blackhatevents
@royalkingmomo
@raistolo

Top Replied-To in G10:
@huykh4
@securityaffairs
@threatpost

Top Mentioned
Top Mentioned in Entire Graph:
@evacide
@beaker
@cybersecstu
@uscybermag
@m49d4ch3lly
@uscert_gov
@hansesecure
@guillaume_lpl
@seanwrightsec
@kim_crawley

Top Mentioned in G1:
@uscybermag
@fisher85m
@1davidclarke
@csobservatory
@kirkdborne
@helpnetsecurity
@transform_sec
@sentinelone
@corix_jc
@ncsc

Top Mentioned in G2:
@hansesecure
@hacks4pancakes
@itspmagazine
@gabsmashh
@infosec_taylor
@uscybermag
@bentleyaudrey
@sherrod_im
@infosecurity
@mintynet

Top Mentioned in G3:
@drrimmer
@osirium
@sslsecurity
@hybrid_circle
@cindelicato
@hanscees
@douglittlejr

Top Mentioned in G4:
@cybersecstu
@m49d4ch3lly
@seanwrightsec
@j_opdenakker
@jenny_radcliffe
@happygeek
@dafthack
@appsecbloke
@kateoflaherty
@cybergogiver

Top Mentioned in G5:
@darkreading
@nci_isacs
@pzerger
@lockstepgroup
@nashtechcouncil
@share_in_blue
@rh_isac
@fsecurefrance
@ahcybsec
@tarballbarbell

Top Mentioned in G6:
@beaker
@defendcon
@nuzzel
@infosecsherpa
@spywaretweets
@apporima
@gdbassett
@dpmilroy
@mkr_ultra
@dcuthbert

Top Mentioned in G7:
@guillaume_lpl
@notdan
@fs0c131y
@x0rz
@malwaretechblog
@alisaesage
@fox0x01
@malwareunicorn
@hasherezade
@mat

Top Mentioned in G8:
@adanielhill
@jackrhysider
@darknetdiaries
@mat0x74_infosec
@dirtywhitehat
@dpcybuck
@_sn0ww
@techspence
@xillwillx
@showmeconstl

Top Mentioned in G9:
@evacide
@defcon
@vclatuwien
@blackhatevents
@tarah
@icscert
@bsidesbham
@wisporg
@recon_infosec
@hacks4pancakes

Top Mentioned in G10:
@peerlyst
@kim_crawley
@cylanceinc
@daley
@smedian_network
@zifteninc
@c_3pjoe
@microfocussec
@limorelbaz
@z3rotrust

Top Tweeters
Top Tweeters in Entire Graph:
@xboxsupport
@robinsnewswire
@sectest9
@jurylady5
@cyberdomain
@nosqldigest
@cybertoolsbooks
@webironbots
@evankirstel
@gamergeeknews

Top Tweeters in G1:
@cyberdomain
@nosqldigest
@cybertoolsbooks
@webironbots
@evankirstel
@chidambara09
@calcaware
@akwyz
@santchiweb
@jeremypmurphy

Top Tweeters in G2:
@sectest9
@gamergeeknews
@jodotcom
@diapermakeovers
@andrewdwilliams
@darrensproat
@securityblog
@hackerfantastic
@securitytube
@thatjeffsmith

Top Tweeters in G3:
@davidpapp
@drrimmer
@infopronetwork
@drsonamsharma
@crm_cws_cloud
@stopmalvertisin
@smesecurity
@biznessreporter
@aglongo
@eudyzerpa

Top Tweeters in G4:
@cwindley
@brianhonan
@jaysonstreet
@myerman
@troyhunt
@jack_daniel
@kevin_jackson
@brianlinuxing
@kfalconspb
@govcloud

Top Tweeters in G5:
@robinsnewswire
@techl0g
@lesechos
@cnbc
@machinelearn_d
@dredeyedick
@shatarup_
@google
@thetechnologytm
@scmagazine

Top Tweeters in G6:
@inspiteoftrump
@jambie61
@barbararacek
@blowdart
@chris_09765
@bestemorg
@beaker
@jennycohn1
@gattaca
@shelly2161

Top Tweeters in G7:
@alejosangel
@digitalempress
@swiftonsecurity
@diosecurity
@infosechotspot
@ku5h4l
@mat
@matthew_d_green
@womentechbot
@rihannastan

Top Tweeters in G8:
@thedapperdiner
@theperezhilton
@browofjustice
@nerdpyle
@amtwo
@selenalarson
@ckamka
@drahcir_rahl
@sundhaug92
@octal

Top Tweeters in G9:
@grrrr_shark
@bozwaldcoblepot
@dmayoraru
@_pronto_
@raistolo
@snubs
@shortxstack
@kataclyst
@timstrazz
@jwgoerlich

Top Tweeters in G10:
@securityaffairs
@thinksnews
@claushoumann
@kim_crawley
@davehatter
@dzone
@peerlyst
@belevgevgeny
@limorelbaz
@cylanceinc


We use necessary cookies to make our site work. We’d like to set additional cookies to understand site usage, make site improvements and to remember your settings. We also use cookies set by other sites to help deliver content from their services.