(Cyber Security) OR Cybersecurity, Twitter, 3/26/2020 12:36:03 AM, 223718


FAQ | Problem?

(Cyber Security) OR Cybersecurity_2020-03-25_03-08-29.xlsx
(Cyber Security) OR Cybersecurity_2020-03-25_03-08-29.xlsx
From:
NodeXLExcelAutomator
Uploaded on:
March 26, 2020
Short Description:
(Cyber Security) OR Cybersecurity via NodeXL https://bit.ly/2UjRGhT
@cybersec_feeds
@cyberseccare
@thehackersnews
@india_ai_brains
@omkar_raii
@reach2ratan
@sectest9
@chidambara09
@tala_606
@spirosmargaris

Top hashtags:
#cybersecurity
#infosec
#security
#ai

Description:
Description
The graph represents a network of 3,949 Twitter users whose tweets in the requested range contained "(Cyber Security) OR Cybersecurity", or who were replied to or mentioned in those tweets. The network was obtained from the NodeXL Graph Server on Wednesday, 25 March 2020 at 10:09 UTC.

The requested start date was Wednesday, 25 March 2020 at 00:01 UTC and the maximum number of days (going backward) was 14.

The maximum number of tweets collected was 5,000.

The tweets in the network were tweeted over the 1-day, 2-hour, 47-minute period from Monday, 23 March 2020 at 03:38 UTC to Tuesday, 24 March 2020 at 06:25 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 3949
Unique Edges : 5820
Edges With Duplicates : 2417
Total Edges : 8237
Number of Edge Types : 4
Mentions : 1517
MentionsInRetweet : 4855
Tweet : 1783
Replies to : 82
Self-Loops : 1783
Reciprocated Vertex Pair Ratio : 0.00756286632633768
Reciprocated Edge Ratio : 0.0150121974103959
Connected Components : 731
Single-Vertex Connected Components : 535
Maximum Vertices in a Connected Component : 2319
Maximum Edges in a Connected Component : 6576
Maximum Geodesic Distance (Diameter) : 10
Average Geodesic Distance : 3.591674
Graph Density : 0.000341807385605169
Modularity : 0.531336
NodeXL Version : 1.0.1.427
Data Import : The graph represents a network of 3,949 Twitter users whose tweets in the requested range contained "(Cyber Security) OR Cybersecurity", or who were replied to or mentioned in those tweets. The network was obtained from the NodeXL Graph Server on Wednesday, 25 March 2020 at 10:09 UTC.

The requested start date was Wednesday, 25 March 2020 at 00:01 UTC and the maximum number of days (going backward) was 14.

The maximum number of tweets collected was 5,000.

The tweets in the network were tweeted over the 1-day, 2-hour, 47-minute period from Monday, 23 March 2020 at 03:38 UTC to Tuesday, 24 March 2020 at 06:25 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

Layout Algorithm : The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.
Graph Source : GraphServerTwitterSearch
Graph Term : (Cyber Security) OR Cybersecurity
Groups : The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.
Edge Color : Edge Weight
Edge Width : Edge Weight
Edge Alpha : Edge Weight
Vertex Radius : Betweenness Centrality

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[27] https://twinybots.ch/
[21] https://www.ncsc.gov.uk/collection/10-steps-to-cyber-security
[18] https://www.techrepublic.com/article/network-address-based-security-how-to-implement-better-controls/#ftag=RSS56d97e7
[17] http://www.keepnetlabs.com/download/7004/
[16] https://venturebeat.com/2020/03/14/the-emergence-of-the-professional-ai-risk-manager/
[15] https://blog.wpsec.com/backdooring-wordpress-with-phpsploit/
[15] http://feedproxy.google.com/~r/TheHackersNews/~3/TrfteovCQsw/ddos-botnets-lilin-dvr.html
[15] https://www.reddit.com/r/cybersecurity/comments/fnb8j3/im_planning_on_buying_servers_for_my_home_how_can/
[14] https://www.us-cert.gov/ncas/bulletins/sb20-083
[13] https://packetstormsecurity.com/news/view/31038/New-Mirai-Botnet-Variant-Targets-NAS-Devices.html

Top URLs in Tweet in G1:
[9] https://twinybots.ch/
[4] https://www.reddit.com/r/cybersecurity/comments/fnb8j3/im_planning_on_buying_servers_for_my_home_how_can/
[3] https://www.weforum.org/agenda/2020/03/coronavirus-pandemic-cybersecurity/
[3] https://thehill.com/policy/cybersecurity/488731-republican-lawmakers-call-on-twitter-to-ban-chinese-communist-party-from
[2] https://www.oreilly.co.jp/editors/archives/2020/03/cybersecurity-ops-with-bash.html
[2] https://www.raconteur.net/technology/covid-19-cybersecurity
[2] https://www.helpnetsecurity.com/2020/03/23/2020-cybersecurity-risks/
[2] https://www.helpnetsecurity.com/2020/03/23/2020-cybersecurity-risks/?utm_source=dlvr.it&utm_medium=twitter
[2] https://www.iotworldtoday.com/2020/03/24/cybersecurity-crisis-management-during-the-coronavirus-pandemic/?utm_source=dlvr.it&utm_medium=twitter
[2] https://threatpost.com/fake-coronavirus-vaccine-website-busted-in-doj-takedown/154031/

Top URLs in Tweet in G2:
[6] https://twinybots.ch/
[4] https://www.amazon.com/NETGEAR-AC1200-Router-Gigabit-Ethernet/dp/B0756QFLXP/ref=as_li_ss_tl?keywords=wpa2+router&qid=1579001754&sr=8-3&linkCode=sl1&tag=nickdancriddr-20&linkId=913187ae77353485bacae8cfeb3df9a0&language=en_US
[4] https://www.webiron.com/bot_feed/bd7f678e9b87f3079d9fda5d9f6157c7
[4] https://www.embedthis.com/blog/posts/stories/iot-developer-security-checklist.html
[4] https://www.embedthis.com/
[3] https://blogs.vmware.com/security/2020/03/2020-cybersecurity-outlook-report-key-findings-part-1-of-2.html
[3] https://www.darkreading.com/
[3] https://www.bloomberg.com/news/articles/2020-03-19/working-from-home-a-cybersecurity-headache-for-employers
[3] https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
[3] https://nationalcybersecurity.com/cybersecurity-hacker-covid-19-decoy-doc-cloudflare-tools-used-to-spread-blackwater-malware/

Top URLs in Tweet in G4:
[14] https://www.ncsc.gov.uk/collection/10-steps-to-cyber-security
[11] https://www.techrepublic.com/article/network-address-based-security-how-to-implement-better-controls/#ftag=RSS56d97e7
[10] https://www.forbes.com/sites/forbestechcouncil/2019/08/20/is-cybersecurity-automation-the-future/
[8] http://feedproxy.google.com/~r/TheHackersNews/~3/TrfteovCQsw/ddos-botnets-lilin-dvr.html
[7] http://feeds.harvardbusiness.org/~r/harvardbusiness/~3/ErdNMykDGvA/making-mentorship-a-team-effort
[7] https://packetstormsecurity.com/news/view/31042/Coronavirus-News-Being-Used-To-Sneak-Malware-Past-AV-Programs.html
[7] https://packetstormsecurity.com/news/view/31040/Windows-Ubuntu-macOS-VirtualBox-Fall-At-Pwn2Own-Hacking-Contest.html
[7] https://packetstormsecurity.com/news/view/31038/New-Mirai-Botnet-Variant-Targets-NAS-Devices.html
[7] https://insights.dice.com/2020/03/23/will-covid-19-create-big-moment-a-i-machine-learning/
[7] https://www.thestar.com.my/tech/tech-news/2020/03/20/working-from-home-a-cybersecurity-headache-for-employers#.XngzzDSFvzE.twitter

Top URLs in Tweet in G5:
[6] https://mauricedesignsforu.com/
[5] https://twinybots.ch/
[5] https://mailchi.mp/21ab6527cb51/hammertons-newsletter-23-03-2020
[4] https://thehackernews.com/2020/03/coronavirus-cybersecurity-ciso.html
[4] https://ltauditor.com/splunk/
[4] https://medium.com/pcmag-access/fbi-the-most-perpetrated-cybercrime-is-not-what-you-think-f6f7fa7955c9?utm_source=dlvr.it&utm_medium=twitter
[4] https://www.linkedin.com/posts/dr-reem-alshammari-b6324159_exclusive-elite-hackers-target-who-as-coronavirus-activity-6648041303328210944-gE9X
[3] https://www.peerlyst.com/posts/4-cybersecurity-insights-to-present-to-leadership-cymulate?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[3] https://dergi.turkhackteam.org/sayi/40/#page/13
[3] https://sudobyte.blogspot.com/2020/03/8-google-fuchsia-os.html

Top URLs in Tweet in G6:
[12] https://venturebeat.com/2020/03/14/the-emergence-of-the-professional-ai-risk-manager/
[10] http://www.keepnetlabs.com/download/7004/
[9] https://www.keepnetlabs.com/threat-simulation/
[9] https://www.keepnetlabs.com/cybersecurity-neuroscience-whitepaper/
[8] https://www.youtube.com/watch?v=UAdCMU28Yug&feature=youtu.be

[8] https://venturebeat.com/2020/03/08/3-important-trends-in-ai-ml-you-might-be-missing/
[7] https://www.linkedin.com/slink?code=fwP-X2H
[6] https://cybertalks.co.uk/interviews/the-challenges-of-end-to-end-cyber-security-solutions/?utm_content=buffer7f711&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
[5] https://www.surveymonkey.com/r/insider-threat-survey-2020
[5] https://www.techrepublic.com/article/network-address-based-security-how-to-implement-better-controls/#ftag=RSS56d97e7

Top URLs in Tweet in G7:
[2] https://siliconangle.com/2020/03/23/coronavirus-cybersecurity-professionals-deal-increasing-attacks-remote-workers/
[2] https://www.aspistrategist.org.au/technology-and-cybersecurity-a-double-edged-sword-for-women/
[2] https://thehackernews.com/2020/03/most-innovative-cybersecurity.html?sf231026779=1
[1] https://thehackernews.com/2020/03/windows-adobe-font-vulnerability.html
[1] https://thehackernews.com/2020/03/truefire-guitar-tutoring-data-breach.html
[1] https://www.govtech.com/computing/Tennessee-Utility-Uses-Quantum-Tech-For-Cybersecurity.html
[1] https://www.businesswire.com/news/home/20200323005673/en/Trustwave-Named-Leader-IDC-MarketScapes-Asia-Pacific
[1] https://www.dvidshub.net/news/365660/navwar-hosts-inaugural-syscom-forum-with-information-security-leaders
[1] https://www.businesstimes.com.sg/garage/cyber-security-startup-horangi-snags-us20m-led-by-provident-growth
[1] https://bit.ly/3bhjXeP

Top URLs in Tweet in G8:
[1] http://innovate.stpinext.in/apply-now/imagecoe
[1] https://www.cryptonewsz.com/how-blockchain-can-transform-cybersecurity/
[1] https://analyticsindiamag.com/how-business-leaders-can-use-ai-to-bridge-the-cybersecurity-skills-gap/

Top URLs in Tweet in G9:
[2] https://apple.news/Ah_x2jRTOOYG5isEodvIrwA
[1] https://www.rti.com/blog/multi-domain-operations-why-dds-is-the-right-solution-for-securing-critical-data
[1] https://buff.ly/2Ug3mkF
[1] https://buff.ly/2TYE6QU
[1] https://atos.net/content/mini-sites/journey-2022/digital-meets-physical/
[1] https://iiot-world.com/cybersecurity/medical-device-safety-and-security-obvious-but-not-easy-to-achieve/
[1] https://gadgets.ndtv.com/internet/news/coronavirus-cyber-attacks-who-hack-attempts-2199570
[1] https://atos.net/en/solutions/cyber-security
[1] http://buff.ly/2Ug3mkF
[1] https://www2.deloitte.com/us/en/insights/industry/financial-services/protecting-customer-privacy-financial-institutions.html?id=us:2sm:3tw:4di4895::6di:20190528220500::2360646675&utm_source=tw&utm_campaign=di4895&utm_content=di&utm_medium=social&linkId=68191108

Top URLs in Tweet in G10:
[5] http://twib.in/l/MarketsandResearch.biz
[2] http://share.postbeyond.com/y74xg
[2] http://out.faveeo.com/?url=https://thepaypers.com/payments-general/partnering-with-fintechs-payment-innovation-cybersec-high-on-top-of-fis-agenda-barclays--1241133&vertical=startups-and-investments&lang=en&family=cybersecurity
[2] https://www.helpnetsecurity.com/2020/03/23/2020-cybersecurity-risks/
[2] http://twib.in/l/NetBlocks.org
[2] http://dlvr.it/RSNGj4
[1] https://bit.ly/2xacYWc
[1] https://cybersecurityventures.com/ec-council-announces-free-phishing-protection-solution-amid-the-covid-19-outbreak/
[1] https://cybersecurityventures.com/solving-the-cybersecurity-labor-crisis-every-it-worker-needs-to-be-counted-in/
[1] https://www.comparitech.com/blog/information-security/women-cybersecurity-initiatives/

Top Domains
Top Domains in Tweet in Entire Graph:
[100] forbes.com
[94] linkedin.com
[67] bit.ly
[62] twitter.com
[60] packetstormsecurity.com
[49] darkreading.com
[48] keepnetlabs.com
[47] youtube.com
[45] helpnetsecurity.com
[44] ow.ly

Top Domains in Tweet in G1:
[16] linkedin.com
[9] twinybots.ch
[8] co.uk
[6] helpnetsecurity.com
[6] twitter.com
[5] com.au
[4] reddit.com
[4] youtube.com
[4] iotworldtoday.com
[4] threatpost.com

Top Domains in Tweet in G2:
[23] twitter.com
[23] bit.ly
[18] darkreading.com
[16] hubs.ly
[13] linkedin.com
[13] ow.ly
[11] forbes.com
[11] youtube.com
[8] embedthis.com
[7] blogspot.com

Top Domains in Tweet in G4:
[46] forbes.com
[36] packetstormsecurity.com
[16] gov.uk
[16] digitalmunition.me
[12] viruss.eu
[12] harvardbusiness.org
[12] techrepublic.com
[11] google.com
[10] nationalcybersecurity.com
[9] bleepingcomputer.com

Top Domains in Tweet in G5:
[28] linkedin.com
[17] peerlyst.com
[12] forbes.com
[11] ow.ly
[11] sans.org
[9] bit.ly
[9] turkhackteam.org
[9] twitter.com
[8] com.au
[8] darkreading.com

Top Domains in Tweet in G6:
[34] keepnetlabs.com
[21] linkedin.com
[20] venturebeat.com
[18] ow.ly
[16] helpnetsecurity.com
[15] forbes.com
[15] bit.ly
[13] youtube.com
[12] informationsecuritybuzz.com
[12] hackers-arise.com

Top Domains in Tweet in G7:
[4] thehackernews.com
[2] siliconangle.com
[2] org.au
[2] gov.uk
[1] govtech.com
[1] businesswire.com
[1] dvidshub.net
[1] com.sg
[1] bit.ly
[1] hackthebox.eu

Top Domains in Tweet in G8:
[1] stpinext.in
[1] cryptonewsz.com
[1] analyticsindiamag.com

Top Domains in Tweet in G9:
[3] buff.ly
[3] atos.net
[3] iiot-world.com
[3] bit.ly
[2] runsafesecurity.com
[2] apple.news
[1] rti.com
[1] ndtv.com
[1] deloitte.com
[1] trendmicro.com

Top Domains in Tweet in G10:
[25] bing.com
[15] dlvr.it
[9] twib.in
[6] postbeyond.com
[6] essentials.news
[5] helpnetsecurity.com
[3] bit.ly
[3] eccouncil.org
[3] faveeo.com
[3] feedburner.com

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[2650] cybersecurity
[642] infosec
[479] security
[286] ai
[251] coronavirus
[249] hackers
[233] malware
[227] ransomware
[218] iot
[201] privacy



Top Hashtags in Tweet in G1:
[104] cybersecurity
[28] security
[11] hacking
[9] infosec
[8] covid19
[7] technology
[6] internetofthings
[6] iot
[6] coronavirus
[4] malware

Top Hashtags in Tweet in G2:
[679] cybersecurity
[121] infosec
[91] security
[67] coronavirus
[67] covid19
[40] privacy
[38] iot
[38] ransomware
[30] malware
[28] hackers

Top Hashtags in Tweet in G4:
[436] cybersecurity
[133] infosec
[127] ai
[109] digital
[94] hackers
[76] malware
[75] machinelearning
[70] iot
[61] coronavirus
[60] security

Top Hashtags in Tweet in G5:
[503] cybersecurity
[111] security
[86] infosec
[48] cyber
[46] malware
[46] ai
[39] coronavirus
[38] covid19
[33] iot
[29] hacking

Top Hashtags in Tweet in G6:
[580] cybersecurity
[232] infosec
[124] security
[114] ransomware
[70] malware
[56] ai
[56] cisos
[55] coronavirus
[51] cybercrime
[49] privacy

Top Hashtags in Tweet in G7:
[117] microsoft
[12] cybersecurity
[9] hackthebox
[8] hacking
[7] startingpoint
[2] infosec
[2] htb
[2] cybersecuritytraining
[2] cyberdigest
[1] databreach

Top Hashtags in Tweet in G8:
[62] blockchain
[4] ai
[1] stpiimage
[1] cybersecurity
[1] stpicoes
[1] stpiindia
[1] stpiincubation
[1] growwithstpi

Top Hashtags in Tweet in G9:
[24] cybersecurity
[6] letstalkthreats
[4] iot
[4] dataprotection
[3] cloudcomputing
[3] hackers
[3] who
[3] iotworld
[2] iiot
[2] ai

Top Hashtags in Tweet in G10:
[30] cybersecurity
[4] careeropportunities
[4] infosec
[4] wfh
[3] eccouncil
[3] coronavirus
[2] iot
[2] covidactnow
[2] itnation
[2] bigdata

Top Words
Top Words in Tweet in Entire Graph:
[2790] Words in Sentiment List#1: Positive
[4041] Words in Sentiment List#2: Negative
[8] Words in Sentiment List#3: Angry/Violent
[116922] Non-categorized Words
[123753] Total Words
[2650] #cybersecurity
[1443] telegram
[840] security
[811] using
[787] digital

Top Words in Tweet in G1:
[600] telegram
[308] digital
[305] using
[302] app
[301] mass
[301] sex
[301] happening
[301] south
[301] korea
[300] sdssben

Top Words in Tweet in G2:
[679] #cybersecurity
[129] security
[121] #infosec
[100] cyber
[91] #security
[88] more
[68] #coronavirus
[67] #covid19
[65] data
[55] cybersecurity

Top Words in Tweet in G3:
[840] telegram
[420] nth
[420] room
[420] refers
[420] mass
[420] digital
[420] sex
[420] abuse
[420] happening
[420] south

Top Words in Tweet in G4:
[436] #cybersecurity
[193] gt
[133] #infosec
[127] #ai
[109] #digital
[109] reach2ratan
[100] security
[94] #hackers
[76] #malware
[75] #machinelearning

Top Words in Tweet in G5:
[503] #cybersecurity
[145] security
[135] cyber
[111] #security
[86] #infosec
[69] 2020
[68] more
[57] cybersecurity
[56] data
[53] #cyber

Top Words in Tweet in G6:
[580] #cybersecurity
[233] #infosec
[124] #security
[114] #ransomware
[91] security
[86] risksense
[70] #malware
[69] cybersecurity
[69] data
[67] 2020

Top Words in Tweet in G7:
[120] 10
[118] thehackersnews
[117] warning
[117] versions
[117] #microsoft
[117] windows
[117] server
[117] 2008
[117] 2012
[117] 2016

Top Words in Tweet in G8:
[67] cybersecurity
[65] warrant
[63] enterprises
[63] data
[62] #blockchain
[62] providing
[62] decentralizsed
[62] storage
[62] solutions
[62] keeping

Top Words in Tweet in G9:
[26] antgrasso
[24] #cybersecurity
[24] security
[14] cyber
[13] more
[12] connected
[11] risk
[11] landscape
[10] hyper
[10] society

Top Words in Tweet in G10:
[51] infosechotspot
[40] security
[31] cyber
[30] #cybersecurity
[27] cybersecurity
[21] time
[20] computer
[19] world
[18] around
[15] women

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[720] nth,room
[720] room,refers
[720] refers,mass
[720] mass,digital
[720] digital,sex
[720] sex,abuse
[720] abuse,happening
[720] happening,south
[720] south,korea
[720] korea,using

Top Word Pairs in Tweet in G1:
[300] sdssben,nth
[300] nth,room
[300] room,refers
[300] refers,mass
[300] mass,digital
[300] digital,sex
[300] sex,abuse
[300] abuse,happening
[300] happening,south
[300] south,korea

Top Word Pairs in Tweet in G2:
[52] covid,19
[37] #cybersecurity,#infosec
[30] #infosec,#cybersecurity
[22] working,home
[20] cyber,security
[18] #cybersecurity,#security
[18] taking,advantage
[18] learn,more
[14] gt,gt
[14] #cybersecurity,#privacy

Top Word Pairs in Tweet in G3:
[420] nth,room
[420] room,refers
[420] refers,mass
[420] mass,digital
[420] digital,sex
[420] sex,abuse
[420] abuse,happening
[420] happening,south
[420] south,korea
[420] korea,using

Top Word Pairs in Tweet in G4:
[126] gt,gt
[89] #cybersecurity,#digital
[75] #digital,#hackers
[51] #hackers,#infosec
[37] covid,19
[37] #infosec,reach2ratan
[37] reach2ratan,#ai
[37] #ai,#ml
[32] #infosec,#cybersecurity
[31] #ml,#malware

Top Word Pairs in Tweet in G5:
[59] cyber,security
[35] covid,19
[34] #cyber,#security
[24] sample,submitted
[24] submitted,2020
[24] 2020,03
[21] #cybersecurity,#security
[21] #malware,#cyber
[20] dionaea,honeypot
[20] honeypot,protocol

Top Word Pairs in Tweet in G6:
[57] #cybersecurity,#infosec
[51] #cybersecurity,#cisos
[47] #infosec,#cybersecurity
[33] #ransomware,#malware
[26] #security,#cybersecurity
[24] #cybersecurity,#digital
[24] #cisos,#ransomware
[22] #infosec,#ransomware
[21] #digital,#hackers
[19] #information,#infosec

Top Word Pairs in Tweet in G7:
[117] warning,versions
[117] versions,#microsoft
[117] #microsoft,windows
[117] windows,10
[117] 10,server
[117] server,2008
[117] 2008,2012
[117] 2012,2016
[117] 2016,2019
[117] 2019,operating

Top Word Pairs in Tweet in G8:
[62] #blockchain,warrant
[62] warrant,cybersecurity
[62] cybersecurity,enterprises
[62] enterprises,providing
[62] providing,decentralizsed
[62] decentralizsed,storage
[62] storage,solutions
[62] solutions,keeping
[62] keeping,data
[61] omkar_raii,#blockchain

Top Word Pairs in Tweet in G9:
[10] hyper,connected
[10] connected,society
[10] society,2022
[10] 2022,drastically
[10] drastically,impact
[10] impact,risk
[10] risk,security
[10] security,landscape
[10] landscape,demand
[9] antgrasso,hyper

Top Word Pairs in Tweet in G10:
[24] cyber,security
[18] around,world
[15] york,based
[15] based,computer
[15] computer,hacker
[15] hacker,harri
[15] harri,hursti
[15] hursti,traveled
[15] traveled,around
[15] world,expose

Top Replied-To
Top Replied-To in Entire Graph:
@gurucul
@cyberdefensemag
@wired
@iarm_info
@iarchbackss
@cyber__observer
@cloudnativefdn
@lnttechservices
@senatemajldr
@hackingdave

Top Replied-To in G2:
@cloudnativefdn
@cyber__observer
@lnttechservices
@senatemajldr
@hackingdave
@direct_defense
@fortifydata
@binanceamerica
@nistcyber

Top Replied-To in G3:
@mdhhshrddn

Top Replied-To in G4:
@shirastweet

Top Replied-To in G5:
@iarm_info
@joerogan
@gelossnake
@new_narrative
@acfou
@thekinghamilton

Top Replied-To in G6:
@gurucul
@wired
@cyberdefensemag
@thehackersnews
@entrepreneur
@aneeshnair
@sbingner

Top Replied-To in G9:
@antgrasso

Top Mentioned
Top Mentioned in Entire Graph:
@tala_606
@reach2ratan
@thehackersnews
@risksense
@omkar_raii
@cioamaro
@fisher85m
@infosechotspot
@keepnetlabs

Top Mentioned in G1:

Top Mentioned in G2:
@kaspersky
@official_tht
@fisher85m
@makerdemy
@fabriziobustama
@netsecu
@infosecuritymag
@reach2ratan
@wired
@davidjoberly

Top Mentioned in G3:
@tala_606

Top Mentioned in G4:
@reach2ratan
@forbes
@cioamaro
@mikequindazzi
@avrohomg
@fabriziobustama
@cybersecboardrm
@thomas_harrer
@makerdemy
@mclynd

Top Mentioned in G5:
@official_tht
@peerlyst
@thecybermentor
@_100daysofcode
@100xcode
@risksense
@newbiecodermel
@reach2ratan
@kaspersky
@blackberry

Top Mentioned in G6:
@risksense
@keepnetlabs
@fisher85m
@reach2ratan
@noikeanolife
@venturebeat
@gurucul
@kaspersky
@bamitav
@cioonline

Top Mentioned in G7:
@thehackersnews
@hackthebox_eu
@sec_cyber
@insiderphd
@gaimbrodtmann
@ncsc
@shapesecurity
@pursell_ashley
@aspi_icpc
@reuters

Top Mentioned in G8:
@omkar_raii
@stpiindia

Top Mentioned in G9:
@antgrasso
@trendmicro
@atos
@iiot_world
@connectck
@geekflarehq
@sheyllabs
@qnx_news
@runsafesecurity
@fisher85m

Top Mentioned in G10:
@infosechotspot
@eccouncil
@cybersecuritysf
@stopmalvertisin
@reach2ratan
@websecmaven
@patrickcmiller
@vladobotsvadze
@sectest9
@cybercx

Top Tweeters
Top Tweeters in Entire Graph:
@sectest9
@detikcom
@threeuksupport
@engineersday
@cyberdomain
@chidambara09
@mijita212
@cherokeesher2
@evankirstel
@webironbots

Top Tweeters in G1:
@engineersday
@joni_looking
@sustalrene
@masqcrew
@stanleysuen
@empyrealsehun
@liewkongyee
@namminjoongi
@dayswithsharmin
@chelsinicoleeee

Top Tweeters in G2:
@webironbots
@cybersec_feeds
@rvp
@suekhi
@slate
@saint_stephan
@tatzanx
@usatoday
@inc
@nbcnews

Top Tweeters in G3:
@aquariusjm
@whatkimchi
@haeyeogihere
@jiminohsosmol
@balquiche
@frosted_326
@brightestarss
@aqua_sprite
@hotxydo
@jonginerigoms

Top Tweeters in G4:
@cyberdomain
@chidambara09
@evankirstel
@sudeepkhatri
@evanderburg
@calcaware
@kcs39194
@marshacollier
@nmugai
@nicochan33

Top Tweeters in G5:
@threeuksupport
@fntna
@new_narrative
@netsecu
@femtech_
@trippbraden
@andrewmorrisuk
@taieb_bot
@100xcode
@xaelbot

Top Tweeters in G6:
@sectest9
@aaroncuddeback
@ottlegalrebels
@santchiweb
@fintechna
@ani
@538355
@marketwatch
@grattonboy
@tele13_radio

Top Tweeters in G7:
@reuters
@adekleine
@omi_082
@lenautilus
@sec_cyber
@t_winding
@drbuttocks
@cybersecdn
@stmanfr
@wagimaru

Top Tweeters in G8:
@stpiindia
@rahulssg
@venkatstpi
@manjupm1987
@stpibengaluru
@marutiece
@jitenstpi
@omkar_raii
@nmanjun46628216
@jeets001

Top Tweeters in G9:
@techjunkiejh
@mahermahert
@mig30m6
@dariosailor86
@albertan48
@ccprakay
@techreview
@douggrajczyk
@nightowlsgs9
@kittygatty

Top Tweeters in G10:
@it_securitynews
@beccanalia
@awiselatina
@wilfredosantand
@silentseawolf
@acertijo
@maperez324
@juliacsk
@stopmalvertisin
@esneet4113