infosec, Twitter, 5/5/2019 7:27:45 AM, 195675


FAQ | Problem?

infosec_2019-05-05_00-00-01.xlsx
infosec_2019-05-05_00-00-01.xlsx
From:
NodeXLExcelAutomator
Uploaded on:
May 05, 2019
Short Description:
infosec via NodeXL http://bit.ly/2VimH84
@sectest9
@isee2it
@hansesecure
@cephalopodluke2
@fisher85m
@j_opdenakker
@guillaume_lpl
@securityxtv
@ian_infosec
@ch33r10

Top hashtags:
#infosec
#cybersecurity
#security
#cyberwarfare
#hacking
#infographic
#iot
#tech
#hacker

Description:
Description
The graph represents a network of 3,519 Twitter users whose tweets in the requested range contained "infosec", or who were replied to or mentioned in those tweets. The network was obtained from the NodeXL Graph Server on Sunday, 05 May 2019 at 07:01 UTC.

The requested start date was Sunday, 05 May 2019 at 00:01 UTC and the maximum number of days (going backward) was 14.

The maximum number of tweets collected was 5,000.

The tweets in the network were tweeted over the 1-day, 3-hour, 13-minute period from Friday, 03 May 2019 at 15:16 UTC to Saturday, 04 May 2019 at 18:29 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 3519
Unique Edges : 4874
Edges With Duplicates : 4738
Total Edges : 9612
Number of Edge Types : 3
Tweet : 2106
Replies to : 534
Mentions : 6972
Self-Loops : 2106
Reciprocated Vertex Pair Ratio : 0.0511106318740565
Reciprocated Edge Ratio : 0.0972507180960197
Connected Components : 655
Single-Vertex Connected Components : 359
Maximum Vertices in a Connected Component : 2197
Maximum Edges in a Connected Component : 8026
Maximum Geodesic Distance (Diameter) : 15
Average Geodesic Distance : 4.951174
Graph Density : 0.000393704540009477
Modularity : 0.457388
NodeXL Version : 1.0.1.412

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[40] https://www.dfir.training/resources/downloads/windows-registry
[34] https://www.uscybersecurity.net/mfa/
[29] https://cyberstartupobservatory.com/
[28] https://www.uscybersecurity.net/cybersecurity-myths/
[21] https://medium.com/m/global-identity?redirectUrl=https%3A%2F%2Fposts.specterops.io%2Flateral-movement-scm-and-dll-hijacking-primer-d2f61e8ab992
[16] https://d4stiny.github.io/Remote-Code-Execution-on-most-Dell-computers/
[15] https://github.com/D4stiny/Dell-Support-Assist-RCE-PoC
[15] http://open-sez.me
[13] https://packetstormsecurity.com/news/view/30118/Hacker-Takes-Over-29-IoT-Botnets.html
[12] https://hackercombat.com/the-5-steps-to-ensure-cloud-security/

Top URLs in Tweet in G1:
[32] https://www.uscybersecurity.net/mfa/
[28] https://cyberstartupobservatory.com/
[24] https://www.uscybersecurity.net/cybersecurity-myths/
[12] https://www.uscybersecurity.net/subscribe/
[11] https://cyberstartupobservatory.com/is-anti-virus-obsolete-5-features-to-seek-in-the-next-generation-anti-virus-whether-youre-an-expert-or-not/
[11] https://hackercombat.com/the-5-steps-to-ensure-cloud-security/
[10] https://cyberstartupobservatory.com/infographics/
[9] https://cyberstartupobservatory.com/infographics-transportation/
[8] https://packetstormsecurity.com/news/view/30118/Hacker-Takes-Over-29-IoT-Botnets.html
[8] https://cyberstartupobservatory.com/foundations-for-a-successful-identity-and-access-management-program/

Top URLs in Tweet in G2:
[15] http://open-sez.me
[4] https://twitter.com/aneeshnair/status/1124170726980947968
[3] https://www.helpnetsecurity.com/2019/05/03/new-infosec-products-of-the-week-may-3-2019/
[3] http://www.sectechno.com/hxd-hex-and-disk-editor/
[3] https://www.youtube.com/watch?v=ik3C5vF3HBc

[3] https://infosecaddicts.com/course/linux-infosec-comptia-linux-exam-prep/
[3] https://www.youtube.com/watch?v=rboIexSMlf8

[2] https://krebsonsecurity.com/2019/05/credit-union-sues-fintech-giant-fiserv-over-security-claims/
[2] https://isaac.io
[2] https://www.whitehouse.gov/presidential-actions/executive-order-americas-cybersecurity-workforce/

Top URLs in Tweet in G3:
[2] https://www.venafi.com/blog/website-downtime-due-expired-certificates-remains-huge-problem
[2] https://www.rsaconference.com/events/ap19/agenda/networking-opportunities?utm_source=facebook&utm_medium=social&utm_content=networking-opportunities&utm_campaign=discountreg-available-text-apj2019
[1] https://twitter.com/skinnerpm/status/1124454775976755201
[1] https://twitter.com/dragosinc/status/1124357779551137794
[1] https://twitter.com/viss/status/1124519277942280198
[1] https://twitter.com/sarahbday/status/1124564554371993602
[1] https://twitter.com/swiftonsecurity/status/1124503344968552448
[1] https://twitter.com/magpie2800/status/1124740956799098883
[1] https://medium.com/swlh/your-network-determines-success-more-than-you-realize-41a3e889ecea
[1] https://twitter.com/sn_mlb/status/1124427484919939072

Top URLs in Tweet in G4:
[1] https://twitter.com/ZephrFish/status/1124464652929437696
[1] http://maddiestone.github.io/AndroidAppRE
[1] https://twitter.com/Renegade0x6/status/1124342546971361280
[1] https://twitter.com/i/web/status/1122969971166994432
[1] https://www.fireeye.com/blog/threat-research/2019/04/carbanak-week-part-one-a-rare-occurrence.html
[1] http://iec56w4ibovnb4wc.onion
[1] http://bit.ly/financephish
[1] https://censys.io/case-study-fireeye-fights-adversaries
[1] https://censys.io/global-perspective
[1] https://www.blackhat.com/us-18/training/automated-defense-using-serverless-for-aws-azure-and-gcp.html

Top URLs in Tweet in G5:
[18] https://medium.com/m/global-identity?redirectUrl=https%3A%2F%2Fposts.specterops.io%2Flateral-movement-scm-and-dll-hijacking-primer-d2f61e8ab992
[11] https://d4stiny.github.io/Remote-Code-Execution-on-most-Dell-computers/
[11] https://github.com/D4stiny/Dell-Support-Assist-RCE-PoC
[8] https://hakin9.org/new-playground-and-cheatsheet-for-learning-python/
[6] https://hakin9.org/the-crucial-roles-of-ai-and-data-center-colocation-in-it-security/
[6] https://packetstormsecurity.com/news/view/30120/Retefe-Banking-Trojan-Resurfaces-Says-Goodbye-To-Tor.html
[5] https://packetstormsecurity.com/news/view/30119/Denial-Of-Service-Event-Impacted-U.S.-Power-Utility-Last-Month.html
[5] https://packetstormsecurity.com/news/view/30117/A-Hacker-Is-Wiping-Git-Repositories-And-Asking-For-A-Ransom.html
[5] http://www.pentesteracademy.com/course?id=1
[4] https://packetstormsecurity.com/news/view/30118/Hacker-Takes-Over-29-IoT-Botnets.html

Top URLs in Tweet in G6:
[2] https://twitter.com/Ch33r10/status/1124337183588925440
[1] https://www.wisporg.com/blog-posts
[1] https://twitter.com/i/web/status/1124351722510536704
[1] https://twitter.com/i/web/status/1124380657210273792
[1] https://twitter.com/wisporg/status/1118730217466449920
[1] https://twitter.com/kavyapearlman/status/1124662460613636099
[1] https://twitter.com/i/web/status/1124441551759978499
[1] https://dell.to/2UzVEjt
[1] https://twitter.com/i/web/status/1124387130178973696
[1] https://twitter.com/katgordon/status/1123983754706477057

Top URLs in Tweet in G7:
[3] https://www.peerlyst.com/posts/resource-a-list-of-security-related-mailing-lists-peerlyst?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[2] https://www.peerlyst.com/posts/infosec-companies-why-your-next-hire-should-hold-a-liberal-arts-degree-dave-collins?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[2] https://www.peerlyst.com/posts/network-segmentation-guides-and-best-practices-benjamin-infosec?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[2] https://www.peerlyst.com/posts/level-up-your-infosec-career-part-15-j-geno?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[2] http://www.syhunt.com/en/?n=Products.SyhuntHuntpad
[2] https://www.papercall.io/bsidescdmx
[1] https://lnkd.in/fgUS4rE
[1] https://twitter.com/i/web/status/1124539173124354048
[1] https://twitter.com/i/web/status/1124519027492126720
[1] https://twitter.com/i/web/status/1124384399850651648

Top URLs in Tweet in G8:
[5] https://youtu.be/vwzK2ultXsU?utm_source=you-tube&utm_medium=CISO-Talks&utm_campaign=ep10-1
[4] https://www.itgovernancegulf.com/shop/product/phishing-and-ransomware-human-patch-e-learning-course
[3] https://www.imperva.com/blog/this-ddos-attack-unleashed-the-most-packets-per-second-ever-heres-why-thats-important/
[2] https://www.2-spyware.com/remove-hrosas-ransomware.html
[2] https://www.forbes.com/sites/kateoflahertyuk/2019/05/03/this-evolving-windows-malware-is-out-to-get-firms-with-bad-cybersecurity-hygiene/#4e5ea4572dba
[2] https://www.technative.io/will-your-staff-cost-you-millions-in-data-breaches/
[2] https://www.infosecurity-magazine.com:443/news/byod-risks-grow-as-half-of-firms-1/
[2] https://www.qualitydigest.com/inside/innovation-article/iiot-vs-industrial-cyber-crime-050219.html
[2] https://www.entrepreneur.com/article/333126
[2] https://hackaday.com/2019/05/02/a-raspberry-pi-is-a-hardware-hackers-swiss-army-knife/

Top URLs in Tweet in G9:
[11] https://www.obsidianeagle.com/p/revolution-untelevised.html
[5] http://info.aravo.com/aravo-white-paper-buyers-guide-to-third-party-risk-management?utm_content=90914696&utm_medium=social&utm_source=twitter&hss_channel=tw-31273094
[3] http://info.aravo.com/securityscorecard-aravo-transforming-insights-into-cyber-resilience-via-technology-integration?utm_content=90902285&utm_medium=social&utm_source=twitter&hss_channel=tw-31273094
[2] http://news.obsidianeagle.com/?edition_id=660c9330-3f04-11e9-9bab-0cc47a0d1609
[2] https://www.vox.com/future-perfect/2019/4/3/18292526/google-ai-ethics-board-letter-acquisti-kay-coles-james
[2] http://news.obsidianeagle.com/?edition_id=5841b1d0-42f2-11e9-9bab-0cc47a0d1609
[2] http://news.obsidianeagle.com/?edition_id=09aa3f30-43b3-11e9-9bab-0cc47a0d1609
[2] http://news.obsidianeagle.com/?edition_id=5ac39d60-4545-11e9-9bab-0cc47a0d1609
[2] http://news.obsidianeagle.com/?edition_id=98a5a5f0-460e-11e9-9bab-0cc47a0d1609
[2] http://news.obsidianeagle.com/?edition_id=3204dcd0-4933-11e9-9bab-0cc47a0d1609

Top URLs in Tweet in G10:
[38] https://www.dfir.training/resources/downloads/windows-registry
[4] https://www.darkreading.com/
[3] http://www.databreaches.net/
[2] https://nostarch.com/catalog/security
[2] https://www.databreaches.net/michigan-investigating-the-inmediata-breach/
[2] https://twitter.com/dfirtraining/status/1124385303286837249
[1] https://twitter.com/i/web/status/1124357290558144513
[1] https://twitter.com/i/web/status/1124448301305274368
[1] https://www.darkreading.com/risk/study-exposes-breadth-of-cyber-risk/d/d-id/1334580?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple
[1] https://www.darkreading.com/vulnerabilities---threats/real-world-use-risk-of-open-source-code-/d/d-id/1334587?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Top Domains
Top Domains in Tweet in Entire Graph:
[852] twitter.com
[251] tobem.com
[118] paper.li
[108] cyberstartupobservatory.com
[74] uscybersecurity.net
[71] feedburner.com
[57] medium.com
[55] zdnet.com
[51] packetstormsecurity.com
[50] pastebeen.com

Top Domains in Tweet in G1:
[247] tobem.com
[246] twitter.com
[104] cyberstartupobservatory.com
[68] uscybersecurity.net
[20] hackercombat.com
[19] zdnet.com
[15] pulsedive.com
[12] sentinelone.com
[12] lnkd.in
[12] packetstormsecurity.com

Top Domains in Tweet in G2:
[203] twitter.com
[50] pastebeen.com
[19] paper.li
[17] boardtownblast.com
[15] open-sez.me
[10] lnkd.in
[10] co.uk
[8] bankinfosecurity.com
[8] youtube.com
[7] wired.com

Top Domains in Tweet in G3:
[30] twitter.com
[3] peerlyst.com
[2] venafi.com
[2] rsaconference.com
[2] theathletic.com
[1] medium.com
[1] gitlab.com
[1] tripwire.com
[1] alienvault.com
[1] techtarget.com

Top Domains in Tweet in G4:
[42] twitter.com
[2] censys.io
[2] cyberstartupobservatory.com
[1] github.io
[1] fireeye.com
[1] iec56w4ibovnb4wc.onion
[1] bit.ly
[1] blackhat.com
[1] youtube.com
[1] tubitv.com

Top Domains in Tweet in G5:
[36] packetstormsecurity.com
[29] twitter.com
[28] hakin9.org
[25] google.com
[20] securityonline.info
[18] medium.com
[12] github.com
[11] github.io
[8] pentesteracademy.com
[5] zdnet.com

Top Domains in Tweet in G6:
[15] twitter.com
[1] wisporg.com
[1] dell.to
[1] threatpost.com
[1] wired.com

Top Domains in Tweet in G7:
[11] twitter.com
[10] peerlyst.com
[3] papercall.io
[2] syhunt.com
[1] lnkd.in
[1] texascybersummit.org
[1] co.uk
[1] adfsolutions.com
[1] cyberdefensemagazine.com
[1] instagram.com

Top Domains in Tweet in G8:
[16] twitter.com
[5] youtu.be
[4] itgovernancegulf.com
[3] proofpoint.com
[3] imperva.com
[3] infosecurity-magazine.com
[2] 2-spyware.com
[2] forbes.com
[2] technative.io
[2] uscybersecurity.net

Top Domains in Tweet in G9:
[33] obsidianeagle.com
[13] aravo.com
[7] amazon.com
[7] twitter.com
[4] stitcher.com
[2] vox.com
[2] twi.li
[2] krebsonsecurity.com
[2] simpliv.com
[1] pxf.io

Top Domains in Tweet in G10:
[38] dfir.training
[10] twitter.com
[7] darkreading.com
[5] databreaches.net
[3] reydes.com
[2] nostarch.com
[2] paper.li
[1] lnkd.in
[1] wired.com
[1] securityonline.info

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[2904] infosec
[1408] cybersecurity
[463] security
[304] cyberwarfare
[194] hacking
[171] infographic
[160] iot
[143] tech
[141] hacker
[129] ransomware



Top Hashtags in Tweet in G1:
[1083] infosec
[594] cybersecurity
[296] cyberwarfare
[182] security
[117] tech
[115] iot
[111] bigdata
[107] infographic
[93] ransomware
[88] ai

Top Hashtags in Tweet in G2:
[308] infosec
[163] cybersecurity
[55] security
[28] databreach
[26] breach
[25] password
[23] leak
[20] hacking
[18] opsec
[12] malware

Top Hashtags in Tweet in G3:
[56] infosec
[22] ff
[9] cybersecurity
[6] malvertising
[5] followfriday
[4] career
[3] infographic
[3] osint
[3] infographics
[3] infosechippocraticoath

Top Hashtags in Tweet in G4:
[39] infosec
[5] security
[5] ff
[4] righttorepair
[3] malware
[3] bhusa
[3] tohsummit
[2] certificate
[2] phishing
[2] serverless

Top Hashtags in Tweet in G5:
[192] infosec
[99] cybersecurity
[44] hacker
[42] pentest
[41] security
[35] hacking
[24] hackers
[22] pentesting
[22] opensource
[20] programming

Top Hashtags in Tweet in G6:
[28] infosec
[9] thotcon
[4] ff
[4] womenintech
[4] hacker
[4] penetration
[2] bugcrowd
[2] ciso
[2] cso
[2] cto

Top Hashtags in Tweet in G7:
[72] infosec
[11] cybersecurity
[6] privacy
[5] career
[3] cfp
[3] security
[3] maythe4thbewithyou
[3] ios
[3] android
[3] computer

Top Hashtags in Tweet in G8:
[80] infosec
[68] cybersecurity
[22] cyberresilience
[21] cyberattack
[20] security
[17] ciso
[11] cyberaware
[11] online
[11] onlinesafety
[11] digital

Top Hashtags in Tweet in G9:
[47] infosec
[37] cybersecurity
[22] activism
[22] anons
[22] hackers
[22] informationwar
[22] extraextra
[22] occupy
[13] compliance
[12] thirdpartyrisk

Top Hashtags in Tweet in G10:
[64] infosec
[61] dfir
[14] cybersecurity
[12] hacking
[12] pentest
[9] forensics
[8] dfirsummit
[3] databreach
[2] malware
[1] maythe4thbewithyou

Top Words
Top Words in Tweet in Entire Graph:
[2597] Words in Sentiment List#1: Positive
[2675] Words in Sentiment List#2: Negative
[30] Words in Sentiment List#3: Angry/Violent
[92474] Non-categorized Words
[97748] Total Words
[2905] #infosec
[1409] #cybersecurity
[599] security
[521] infosec
[463] #security

Top Words in Tweet in G1:
[1084] #infosec
[594] #cybersecurity
[296] #cyberwarfare
[209] security
[182] #security
[120] #tech
[116] cyber
[115] #iot
[111] #bigdata
[107] #infographic

Top Words in Tweet in G2:
[308] #infosec
[162] #cybersecurity
[81] infosec
[69] security
[65] passwords
[60] emails
[55] #security
[51] dump
[51] paste
[51] id

Top Words in Tweet in G3:
[212] ian_infosec
[139] ravici
[113] fpieces
[111] joshjaycomedy
[110] notdan
[109] whitehatscum
[105] rotate26chars
[101] litmoose
[101] hacks4pancakes
[99] its_a_lisa

Top Words in Tweet in G4:
[77] infosec
[39] #infosec
[39] infosec_taylor
[27] here
[26] mean
[24] security
[23] t
[22] malware
[21] time
[18] fireeye

Top Words in Tweet in G5:
[192] #infosec
[99] #cybersecurity
[49] reach2ratan
[44] #hacker
[42] #pentest
[41] #security
[36] hansesecure
[35] #hacking
[30] hxxp
[29] security

Top Words in Tweet in G6:
[28] #infosec
[21] thotcon
[20] infosec
[18] wisporg
[16] chloemessdaghi
[11] senior
[9] diversity
[9] #thotcon
[8] love
[8] cybraryit

Top Words in Tweet in G7:
[72] #infosec
[25] those
[25] acotonio
[23] fam
[21] years
[20] especially
[20] juniors
[20] trying
[20] break
[20] 20

Top Words in Tweet in G8:
[80] #infosec
[68] #cybersecurity
[34] cybersecurity
[22] topcybernews
[22] #cyberresilience
[21] #cyberattack
[20] #security
[18] 7
[18] alarming
[18] facts

Top Words in Tweet in G9:
[47] #infosec
[37] #cybersecurity
[33] ℜ
[33] θ
[33] τιθη
[33] μπ
[33] ειε
[33] ι
[33] ε
[33] daily

Top Words in Tweet in G10:
[64] #infosec
[61] #dfir
[38] dfirtraining
[38] best
[38] registry
[38] forensics
[38] cheat
[38] sheet
[14] #cybersecurity
[12] webinar

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[488] #cybersecurity,#infosec
[303] #cyberwarfare,#infosec
[195] #infosec,#cybersecurity
[187] #infosec,#security
[99] joshjaycomedy,hacks4pancakes
[99] trycatchhcf,rayredacted
[99] rayredacted,hexadecim8
[99] hexadecim8,wendynather
[99] wendynather,notdan
[98] its_a_lisa,litmoose

Top Word Pairs in Tweet in G1:
[295] #cyberwarfare,#infosec
[191] #cybersecurity,#infosec
[78] #infosec,#cybersecurity
[66] #infosec,#security
[64] #cybersecurity,#bigdata
[60] #infosec,#mobilesecurity
[47] #mobilesecurity,#saas
[47] #saas,#tech
[43] #tech,#ransomware
[40] denmark,one

Top Word Pairs in Tweet in G2:
[51] emails,paste
[51] paste,id
[46] #cybersecurity,#infosec
[44] passwords,emails
[32] #infosec,#cybersecurity
[26] #cybersecurity,#databreach
[26] #databreach,#infosec
[23] #infosec,#leak
[23] #leak,#breach
[22] #security,#infosec

Top Word Pairs in Tweet in G3:
[99] joshjaycomedy,hacks4pancakes
[99] trycatchhcf,rayredacted
[99] rayredacted,hexadecim8
[99] hexadecim8,wendynather
[99] wendynather,notdan
[98] its_a_lisa,litmoose
[98] theonlymike_e,joshjaycomedy
[96] hacks4pancakes,whitehatscum
[95] notdan,winter_heidi
[91] tinehagent,trycatchhcf

Top Word Pairs in Tweet in G4:
[16] finally,here
[16] here,published
[16] published,intro
[16] intro,android
[16] android,app
[16] app,reverse
[16] reverse,engineering
[16] engineering,workshop
[16] workshop,interested
[16] interested,learning

Top Word Pairs in Tweet in G5:
[39] #infosec,#security
[37] #hacker,#infosec
[29] #infosec,#hacking
[23] #hacking,#hackers
[22] writeup,poc
[22] reach2ratan,#hacker
[21] #infosec,#pentest
[21] #hackers,#pentesting
[19] #pentest,#redteam
[18] lateral,movement

Top Word Pairs in Tweet in G6:
[8] love,cybraryit
[8] cybraryit,supporting
[8] supporting,wisporg
[8] wisporg,accessible
[8] accessible,access
[8] access,infosec
[8] infosec,privacy
[8] privacy,education
[8] education,beginners
[8] beginners,senior

Top Word Pairs in Tweet in G7:
[23] #infosec,fam
[20] fam,especially
[20] especially,juniors
[20] juniors,those
[20] those,trying
[20] trying,break
[20] break,20
[20] 20,years
[20] years,exp
[20] exp,made

Top Word Pairs in Tweet in G8:
[22] #cybersecurity,#cyberresilience
[20] #infosec,#security
[18] #cyberresilience,7
[18] 7,alarming
[18] alarming,facts
[18] facts,know
[18] know,cybersecurity
[18] cybersecurity,#cyberattack
[16] #cyberattack,#infosec
[12] #cybersecurity,#infosec

Top Word Pairs in Tweet in G9:
[33] ℜ,θ
[33] θ,τιθη
[33] τιθη,μπ
[33] μπ,ειε
[33] ειε,ι
[33] ι,ε
[33] ε,daily
[33] daily,digest
[22] digest,#activism
[22] #activism,#anons

Top Word Pairs in Tweet in G10:
[46] #dfir,#infosec
[38] best,registry
[38] registry,forensics
[38] forensics,cheat
[38] cheat,sheet
[38] sheet,#dfir
[37] dfirtraining,best
[12] webinar,gratuito
[11] #hacking,#pentest
[10] video,webinar

Top Replied-To
Top Replied-To in Entire Graph:
@ian_infosec
@infosec_taylor
@ravici
@rotate26chars
@bentleyaudrey
@magpie2800
@fpieces
@nerdpyle
@akamai
@carmencrincoli

Top Replied-To in G1:
@appsecbloke
@malwarejake
@ico_kit
@allinwithchris
@jermsmit
@securitymetrics
@google
@bloomberg
@microsoft
@infosec_taylor

Top Replied-To in G2:
@cypherpath

Top Replied-To in G3:
@ian_infosec
@ravici
@rotate26chars
@bentleyaudrey
@magpie2800
@nerdpyle
@fpieces
@carmencrincoli
@infosec_taylor
@whitehatscum

Top Replied-To in G4:
@infosec_taylor
@litmoose
@beersolvesit
@ian_infosec
@infosecos
@hacks4pancakes
@_j3lena_
@iancoldwater
@slowwormsec
@mlgualtieri

Top Replied-To in G6:
@alyssam_infosec
@chloemessdaghi
@infosec_taylor
@phillipwylie
@cybersquarepeg
@heynickmitchell
@ch33r10
@thotcon
@tiger_infosec
@secureworks

Top Replied-To in G7:
@texas_cyber
@literatewench
@alyssam_infosec
@digitalempress

Top Replied-To in G8:
@litmoose
@fbi

Top Replied-To in G10:
@x3830s
@thomasyarger
@infosec_taylor

Top Mentioned
Top Mentioned in Entire Graph:
@ian_infosec
@ravici
@litmoose
@hacks4pancakes
@joshjaycomedy
@whitehatscum
@notdan
@hexadecim8
@wendynather
@its_a_lisa

Top Mentioned in G1:
@fisher85m
@csobservatory
@uscybermag
@wef
@ronald_vanloon
@cybertoolsbooks
@cybersecboardrm
@sentinelone
@williamharvey07
@jmonteagudoe

Top Mentioned in G2:
@stevesanders7
@ckitoutpassiton
@fni_inc
@hudson_chatbots
@koddoscom

Top Mentioned in G3:
@ian_infosec
@joshjaycomedy
@ravici
@notdan
@whitehatscum
@hacks4pancakes
@its_a_lisa
@litmoose
@trycatchhcf
@rayredacted

Top Mentioned in G4:
@fireeye
@maddiestone
@infosec_taylor
@crowdstrike
@piratepartyint
@litmoose
@egyp7
@nubesque
@infosecos
@iancoldwater

Top Mentioned in G5:
@reach2ratan
@hansesecure
@hakin9
@fewatoms
@cyberhubengage
@the_yellow_fall
@securitytube
@cybertoolsbooks
@siteonesupply
@aglongo

Top Mentioned in G6:
@thotcon
@chloemessdaghi
@wisporg
@cybraryit
@wosectweets
@viewfromabook
@borealisninja
@ch33r10
@racheltobac
@mr_steve64

Top Mentioned in G7:
@acotonio
@peerlyst
@securitybsides
@texas_cyber
@jerdean101
@catbailey
@whatever_sauce
@eat_math_love
@grivlin
@allcapsstore

Top Mentioned in G8:
@topcybernews
@stephanenappo
@sandrawachter5
@uniofoxford
@bamitav
@katharina_lamsa
@business
@chuckdbrooks
@archonsec
@ipfconline1

Top Mentioned in G9:
@itzquauhtli
@aravo
@stitcher
@shawnershad
@perceiver1219
@mindy1965
@rosaluxeuropa
@mi3_jules
@ivanka
@animal__people

Top Mentioned in G10:
@dfirtraining
@sansforensics
@robtlee
@philhagen
@alonso_reydes
@sentinelone
@ush1c
@bsmuir
@acotonio
@thomasyarger

Top Tweeters
Top Tweeters in Entire Graph:
@arkangelscrap
@alljobsut
@sectest9
@robre62
@cyberdomain
@nosqldigest
@cybertoolsbooks
@webironbots
@digestwordpress
@techl0g

Top Tweeters in G1:
@arkangelscrap
@sectest9
@nosqldigest
@cybertoolsbooks
@webironbots
@digestwordpress
@startupsbot
@chidambara09
@fintechna
@raybae689

Top Tweeters in G2:
@alljobsut
@villamizaritpro
@marenda
@biconnections
@clairvoyant_the
@byhorror
@mrsyiswhy
@hitoshikokumai
@vectorfiveus
@nuclearanthro

Top Tweeters in G3:
@threadreaderapp
@dominos
@nite0wl
@viss
@maelorin
@blowdart
@nerdpyle
@dakami
@clarinette02
@diosecurity

Top Tweeters in G4:
@andrewdwilliams
@piratepartyint
@brianhonan
@jaysonstreet
@0xh0n3y
@whereisthespai
@kfalconspb
@sambowne
@sureshdr
@jcase

Top Tweeters in G5:
@aaroncuddeback
@jpc268
@metropulseusa
@opexxx
@tanwiraalam
@kirkdborne
@securitytube
@a_m_m_7_7
@m3sm4r
@liberaltalknpts

Top Tweeters in G6:
@alizardx
@reybango
@observacious
@sforslev
@davidtavarez
@heynickmitchell
@cybraryit
@dacoursey
@3ncr1pt3d
@tarah

Top Tweeters in G7:
@ottlegalrebels
@digitalempress
@forcesreviewuk
@compuguy
@indiblue4
@starbroken1980
@erinleeryan
@gagnelegal
@sjalexander
@peerlyst

Top Tweeters in G8:
@business
@gvalan
@forbes
@smh
@dajerx
@wordfinga
@spirosmargaris
@ipfconline1
@mclynd
@topcybernews

Top Tweeters in G9:
@aldoceccarelli
@dellcares
@perceiver1219
@bobsmith4152
@djimb3rry
@renewablesearch
@kk0000000000
@gdpr25thmay18
@corpgovuk
@finopsnews

Top Tweeters in G10:
@securityblog
@rakuan_roukiya
@csocintel
@lemoine_vincent
@iquechocosa
@sansforensics
@alonso_reydes
@philhagen
@mrbenchung
@maaverix


We use necessary cookies to make our site work. We’d like to set additional cookies to understand site usage, make site improvements and to remember your settings. We also use cookies set by other sites to help deliver content from their services.