NodeXL Graph Gallery: Interactive Graph


Donate to the Social Media Research Foundation's NodeXL development fund

infosec_2019-04-15_00-00-02.xlsx (experimental version)
NOTE: This version of the graph is not available with the browser you are using. A more recent version of the browser is required.
Zoom in Zoom out Reset the graph
Go to the graph's main page

From:
NodeXLExcelAutomator
Uploaded on:
April 15, 2019
Short Description:
infosec via NodeXL http://bit.ly/2UYCYxY
@sectest9
@evacide
@reach2ratan
@fisher85m
@uscert_gov
@rfidgroup
@ptracesecurity
@mirko_ross
@paula_piccard
@appsecbloke

Top hashtags:
#infosec
#cybersecurity
#security
#hacker
#cyberwarfare
#cyber
#iot
#malware
#hackers

Description:
Description
The graph represents a network of 3,478 Twitter users whose tweets in the requested range contained "infosec", or who were replied to or mentioned in those tweets. The network was obtained from the NodeXL Graph Server on Monday, 15 April 2019 at 07:01 UTC.

The requested start date was Sunday, 14 April 2019 at 00:01 UTC and the maximum number of days (going backward) was 14.

The maximum number of tweets collected was 5,000.

The tweets in the network were tweeted over the 1-day, 10-hour, 58-minute period from Friday, 12 April 2019 at 13:02 UTC to Sunday, 14 April 2019 at 00:01 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 3478
Unique Edges : 4017
Edges With Duplicates : 3619
Total Edges : 7636
Number of Edge Types : 3
Replies to : 254
Mentions : 5004
Tweet : 2378
Self-Loops : 2378
Reciprocated Vertex Pair Ratio : 0.0240834894300241
Reciprocated Edge Ratio : 0.0470342304677293
Connected Components : 742
Single-Vertex Connected Components : 382
Maximum Vertices in a Connected Component : 1827
Maximum Edges in a Connected Component : 5452
Maximum Geodesic Distance (Diameter) : 16
Average Geodesic Distance : 5.411356
Graph Density : 0.000316463913108122
Modularity : 0.503512
NodeXL Version : 1.0.1.410

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[39] https://go.usa.gov/xm4Nn
[29] https://go.usa.gov/xm4F4
[22] https://go.usa.gov/xm4Q8
[19] http://securenetworkmanagement.com/recon-ng-tutorial-part-1/
[19] http://securenetworkmanagement.com/recon-ng-tutorial-part-2/
[17] https://searchsecurity.techtarget.com/tip/Top-5-reasons-for-a-zero-trust-approach-to-network-security
[16] https://vpnpro.com/blog/how-to-protect-personal-information-online/?utm_campaign=9%20Ways%20to%20Protect%20Personal%20Information%20Online%20%7C%20VPNpro&utm_medium=ContentAmp&utm_source=twitter
[15] https://www.analyticsvidhya.com/blog/2019/01/comprehensive-learning-path-deep-learning-2019/
[14] https://techcrunch.com/2019/04/12/police-data-hack/
[14] https://xlab.tencent.com/en/2019/03/18/ghidra-from-xxe-to-rce/

Top URLs in Tweet in G1:
[5] https://phishstats.info/
[4] https://www.hackread.com/nasty-android-ios-malware-found-using-govt-surveillance-tech/
[3] https://go.usa.gov/xm4Nn
[3] http://Matrix.org
[3] https://www.youtube.com/watch?v=ik3C5vF3HBc

[2] https://packetstormsecurity.com/files/152491
[2] https://go.usa.gov/xm4Q8
[2] https://krebsonsecurity.com/2019/04/android-7-0-phones-can-now-double-as-google-security-keys/
[2] https://twitter.com/aneeshnair/status/1116560582549753856
[2] https://www.lastline.com/blog/how-machine-learning-for-cybersecurity-can-thwart-insider-threats/?twitter=@aneeshnair

Top URLs in Tweet in G2:
[13] http://open-sez.me
[11] https://packetstormsecurity.com/news/view/30027/Internet-Archive-Denies-Hosting-Terrorist-Content.html
[9] http://www.virusmalware.net/security/android-phones-transformed-into-anti-phishing-security-tokens/
[9] https://www.techrepublic.com/article/sql-injection-attacks-a-cheat-sheet-for-business-pros/#ftag=RSS56d97e7
[9] https://twitter.com/aneeshnair/status/1116560582549753856
[8] https://www.techrepublic.com/article/how-to-block-ssh-attacks-on-linux-with-denyhosts/#ftag=RSS56d97e7
[8] https://www.lastline.com/blog/how-machine-learning-for-cybersecurity-can-thwart-insider-threats/?twitter=@aneeshnair
[7] https://securityaffairs.co/wordpress/83514/malware/planetary-ransomware-decryptor.html
[7] https://securityaffairs.co/wordpress/83711/digital-id/vpn-security-flaws.html
[7] https://packetstormsecurity.com/news/view/29997/Games-Of-Thrones-Has-The-Most-Malware-Of-Any-Pirated-TV-Show.html

Top URLs in Tweet in G3:
[11] https://www.analyticsvidhya.com/blog/2019/01/comprehensive-learning-path-deep-learning-2019/
[7] https://onezero.medium.com/the-internets-phone-book-is-broken-9fcdd6ca726b
[6] https://www.raconteur.net/infographics/wearable-healthcare-tech
[4] https://www.csoonline.com/article/3293445/security/how-pervasive-is-the-insider-threat-in-your-company.html
[4] https://www.lastline.com/?p=8280
[3] https://twi.li/vwO5VI
[3] https://www.csoonline.com/article/3293002/deepfake-videos-how-and-why-they-work.html
[2] https://ptp-shiptracker.herokuapp.com/
[2] https://blog.ptsecurity.com/2019/03/how-not-to-help-hackers-4-common.html
[2] https://www.techrepublic.com/article/how-sephora-is-leveraging-ar-and-ai-to-transform-retail-and-help-customers-buy-cosmetics/

Top URLs in Tweet in G4:
[1] https://twitter.com/i/web/status/1116779544277426177
[1] https://twitter.com/i/web/status/1117202520755986432
[1] https://twitter.com/i/web/status/1116806056410095618
[1] https://twitter.com/i/web/status/1116806030740955136
[1] https://twitter.com/i/web/status/1116974797974466560
[1] https://twitter.com/i/web/status/1116907557833068544
[1] https://twitter.com/i/web/status/1116843696425558016
[1] https://twitter.com/i/web/status/1116839945094737920
[1] https://www.oneplus.com/
[1] https://twitter.com/i/web/status/1116822831541686274

Top URLs in Tweet in G5:
[5] https://securelist.com/large-scale-sim-swap-fraud/90353/
[4] https://www.zdnet.com/article/noscript-extension-officially-released-for-google-chrome/
[2] https://medium.com/@john.opdenakker/dont-leak-sensitive-data-via-security-scanning-tools-7d1f715f0486
[2] https://hackle.dev/
[1] https://gbusinessinsight.com/2018/03/12/thousands-flood-to-invest-in-worlds-first-whisky-cryptocurrency/
[1] https://twitter.com/i/web/status/1116743542230147073
[1] https://twitter.com/i/web/status/1116877239830896641
[1] https://twitter.com/i/web/status/1116762684324814848
[1] https://twitter.com/i/web/status/1116637206511276033
[1] https://twitter.com/i/web/status/1116640515695489026

Top URLs in Tweet in G6:
[18] http://securenetworkmanagement.com/recon-ng-tutorial-part-1/
[18] http://securenetworkmanagement.com/recon-ng-tutorial-part-2/
[7] https://redcanary.com/blog/lateral-movement-winrm-wmi/
[6] https://www.kitploit.com/
[2] https://github.com/almandin/fuxploider
[2] https://hansesecure.de/backdooring-pe-file-with-aslr/
[2] http://newsography.com
[2] https://www.darkreading.com/
[2] https://www.hackread.com/
[2] https://www.undernews.fr/

Top URLs in Tweet in G7:
[35] https://go.usa.gov/xm4Nn
[29] https://go.usa.gov/xm4F4
[18] https://go.usa.gov/xm4Q8
[9] https://go.usa.gov/xmg6t
[4] https://securityaffairs.co/wordpress/83653/hacking/wpa3-security-flaws.html
[2] https://go.usa.gov/xmg3m
[2] https://www.redeszone.net/2019/04/12/senales-intrusos-wifi-como-evitarlo/?platform=hootsuite
[2] https://www.us-cert.gov/ncas/analysis-reports/AR19-100A?platform=hootsuite
[2] https://www.bleepingcomputer.com/news/security/home-office-leaks-the-emails-of-hundreds-of-eu-citizens/
[2] https://www.bleepingcomputer.com/news/security/threat-group-uses-pastebin-github-in-sneakypastes-operation/

Top URLs in Tweet in G8:
[1] https://twitter.com/i/web/status/1116916002158260225

Top URLs in Tweet in G9:
[2] https://josephsteinberg.com/five-backup-disasters-to-avoid/
[2] https://www.pcmag.com/news/367705/symantec-2-out-of-3-hotels-leak-your-personal-details
[2] https://www.zdnet.com/article/internet-explorer-zero-day-lets-hackers-steal-files-from-windows-pcs/
[1] https://twitter.com/i/web/status/1116422463120920576
[1] https://twitter.com/i/web/status/1116434747591282688
[1] https://twitter.com/i/web/status/1116816775880921088
[1] https://twitter.com/i/web/status/1115974110234935297
[1] https://www.schneier.com/blog/archives/2019/04/tajmahal_spywar.html
[1] https://twitter.com/i/web/status/1116556298336624640
[1] https://twitter.com/i/web/status/1117006671262433280

Top URLs in Tweet in G10:
[9] https://www.activeresponse.org/chronic-stress-and-a-life-how-stress-almost-killed-me/
[5] https://www.activeresponse.org/chronic-stress-and-a-life-how-stress-almost-killed-me/?utm_campaign=twitter&utm_medium=twitter&utm_source=twitter
[3] https://cfptime.org/734/
[2] https://pulsedive.com/
[2] https://www.zdnet.com/article/microsoft-discloses-security-breach-impacting-some-outlook-accounts/#ftag=RSSbaffb68
[2] https://twitter.com/swodinsky/status/1116763906716966912
[2] https://arstechnica.com/information-technology/2019/03/attackers-are-actively-exploiting-a-serious-windows-zeroday-in-the-wild/
[2] https://www.webroot.com/blog/2019/04/12/cyber-news-rundown-tax-extortion-ransomware-scams-corporations/
[2] https://techcrunch.com/2019/03/06/homeland-security-election-infrastructure/
[1] https://justdevops.org

Top Domains
Top Domains in Tweet in Entire Graph:
[1372] twitter.com
[207] tobem.com
[201] paper.li
[103] usa.gov
[93] packetstormsecurity.com
[88] feedburner.com
[71] securityaffairs.co
[65] techrepublic.com
[57] pastebeen.com
[53] google.com

Top Domains in Tweet in G1:
[426] twitter.com
[57] pastebeen.com
[35] paper.li
[16] securityaffairs.co
[15] webiron.com
[10] zdnet.com
[9] youtube.com
[8] threatpost.com
[8] bankinfosecurity.com
[8] tenable.com

Top Domains in Tweet in G2:
[294] twitter.com
[205] tobem.com
[86] feedburner.com
[64] packetstormsecurity.com
[50] techrepublic.com
[48] google.com
[42] securityaffairs.co
[37] viruss.eu
[33] hakin9.org
[30] peerlyst.com

Top Domains in Tweet in G3:
[62] twitter.com
[11] analyticsvidhya.com
[10] csoonline.com
[10] packetstormsecurity.com
[7] medium.com
[6] raconteur.net
[4] twi.li
[4] techrepublic.com
[4] lastline.com
[3] threatpost.com

Top Domains in Tweet in G4:
[12] twitter.com
[1] oneplus.com

Top Domains in Tweet in G5:
[13] twitter.com
[6] zdnet.com
[5] securelist.com
[2] medium.com
[2] hackle.dev
[1] gbusinessinsight.com
[1] solutionsreview.com
[1] usa.gov
[1] discordapp.com
[1] forbes.com

Top Domains in Tweet in G6:
[37] securenetworkmanagement.com
[22] twitter.com
[9] darkreading.com
[7] redcanary.com
[6] kitploit.com
[4] threatpost.com
[2] github.com
[2] hansesecure.de
[2] newsography.com
[2] hackread.com

Top Domains in Tweet in G7:
[93] usa.gov
[18] twitter.com
[4] bleepingcomputer.com
[4] securityaffairs.co
[3] lazarusalliance.com
[2] redeszone.net
[2] us-cert.gov
[2] helpnetsecurity.com
[1] zdnet.com
[1] europa.eu

Top Domains in Tweet in G8:
[1] twitter.com

Top Domains in Tweet in G9:
[7] twitter.com
[2] josephsteinberg.com
[2] pcmag.com
[2] zdnet.com
[1] schneier.com

Top Domains in Tweet in G10:
[32] twitter.com
[14] activeresponse.org
[9] pulsedive.com
[6] cfptime.org
[5] paper.li
[2] reddit.com
[2] zdnet.com
[2] nuharborsecurity.com
[2] arstechnica.com
[2] webroot.com

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[3222] infosec
[1956] cybersecurity
[614] security
[357] hacker
[335] cyberwarfare
[307] cyber
[219] iot
[215] malware
[155] hackers
[151] tech



Top Hashtags in Tweet in G1:
[332] infosec
[245] cybersecurity
[43] security
[33] databreach
[30] hacking
[29] breach
[27] leak
[20] technology
[18] itsecurity
[16] tech

Top Hashtags in Tweet in G2:
[1141] infosec
[594] cybersecurity
[331] hacker
[323] security
[288] cyberwarfare
[139] cyber
[104] tech
[101] malware
[85] hackers
[78] databreach

Top Hashtags in Tweet in G3:
[250] infosec
[243] cybersecurity
[73] security
[62] iot
[46] ai
[45] machinelearning
[43] bigdata
[41] malware
[41] cybercrime
[41] ransomware

Top Hashtags in Tweet in G4:
[16] infosec
[2] sfissaconf2019
[2] keynote
[2] lunch
[2] sfissa
[2] sfissaconf
[1] soc
[1] ciso
[1] security
[1] cybersecurity

Top Hashtags in Tweet in G5:
[50] infosec
[42] cybersecurity
[7] ff
[4] googlechrome
[3] security
[2] ditchcyber
[2] osint
[2] privacy
[2] cyber
[2] infographic

Top Hashtags in Tweet in G6:
[87] infosec
[32] cybersecurity
[25] pentest
[19] redteam
[12] toussecnum
[11] security
[8] hephaestus
[7] honeypot
[7] dionaea
[7] zeroday

Top Hashtags in Tweet in G7:
[132] infosec
[111] cybersecurity
[93] cyber
[6] malware
[6] hackers
[6] infographic
[5] wifi
[4] privacy
[4] wpa3
[4] attacks

Top Hashtags in Tweet in G8:
[1] anotherlevel
[1] infosec
[1] badusb
[1] usbninja

Top Hashtags in Tweet in G9:
[76] infosec
[75] cybersecurity
[70] iot
[66] 3dprinting
[3] ddos
[3] ioe
[3] m2m
[3] tech
[3] hacking
[3] bigdata

Top Hashtags in Tweet in G10:
[53] infosec
[44] cybersecurity
[9] stress
[9] mentalhealth
[9] chronicstress
[9] anxiety
[7] threatintel
[7] malware
[6] cfp
[5] ciso

Top Words
Top Words in Tweet in Entire Graph:
[2214] Words in Sentiment List#1: Positive
[2528] Words in Sentiment List#2: Negative
[15] Words in Sentiment List#3: Angry/Violent
[86675] Non-categorized Words
[91417] Total Words
[3227] #infosec
[1957] #cybersecurity
[721] security
[614] #security
[519] infosec

Top Words in Tweet in G1:
[332] #infosec
[245] #cybersecurity
[75] emails
[72] security
[68] infosec
[58] dump
[58] paste
[58] id
[52] passwords
[43] #security

Top Words in Tweet in G2:
[1142] #infosec
[594] #cybersecurity
[357] reach2ratan
[331] #hacker
[323] #security
[288] #cyberwarfare
[195] security
[141] #cyber
[104] #tech
[102] s

Top Words in Tweet in G3:
[250] #infosec
[243] #cybersecurity
[140] fisher85m
[98] infographic
[73] #security
[62] #iot
[46] #ai
[45] #machinelearning
[43] #bigdata
[42] history

Top Words in Tweet in G4:
[144] infosec
[139] evacide
[138] women
[137] things
[137] better
[136] getting
[135] man
[135] surely
[135] nope
[134] woman

Top Words in Tweet in G5:
[67] bentleyaudrey
[61] j_opdenakker
[61] ian_infosec
[61] fabriziobustama
[59] whitehatscum
[59] rotate26chars
[57] seanwrightsec
[54] jdelacruz_iot
[53] #infosec
[53] notameadow

Top Words in Tweet in G6:
[87] #infosec
[59] hansesecure
[49] part
[33] 2
[32] security
[32] #cybersecurity
[28] infosec
[28] s
[28] check
[27] dog

Top Words in Tweet in G7:
[132] #infosec
[111] #cybersecurity
[93] #cyber
[90] uscert_gov
[66] multiple
[36] applications
[35] vulnerability
[35] vpn
[29] vulnerabilities
[29] wpa3

Top Words in Tweet in G8:
[74] someone
[74] told
[74] making
[74] usbninja
[74] type
[74] socket
[74] crazy
[74] enough
[74] ble
[74] hall

Top Words in Tweet in G9:
[76] #infosec
[75] #cybersecurity
[71] paula_piccard
[70] #iot
[68] someone
[68] used
[68] 3d
[68] printer
[68] spoof
[68] fingerprint

Top Words in Tweet in G10:
[53] #infosec
[44] #cybersecurity
[20] cnoanalysis
[19] 2019
[19] stress
[18] 04
[14] killed
[13] new
[12] submit
[12] seen

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[764] #cybersecurity,#infosec
[360] #infosec,#security
[294] #cyberwarfare,#infosec
[289] #cybersecurity,#hacker
[274] #hacker,#infosec
[228] #infosec,#cybersecurity
[142] women,infosec
[140] things,getting
[140] getting,better
[139] man,surely

Top Word Pairs in Tweet in G1:
[78] #cybersecurity,#infosec
[58] emails,paste
[58] paste,id
[56] #infosec,#cybersecurity
[48] passwords,emails
[29] #cybersecurity,#databreach
[29] #databreach,#infosec
[27] #infosec,#leak
[27] #leak,#breach
[21] r,t

Top Word Pairs in Tweet in G2:
[287] #cyberwarfare,#infosec
[273] #cybersecurity,#hacker
[268] #infosec,#security
[255] #hacker,#infosec
[127] #security,#cyber
[94] #cybersecurity,#infosec
[81] #cyber,#tech
[58] #tech,#gdpr
[47] cybertoolsbooks,#cyberwarfare
[46] cheat,sheet

Top Word Pairs in Tweet in G3:
[91] #cybersecurity,#infosec
[74] infographic,#cybersecurity
[40] history,#cyberwarfare
[40] #cybersecurity,#cybercrime
[40] #cybercrime,#firewall
[40] #firewall,#hackers
[40] #hackers,#ransomware
[37] #infosec,#malware
[37] #ransomware,#infosec
[36] #cyberwarfare,infographic

Top Word Pairs in Tweet in G4:
[136] things,getting
[136] getting,better
[136] women,infosec
[135] man,surely
[135] surely,things
[135] better,women
[135] infosec,nope
[134] nope,woman
[134] woman,dinner
[134] dinner,table

Top Word Pairs in Tweet in G5:
[54] rotate26chars,ian_infosec
[51] fabriziobustama,j_opdenakker
[51] j_opdenakker,rotate26chars
[48] ian_infosec,digitalcloudgal
[48] digitalcloudgal,seanwrightsec
[48] seanwrightsec,johnmaynardcpa
[48] johnmaynardcpa,m49d4ch3lly
[48] m49d4ch3lly,notameadow
[48] notameadow,jdelacruz_iot
[36] #cybersecurity,#infosec

Top Word Pairs in Tweet in G6:
[29] part,2
[28] #cybersecurity,#infosec
[27] dog,whisperer
[27] whisperer,s
[27] s,handbook
[27] handbook,doing
[27] doing,ad
[27] ad,security
[27] security,blue
[27] blue,red

Top Word Pairs in Tweet in G7:
[94] #cybersecurity,#infosec
[93] #cyber,#cybersecurity
[35] vulnerability,multiple
[35] multiple,vpn
[35] vpn,applications
[35] applications,#cyber
[34] uscert_gov,vulnerability
[29] multiple,vulnerabilities
[29] vulnerabilities,wpa3
[29] wpa3,protocol

Top Word Pairs in Tweet in G8:
[74] someone,told
[74] told,making
[74] making,usbninja
[74] usbninja,type
[74] type,socket
[74] socket,crazy
[74] crazy,enough
[74] enough,ble
[74] ble,hall
[74] hall,sensor

Top Word Pairs in Tweet in G9:
[69] #cybersecurity,#infosec
[68] someone,used
[68] used,3d
[68] 3d,printer
[68] printer,spoof
[68] spoof,fingerprint
[68] fingerprint,sensor
[68] sensor,galaxy
[68] galaxy,s10
[67] paula_piccard,someone

Top Word Pairs in Tweet in G10:
[25] #infosec,#cybersecurity
[18] 2019,04
[14] stress,killed
[9] #cybersecurity,#infosec
[9] new,blog
[9] blog,stress
[9] killed,#stress
[9] #stress,#mentalhealth
[9] #mentalhealth,#chronicstress
[9] #chronicstress,#anxiety

Top Replied-To
Top Replied-To in Entire Graph:
@whitehatscum
@alaricaloor
@ravici
@evacide
@rohk_infosec
@bentleyaudrey
@ian_infosec
@tyrejim
@nerdpyle
@infosecredpanda

Top Replied-To in G2:
@swarupnanda

Top Replied-To in G4:
@evacide
@alexaguiarpoa
@chican3ry
@zmingyu
@beccanalia
@djk3yg3n

Top Replied-To in G5:
@whitehatscum
@alaricaloor
@ravici
@bentleyaudrey
@infosecredpanda
@someinfosecguy
@rotate26chars
@nerdpyle
@pry0cc
@notameadow

Top Replied-To in G6:
@rayredacted
@badassbowden

Top Replied-To in G10:
@infosec_samurai
@c011atz
@thevega

Top Mentioned
Top Mentioned in Entire Graph:
@reach2ratan
@evacide
@fisher85m
@uscert_gov
@ian_infosec
@rfidgroup
@paula_piccard
@j_opdenakker
@hansesecure
@bentleyaudrey

Top Mentioned in G1:
@markquinn_vo
@cryptofrieza
@skip7547
@gtpintado

Top Mentioned in G2:
@reach2ratan
@cybertoolsbooks
@affinitystrtgcs
@gopalsamy_
@bamitav
@threatpost
@hakin9
@fernandohuamanx
@uscybermag
@cloudexpo

Top Mentioned in G3:
@fisher85m
@rpuettner
@antgrasso
@mirko_ross
@ipfconline1
@observatore2
@agoeskoes
@cybersecboardrm
@analyti
@mikequindazzi

Top Mentioned in G4:
@evacide
@zmingyu
@daveaitel
@bradsmi
@marasawr
@signature_grand
@eduardoleite_
@tarah
@sfissa

Top Mentioned in G5:
@j_opdenakker
@fabriziobustama
@bentleyaudrey
@ian_infosec
@seanwrightsec
@rotate26chars
@jdelacruz_iot
@fogle_shane
@notameadow
@digitalcloudgal

Top Mentioned in G6:
@hansesecure
@sadprocessor
@three_cube
@tayatrancends
@digbei
@laughing_mantis
@ydklijnsma
@cyberdian_news
@cyberdian_tools
@evacide

Top Mentioned in G7:
@uscert_gov
@teamcymru
@cioamaro
@claushoumann
@marco_ramilli
@ersincmt
@unamcert
@reach2ratan
@redeszone
@angelhealthtech

Top Mentioned in G8:
@rfidgroup
@qubesos

Top Mentioned in G9:
@paula_piccard
@kimberl87759219
@josephsteinberg
@vernitayountda4
@threatx_inc

Top Mentioned in G10:
@cnoanalysis
@chicagocyber
@cfp_time
@securitytrails
@pulsedive
@euskalhack
@layer8conf
@justdevopsconf
@zdnet
@volk_ncptf

Top Tweeters
Top Tweeters in Entire Graph:
@americanair
@arkangelscrap
@sectest9
@o2
@robre62
@applesupport
@cybertoolsbooks
@deejayiwan
@webironbots
@evankirstel

Top Tweeters in G1:
@webironbots
@aldoceccarelli
@villamizaritpro
@floridarussian
@thestartupper
@hotjobfinder
@gtpintado
@dailyjobupdates
@infopronetwork
@orlandorussian

Top Tweeters in G2:
@sectest9
@cybertoolsbooks
@chidambara09
@it_securitynews
@timesofindia
@aaroncuddeback
@valaafshar
@machinelearnflx
@arichduvet
@baldev_bahl

Top Tweeters in G3:
@arkangelscrap
@deejayiwan
@evankirstel
@gamergeeknews
@startupsbot
@lelkan
@openmarketingtv
@ideagov
@ipfconline1
@stanleyepstein

Top Tweeters in G4:
@jhamby
@arioldo
@ilovaussiesheps
@threadreaderapp
@beccanalia
@femme_mal
@538355
@gert001badger
@maelorin
@skry

Top Tweeters in G5:
@cybertaters
@forbes
@zdnet
@cliffsull
@matthijs85
@mclynd
@zerodaylab
@troyhunt
@campuscodi
@hacks4pancakes

Top Tweeters in G6:
@rdsweb
@_std_
@esherislow
@gardenersantana
@jeffwilsontech
@nikothedove
@ximad
@g33kspeed
@thb_stx
@newsography1

Top Tweeters in G7:
@agedchild003
@adekleine
@unrealallan
@candicelanier
@416ash
@red_shirt_no2
@wulf_bloody
@lynngr
@rval10s
@savagejen

Top Tweeters in G8:
@drizzt__dourden
@hackerfantastic
@f0o0
@singsingarsing
@bison_42
@jmsl
@deepquest
@yrthy
@romaa13
@antoine_leblond

Top Tweeters in G9:
@calcaware
@jrobertson
@paula_piccard
@adscum
@kimberl87759219
@benedicterios
@abhy_mjee
@casimiramoran20
@tinyweb20215958
@louisevanbram10

Top Tweeters in G10:
@edgametec
@fhhknews
@ashot_
@ptreporter
@panthpnk
@enriquereyes
@kyle2umental
@nuharbor
@diocyde
@ciderpunx


We use necessary cookies to make our site work. We’d like to set additional cookies to understand site usage, make site improvements and to remember your settings. We also use cookies set by other sites to help deliver content from their services.