infosec, Twitter, 8/11/2019 7:21:42 AM, 206376


FAQ | Problem?

infosec_2019-08-11_00-00-01.xlsx
infosec_2019-08-11_00-00-01.xlsx
From:
NodeXLExcelAutomator
Uploaded on:
August 11, 2019
Short Description:
infosec via NodeXL http://bit.ly/2MYYs9P
@sectest9
@doctoramanya
@wynandbooysen
@kim_crawley
@itspmagazine
@dianainitiative
@defcon
@farewell_ladmin
@j_opdenakker
@gentoo_python

Top hashtags:
#infosec
#cybersecurity
#security
#databreach
#malware
#ransomware
#hackers

Description:
Description
The graph represents a network of 3,242 Twitter users whose tweets in the requested range contained "infosec", or who were replied to or mentioned in those tweets. The network was obtained from the NodeXL Graph Server on Sunday, 11 August 2019 at 07:01 UTC.

The requested start date was Sunday, 11 August 2019 at 00:01 UTC and the maximum number of days (going backward) was 14.

The maximum number of tweets collected was 5,000.

The tweets in the network were tweeted over the 23-hour, 11-minute period from Saturday, 10 August 2019 at 00:49 UTC to Sunday, 11 August 2019 at 00:00 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 3242
Unique Edges : 4491
Edges With Duplicates : 3375
Total Edges : 7866
Number of Edge Types : 3
Tweet : 2101
Mentions : 5551
Replies to : 214
Self-Loops : 2101
Reciprocated Vertex Pair Ratio : 0.02710027100271
Reciprocated Edge Ratio : 0.0527704485488127
Connected Components : 574
Single-Vertex Connected Components : 293
Maximum Vertices in a Connected Component : 2013
Maximum Edges in a Connected Component : 6397
Maximum Geodesic Distance (Diameter) : 13
Average Geodesic Distance : 4.964187
Graph Density : 0.000432841022669715
Modularity : 0.522183
NodeXL Version : 1.0.1.418

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[51] https://github.com/mitchellkrogza/Phishing.Database/blob/master/phishing-domains-NEW-last-hour.txt
[40] http://www.hackingarticles.in/dhcp-penetration-testing/
[37] https://github.com/mitchellkrogza/Phishing.Database/blob/master/phishing-links-ACTIVE-NOW.txt
[23] https://phishstats.info/
[20] https://securityaffairs.co/wordpress/89612/malware/clipsa-malware.html
[19] https://www.ehackingnews.com/2019/08/flaw-in-whatsapp-could-allow-hackers.html
[18] https://github.com/mitchellkrogza/Phishing.Database/blob/master/phishing-links-NEW-today.txt
[18] https://threatpost.com/researchers-bypass-apple-faceid-using-biometrics-achilles-heel/147109/
[18] http://open-sez.me
[17] https://darknetdiaries.com/episode/25/

Top URLs in Tweet in G1:
[49] https://github.com/mitchellkrogza/Phishing.Database/blob/master/phishing-domains-NEW-last-hour.txt
[37] https://github.com/mitchellkrogza/Phishing.Database/blob/master/phishing-links-ACTIVE-NOW.txt
[20] https://phishstats.info/
[19] https://securityaffairs.co/wordpress/89612/malware/clipsa-malware.html
[18] https://www.ehackingnews.com/2019/08/flaw-in-whatsapp-could-allow-hackers.html
[18] https://github.com/mitchellkrogza/Phishing.Database/blob/master/phishing-links-NEW-today.txt
[16] http://www.viruss.eu/security/new-windows-process-injection-can-be-useful-for-stealthy-malware/
[15] https://darknetdiaries.com/episode/25/
[15] https://www.webiron.com/bot_feed/bd7f678e9b87f3079d9fda5d9f6157c7
[15] https://packetstormsecurity.com/news/view/30375/Spanish-Brothel-Chain-Leaves-Internal-Database-Exposed-Online.html

Top URLs in Tweet in G2:
[4] http://www.sectechno.com/filerecon-advanced-file-fingerprinting/
[3] http://rite.ly/wEdr
[2] https://attgm.com/eng/infosec-services/penetration-testing/
[2] https://helpmewithhipaa.com/listener-questions-and-input-ep-215/?utm_campaign=listener-questions-and-input-ep-215&utm_medium=social_link&utm_source=missinglettr-twitter
[2] https://www.reddit.com/r/SecurityRedTeam/
[2] https://www.reddit.com/r/SecurityBlueTeam/
[2] https://haveibeenpwned.com/PwnedWebsites#StockX
[2] https://threatpost.com/researchers-bypass-apple-faceid-using-biometrics-achilles-heel/147109/
[2] https://www.sesin.at/
[1] https://twitter.com/i/web/status/1159992844607721473

Top URLs in Tweet in G3:
[5] https://dianainitiative2019.sched.com/event/TApl
[3] https://www.youtube.com/watch?v=k3_RU30tEIE&feature=youtu.be

[3] https://www.youtube.com/watch?v=3KHJKj9GgsI&feature=youtu.be

[3] https://www.youtube.com/watch?v=eja-popojUo&feature=youtu.be

[3] https://twitter.com/Rch3Lrn0Ld1/status/1159468427477770241
[2] https://darknetdiaries.com/episode/25/
[1] https://twitter.com/i/web/status/1159877471161839617
[1] https://twitter.com/i/web/status/1160104101167816704
[1] https://twitter.com/i/web/status/1160338616293347328
[1] https://dianainitiative2019.sched.com/event/TAq9

Top URLs in Tweet in G4:
[5] https://www.forbes.com/sites/zakdoffman/2019/08/09/warning-as-dangerous-cybersecurity-risks-found-in-mainstream-office-printers-report/amp/?__twitter_impression=true
[4] https://www.alienvault.com/blogs/security-essentials/deepfakes-are-a-problem-whats-the-solution?utm_medium=Social&utm_source=LinkedIn&utm_content=blog
[4] https://www.zdnet.com/article/microsoft-names-top-security-researchers-zero-day-contributors/
[3] https://www.forbes.com/sites/jameshadley/2019/08/08/why-businesses-must-look-beyond-certification-for-cybersecurity-skills/
[3] https://www.smartdatacollective.com/big-data-makes-black-hat-hackers-terrifying-than-ever/
[3] https://techcrunch.com/2019/08/10/were-all-doomed-2019-edition/
[2] https://techqoon.net/2019/08/09/air-new-zealand-data-breach-affects-100000-loyalty-reward-customers/
[2] https://www.zdnet.com/article/spanish-brothel-chain-leaves-internal-database-exposed-online/
[2] https://johnopdenakker.com/secure-password-management-password-managers-not-the-best-solution-for-everyone/
[2] https://www.cnn.com/2019/08/09/politics/dhs-cyber-paper-ballots-2020/index.html

Top URLs in Tweet in G5:
[5] https://dan.com/buy-domain/idrings.com?redirected=true&tld=com
[4] https://dan.com/buy-domain/redelete.com?redirected=true&tld=com
[2] https://www.linkedin.com/posts/sidragon1_hackers-bsides-defcon-activity-6565882298129010688-DMUi
[2] https://www.zdnet.com/article/online-security-101-how-to-protect-your-privacy-from-hackers-spies-and-the-government/
[1] https://twitter.com/i/web/status/1160095353888288768
[1] https://twitter.com/i/web/status/1160186677169491968
[1] https://twitter.com/i/web/status/1160204035053330432
[1] https://twitter.com/i/web/status/1160269301036867586
[1] https://twitter.com/i/web/status/1160276437242458112
[1] https://www.itspmagazine.com/events/futurecon-columbus-cyber-security-conference-2019

Top URLs in Tweet in G6:
[12] https://threatpost.com/researchers-bypass-apple-faceid-using-biometrics-achilles-heel/147109/
[12] https://blog.gemalto.com/security/2014/04/28/top-10-tips-to-achieving-network-security/
[6] https://hakin9.org/web-application-penetration-testing-local-file-inclusion-lfi-testing/
[6] http://go.theregister.com/feed/www.theregister.co.uk/2019/08/09/coinbase_pwned/?utm_source=dlvr.it&utm_medium=twitter
[5] https://hakin9.org/discovering-hidden-email-gateways-with-osint-techniques/
[5] https://nakedsecurity.sophos.com/2019/08/08/s2-ep3-ransomware-surveillance-and-data-theft-naked-security-podcast/?utm_source=dlvr.it&utm_medium=twitter
[4] https://hakin9.org/metasploit-on-raspberry-pi-tutorial-free-course-content/
[4] https://hakin9.org/voip-hacking-techniques/
[4] https://hakin9.org/the-anatomy-of-hacker-groups-who-breaks-into-electronic-systems-and-why/
[4] https://hakin9.org/universal-radio-hacker-investigate-wireless-protocols-like-a-boss/

Top URLs in Tweet in G7:
[4] http://www.sectechno.com/keylogger-detector-detects-stealth-keyloggers/
[3] https://www.slideshare.net/secret/gi26r9L3H8op2h
[3] https://twitter.com/suchipahi/status/1159762897007828992
[3] http://www.sectechno.com/filerecon-advanced-file-fingerprinting/
[3] https://securityonline.info/seccomp-tools/
[2] https://securityonline.info/open-source-vulnerability-assessment-tool/
[2] https://securityonline.info/cdqr-cold-disk-quick-response-tool/
[2] https://securityonline.info/attack-surface-mapper/
[2] https://github.com/mitchellkrogza/Phishing.Database/blob/master/phishing-domains-NEW-last-hour.txt
[1] https://www.slideshare.net/main/private_slideshow?path_to_redirect_at=https%3A%2F%2Fwww.slideshare.net%2FSuchismitaPahi%2Fbsideslv-2019-cover-your-a-how-to-protect-yourself-as-an-independent-security-consultant

Top URLs in Tweet in G8:
[1] https://twitter.com/i/web/status/1160338531866140673
[1] https://twitter.com/i/web/status/1159257627811074048
[1] https://twitter.com/i/web/status/1159590930468495361
[1] https://twitter.com/i/web/status/1159887870384939008
[1] https://twitter.com/i/web/status/1160232533188984837
[1] https://twitter.com/i/web/status/1160274320486125571
[1] https://twitter.com/i/web/status/1160253882204688385
[1] https://twitter.com/i/web/status/1159997021836550147
[1] https://twitter.com/i/web/status/1159997470757117952
[1] https://paper.li/GeraintW/1348918597?edition_id=b9fdb880-bb63-11e9-a59d-0cc47a0d1609

Top URLs in Tweet in G9:
[4] https://www.peerlyst.com/posts/while-we-wait-for-the-next-big-hack-to-draw-everyone-s-attention-to-security-do-this-benjamin-infosec?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[4] https://www.bleepingcomputer.com/news/security/customer-information-exposed-in-air-new-zealand-phishing-attack/?sf217312472=1
[3] https://www.peerlyst.com/posts/learning-how-to-write-regular-expressions-a-collection-of-resources-susan-parker?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[2] https://www.peerlyst.com/posts/12-israeli-infosec-startup-companies-to-notice-peerlyst?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[2] https://www.coresecurity.com/blog/low-level-reversing-bluekeep-vulnerability-cve-2019-0708?code=CMP-0000001929&ls=100000000&utm_campaign=core-security-emails&utm_content=98375609&utm_medium=social&utm_source=twitter&hss_channel=tw-17157238
[2] https://twitter.com/three_cube/status/1160286786800644097
[2] https://www.bleepingcomputer.com/news/google/google-chrome-incognito-mode-can-still-be-detected-by-these-methods/
[1] https://www.peerlyst.com/posts/bsidessg-2019-conference-schedule-is-out-bsidessg?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[1] https://twitter.com/i/web/status/1159571245693906953
[1] https://twitter.com/i/web/status/1160244430424674304

Top URLs in Tweet in G10:
[18] http://open-sez.me
[5] https://hackersonlineclub.com/mobile-security-penetration-testing/
[3] https://medium.com/bug-bounty-hunting/bypass-blocked-page-reviews-in-facebook-informative-1e6e8b41b6b0
[2] http://blog.hackademicus.nl/city-of-naples-florida-lost-700k-after-a-cyberattack/
[2] https://docs.google.com/presentation/d/1cpcxEBEb0dyXwRqSWQ6bknJS-PQO_e242Dioy9SU2Io/edit?usp=sharing
[2] https://linuxsecurity.expert/tools/passmgr/
[1] https://twitter.com/i/web/status/1159964472309690368
[1] https://twitter.com/i/web/status/1160088686945607680
[1] https://hackersonlineclub.com/earn-1-million-dollar-apple-bug-bounty/
[1] https://twitter.com/i/web/status/1160135716413661184

Top Domains
Top Domains in Tweet in Entire Graph:
[1278] twitter.com
[278] paper.li
[136] tobem.com
[123] github.com
[102] webiron.com
[90] viruss.eu
[79] pastebeen.com
[77] packetstormsecurity.com
[67] techrepublic.com
[64] securityaffairs.co

Top Domains in Tweet in G1:
[531] twitter.com
[135] tobem.com
[106] github.com
[102] webiron.com
[88] viruss.eu
[64] packetstormsecurity.com
[62] techrepublic.com
[59] ehackingnews.com
[59] securityaffairs.co
[57] boardtownblast.com

Top Domains in Tweet in G2:
[242] twitter.com
[79] pastebeen.com
[63] paper.li
[51] feedburner.com
[11] packetstormsecurity.com
[7] wired.com
[5] blogspot.com
[5] infosecroundup.com
[5] threatpost.com
[5] hakin9.org

Top Domains in Tweet in G3:
[39] twitter.com
[10] youtube.com
[7] sched.com
[2] darknetdiaries.com
[1] security-soup.net
[1] paper.li
[1] peerlyst.com
[1] technocrit.com

Top Domains in Tweet in G4:
[43] twitter.com
[14] forbes.com
[12] paper.li
[10] zdnet.com
[5] johnopdenakker.com
[4] alienvault.com
[3] smartdatacollective.com
[3] techcrunch.com
[2] proofpoint.com
[2] techqoon.net

Top Domains in Tweet in G5:
[45] twitter.com
[9] dan.com
[4] zdnet.com
[2] itspmagazine.com
[2] linkedin.com
[1] kas.pr
[1] google.com
[1] ehackingnews.com
[1] cpomagazine.com
[1] crn.com

Top Domains in Tweet in G6:
[45] twitter.com
[40] hakin9.org
[18] sophos.com
[12] threatpost.com
[12] gemalto.com
[11] theregister.com
[7] arstechnica.com
[5] pulsedive.com
[5] zdnet.com
[4] hackerpom.com

Top Domains in Tweet in G7:
[28] twitter.com
[17] securityonline.info
[7] sectechno.com
[4] slideshare.net
[4] hakin9.org
[2] github.com
[1] jscr.ly
[1] nbcnews.com
[1] paper.li
[1] wsimg.com

Top Domains in Tweet in G8:
[9] twitter.com
[2] paper.li

Top Domains in Tweet in G9:
[18] twitter.com
[11] peerlyst.com
[6] bleepingcomputer.com
[2] coresecurity.com
[2] faveeo.com
[1] phishstats.info
[1] f5.com
[1] vice.com
[1] orange.tw
[1] mashable.com

Top Domains in Tweet in G10:
[18] open-sez.me
[9] twitter.com
[8] linuxsecurity.expert
[7] hackersonlineclub.com
[4] medium.com
[2] hackademicus.nl
[2] google.com
[1] hackingarticles.in
[1] hakin9.org

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[2675] infosec
[1634] cybersecurity
[518] security
[435] databreach
[258] malware
[246] ransomware
[197] hackers
[174] hacking
[174] phishing
[156] cyberwarfare



Top Hashtags in Tweet in G1:
[1355] infosec
[1013] cybersecurity
[365] databreach
[356] security
[235] ransomware
[189] malware
[152] hackers
[147] cyberwarfare
[140] phishing
[100] hacker

Top Hashtags in Tweet in G2:
[273] infosec
[164] cybersecurity
[45] databreach
[38] leak
[38] breach
[16] security
[13] hacking
[10] it
[10] privacy
[7] data

Top Hashtags in Tweet in G3:
[52] infosec
[20] ff
[13] girlswhocode
[10] ai
[7] dianainitiative2019
[7] blackhat2019
[5] hacker
[5] money
[5] hackersummercamp
[4] infosecurity

Top Hashtags in Tweet in G4:
[99] infosec
[60] cybersecurity
[36] faceid
[35] hacked
[35] blackhat
[10] malware
[9] phishing
[9] blackhat2019
[6] cyberattack
[6] security

Top Hashtags in Tweet in G5:
[52] infosec
[42] cybersecurity
[30] defcon
[25] defcon27
[19] hackersummercamp
[8] hacking
[7] security
[6] hacker
[5] id
[5] identity

Top Hashtags in Tweet in G6:
[149] infosec
[44] security
[38] cybersecurity
[37] hacking
[31] malware
[28] hackers
[15] iot
[15] infographics
[13] programming
[11] osint

Top Hashtags in Tweet in G7:
[52] infosec
[26] security
[18] opensource
[14] bsideslv
[14] pentest
[5] defcon27
[5] polyswarm
[5] pvjctf
[5] provingground
[5] trainingground

Top Hashtags in Tweet in G8:
[8] bhusa
[5] infosec
[2] cybersecurity

Top Hashtags in Tweet in G9:
[28] infosec
[7] malware
[7] phishing
[6] startups
[4] blueteam
[4] ciso
[3] regex
[3] conferene
[3] certification
[3] cybersecurity

Top Hashtags in Tweet in G10:
[68] infosec
[29] bugbounty
[22] waf
[22] bugbountytip
[20] password
[18] opsec
[14] tools
[7] detection
[5] bugbountytips
[5] hacking

Top Words
Top Words in Tweet in Entire Graph:
[2270] Words in Sentiment List#1: Positive
[2512] Words in Sentiment List#2: Negative
[18] Words in Sentiment List#3: Angry/Violent
[83980] Non-categorized Words
[88762] Total Words
[2698] #infosec
[1654] #cybersecurity
[525] security
[518] #security
[472] reach2ratan

Top Words in Tweet in G1:
[1377] #infosec
[1034] #cybersecurity
[460] reach2ratan
[365] #databreach
[356] #security
[311] new
[235] #ransomware
[211] gt
[200] security
[189] #malware

Top Words in Tweet in G2:
[273] #infosec
[164] #cybersecurity
[85] emails
[79] dump
[79] paste
[75] passwords
[65] infosec
[64] security
[50] latest
[45] #databreach

Top Words in Tweet in G3:
[75] infosec
[60] dianainitiative
[52] #infosec
[44] s
[43] alyssam_infosec
[42] women
[28] badassbowden
[26] gabsmashh
[23] today
[23] great

Top Words in Tweet in G4:
[99] #infosec
[60] #cybersecurity
[51] forbes
[41] iphone
[39] happygeek
[37] under
[36] #faceid
[36] successfully
[36] two
[35] #hacked

Top Words in Tweet in G5:
[73] defcon
[52] #infosec
[42] #cybersecurity
[33] itspmagazine
[32] marcociappelli
[31] #defcon
[31] sean_martin
[25] #defcon27
[19] #hackersummercamp
[17] infosec

Top Words in Tweet in G6:
[149] #infosec
[44] #security
[38] #cybersecurity
[37] #hacking
[32] hakin9
[31] #malware
[28] #hackers
[23] ai__tech
[22] top
[19] 10

Top Words in Tweet in G7:
[52] #infosec
[32] sysadmin
[26] #security
[20] infosec
[18] s
[18] #opensource
[17] systems
[16] best
[16] job
[16] start

Top Words in Tweet in G8:
[63] here
[59] sysadmin
[57] security
[56] farewell_ladmin
[56] sysadmins
[55] former
[55] pivoted
[55] being
[55] analyst
[55] year

Top Words in Tweet in G9:
[28] #infosec
[16] peerlyst
[8] 12
[8] new
[7] good
[7] know
[7] blackhatevents
[7] #malware
[7] #phishing
[6] use

Top Words in Tweet in G10:
[69] #infosec
[55] gt
[53] lt
[51] scrpt
[34] 20
[29] #bugbounty
[26] 1
[23] writing
[22] #waf
[22] #bugbountytip

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[460] #cybersecurity,#infosec
[351] #infosec,#cybersecurity
[351] #cybersecurity,#databreach
[195] #security,#infosec
[180] #databreach,#ransomware
[152] #cyberwarfare,#infosec
[133] #infosec,#security
[122] #ransomware,#hackers
[106] secure,random
[89] new,#phishing

Top Word Pairs in Tweet in G1:
[297] #cybersecurity,#databreach
[217] #infosec,#cybersecurity
[187] #cybersecurity,#infosec
[177] #databreach,#ransomware
[164] #security,#infosec
[147] #cyberwarfare,#infosec
[120] #ransomware,#hackers
[106] secure,random
[86] new,#phishing
[85] #hackers,#infosec

Top Word Pairs in Tweet in G2:
[79] emails,paste
[70] passwords,emails
[55] #cybersecurity,#infosec
[44] #databreach,#infosec
[43] #cybersecurity,#databreach
[38] #infosec,#leak
[38] #leak,#breach
[23] daily,#cybersecurity
[13] important,dump
[13] massive,dump

Top Word Pairs in Tweet in G3:
[18] women,infosec
[17] infosec,here
[17] here,s
[17] s,reply
[17] reply,guy
[17] guy,toolkit
[16] ell_o_punk,gabsmashh
[16] ieataccordions,deanashick
[16] deanashick,lockpixnlipstix
[16] lockpixnlipstix,5c4r48

Top Word Pairs in Tweet in G4:
[36] under,two
[35] forbes,iphone
[35] iphone,#faceid
[35] #faceid,successfully
[35] successfully,#hacked
[35] #hacked,under
[35] two,minutes
[35] minutes,#blackhat
[35] #blackhat,demonstration
[35] demonstration,proved

Top Word Pairs in Tweet in G5:
[19] #infosec,#cybersecurity
[18] marcociappelli,sean_martin
[13] defcon,#defcon27
[10] #hackersummercamp,#infosec
[10] #defcon27,#defcon
[9] domain,name
[9] name,sale
[8] itspmagazine's,marcociappelli
[8] #defcon,#hackersummercamp
[7] prioritydomains,domain

Top Word Pairs in Tweet in G6:
[31] #infosec,#hacking
[21] #hacking,#hackers
[19] #infosec,#cybersecurity
[16] top,10
[15] #infosec,#security
[15] #security,#iot
[14] read,more
[14] 10,#security
[14] #security,basics
[14] basics,keep

Top Word Pairs in Tweet in G7:
[19] #infosec,#security
[18] #opensource,#infosec
[15] best,ways
[15] ways,build
[15] build,skills
[15] skills,infosec
[15] infosec,job
[15] job,start
[15] start,sysadmin
[15] sysadmin,sysadmin

Top Word Pairs in Tweet in G8:
[55] former,sysadmin
[55] sysadmin,pivoted
[55] pivoted,being
[55] being,security
[55] security,analyst
[55] analyst,year
[55] year,ago
[55] ago,here
[55] here,sysadmins
[54] farewell_ladmin,former

Top Word Pairs in Tweet in G9:
[6] 12,uk
[6] uk,based
[6] based,#infosec
[6] #infosec,#startups
[6] #startups,know
[6] know,peerlyst
[6] peerlyst,darktrace
[6] darktrace,post_quantum
[6] post_quantum,aimbrainhq
[6] aimbrainhq,razorsecure

Top Word Pairs in Tweet in G10:
[51] lt,scrpt
[34] 20,lt
[34] scrpt,gt
[20] #bugbountytip,#infosec
[20] #password,#infosec
[18] 1000's,default
[18] default,passwords
[18] passwords,fb
[18] fb,defaultpasswords
[18] defaultpasswords,#password

Top Replied-To
Top Replied-To in Entire Graph:
@alyssam_infosec
@badassbowden
@gavil0224
@infosec_taylor
@0xnorth
@cybersec_feeds
@ian_infosec
@ac1dgoddess
@notasockpuppet1
@538355

Top Replied-To in G1:
@cybersec_feeds
@cybertoolsbooks
@538355
@keoxes
@samsung
@microsoft
@dataprotectioni
@phishfindr
@reach2ratan
@phishstats

Top Replied-To in G3:
@alyssam_infosec
@badassbowden
@infosec_taylor
@0xnorth
@sapnas1ngh
@ac1dgoddess
@notasockpuppet1
@ell_o_punk
@cryptocypher
@katyanton

Top Replied-To in G4:
@pavlova_zlata

Top Replied-To in G5:
@weldpond
@ian_infosec
@brysonbort
@fpieces
@brianwhelton
@defcon
@shinigamiweb1
@hak4kidz
@infosec_rogue
@benheise

Top Replied-To in G6:
@kodykinzie
@olihough86
@miketango22314
@infosec_pom
@litmoose
@cyb3rops

Top Replied-To in G7:
@rfernan_infosec
@otbfme

Top Replied-To in G8:
@farewell_ladmin
@mitchparkerciso
@mdennedy

Top Replied-To in G9:
@viking_sec
@three_cube
@reebokclassics
@infosec_elijah
@jethartjinj

Top Mentioned
Top Mentioned in Entire Graph:
@reach2ratan
@defcon
@forbes
@dianainitiative
@farewell_ladmin
@troyhunt
@pogowasright
@alexlomas
@adanielhill
@happygeek

Top Mentioned in G1:
@reach2ratan
@antgrasso
@jinibabd
@adanielhill
@ingliguori
@cioamaro
@phishfindr
@cybertoolsbooks
@z3rotrust

Top Mentioned in G2:
@attgmconsulting
@runmytech
@omgheatherjana
@gtpintado
@beckycortino
@qv2_1
@dhananjayrokde
@markquinn_vo
@threatconnect

Top Mentioned in G3:
@dianainitiative
@alyssam_infosec
@gabsmashh
@badassbowden
@nemessisc
@hacks4pancakes
@rayredacted
@darksim905
@ieataccordions
@deanashick

Top Mentioned in G4:
@forbes
@happygeek
@thebeerfarmers
@appsecbloke
@j_opdenakker
@cybersecboardrm
@fabriziobustama
@aloria
@archonsec
@attcyber

Top Mentioned in G5:
@defcon
@marcociappelli
@itspmagazine
@sean_martin
@pete_coops
@sidragon1
@aviationvillage
@infosecrick
@prioritydomains
@thekenmunroshow

Top Mentioned in G6:
@hakin9
@ai__tech
@gemalto
@ronald_vanloon
@teamcymru
@fewatoms
@strandjs
@rev10d
@krelkci
@bhinfosecurity

Top Mentioned in G7:
@otbfme
@suchipahi
@bcosvillage
@atomeditor
@gitlab
@the_yellow_fall
@recon_infosec
@sectechno
@sisheogorath
@polyswarm

Top Mentioned in G8:
@farewell_ladmin
@nicolefv
@swagitda_
@stevehardee
@lcooney
@kim_crawley
@otbfme
@jfug_
@deenai
@profwoodward

Top Mentioned in G9:
@peerlyst
@blackhatevents
@darktrace
@post_quantum
@aimbrainhq
@razorsecure
@redsift
@bleepincomputer
@jeremiahg
@sidragon1

Top Mentioned in G10:
@spyerror
@random_robbie
@mispproject
@lselabs
@hackerb0y_
@yoncubilisim
@pavandep8
@priyanshu_itech
@evanricafort
@threat_con

Top Tweeters
Top Tweeters in Entire Graph:
@occuworld
@sectest9
@bella623
@cyberdomain
@nosqldigest
@cybertoolsbooks
@altamirana2
@webironbots
@gamergeeknews
@evankirstel

Top Tweeters in G1:
@sectest9
@cyberdomain
@nosqldigest
@cybertoolsbooks
@webironbots
@aldoceccarelli
@chidambara09
@rvp
@fintechna
@zimei_no_ri

Top Tweeters in G2:
@csa_dvillamizar
@it_securitynews
@chaiberia
@gtpintado
@cecalli_helper
@clairvoyant_the
@vectorfiveus
@mrsyiswhy
@threatmeter
@skry

Top Tweeters in G3:
@jpjanson
@badwebsites
@kevincarson1
@threeuk
@waynedixon
@neilhimself
@ellearmageddon
@jaysonstreet
@hacks4pancakes
@dearauntcrabby

Top Tweeters in G4:
@fhhknews
@saukel
@marypcbuk
@forbes
@buddendorf
@genknoxx
@ladylisadcantu1
@securityblog
@techpearce2
@rtehrani

Top Tweeters in G5:
@cnbc
@weems
@ipfconline1
@jc_vazquez
@marcusjcarey
@mrmeritology
@sawaba
@cybergibbons
@lil_lost
@infosecsherpa

Top Tweeters in G6:
@gamergeeknews
@aaroncuddeback
@adekleine
@newtonmark
@rdsweb
@sherryjones
@rogue_corq
@ene3112
@markmichaeldmic
@walkingimpress

Top Tweeters in G7:
@ottlegalrebels
@jhamby
@shulab
@grrrr_shark
@kf
@gaelicwizard
@secnewsbytes
@gagnelegal
@korezian
@lakenley

Top Tweeters in G8:
@thegrugq
@reach2sanket
@jaydestro
@jillithd
@georgewherbert
@attritionorg
@socketwench
@cyberodb
@seansposito
@geek_manager

Top Tweeters in G9:
@askebay
@dajerx
@pvynckier
@google
@claushoumann
@cyberdad
@chuckdbrooks
@peerlyst
@mikko
@jethartjinj

Top Tweeters in G10:
@538355
@ovidiug
@ximad
@random_robbie
@securingdev
@sumgr0
@realcryptogoose
@zephrfish
@redd_anon
@priyanshu_itech


We use necessary cookies to make our site work. We’d like to set additional cookies to understand site usage, make site improvements and to remember your settings. We also use cookies set by other sites to help deliver content from their services.