infosec, Twitter, 8/25/2019 7:22:37 AM, 207683


FAQ | Problem?

infosec_2019-08-25_00-00-01.xlsx
infosec_2019-08-25_00-00-01.xlsx
From:
NodeXLExcelAutomator
Uploaded on:
August 25, 2019
Short Description:
infosec via NodeXL http://bit.ly/2NwI8gw
@sectest9
@cybersecboardrm
@kalemachris
@fisher85m
@hansesecure
@alyssam_infosec
@kim_crawley
@malwarejake
@ar4v3n
@badassbowden

Top hashtags:
#infosec
#cybersecurity
#security
#cyberwarfare
#databreach
#malware
#iot
#hacking

Description:
Description
The graph represents a network of 3,229 Twitter users whose tweets in the requested range contained "infosec", or who were replied to or mentioned in those tweets. The network was obtained from the NodeXL Graph Server on Sunday, 25 August 2019 at 07:01 UTC.

The requested start date was Sunday, 25 August 2019 at 00:01 UTC and the maximum number of days (going backward) was 14.

The maximum number of tweets collected was 5,000.

The tweets in the network were tweeted over the 1-day, 9-hour, 25-minute period from Friday, 23 August 2019 at 14:35 UTC to Sunday, 25 August 2019 at 00:00 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 3229
Unique Edges : 4333
Edges With Duplicates : 3210
Total Edges : 7543
Number of Edge Types : 3
Tweet : 2628
Mentions : 4677
Replies to : 238
Self-Loops : 2628
Reciprocated Vertex Pair Ratio : 0.0417505030181087
Reciprocated Edge Ratio : 0.0801545147271849
Connected Components : 720
Single-Vertex Connected Components : 405
Maximum Vertices in a Connected Component : 1735
Maximum Edges in a Connected Component : 5737
Maximum Geodesic Distance (Diameter) : 14
Average Geodesic Distance : 5.268574
Graph Density : 0.000397382304034495
Modularity : 0.514331
NodeXL Version : 1.0.1.419

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[32] https://github.com/mitchellkrogza/Phishing.Database/blob/master/phishing-domains-NEW-last-hour.txt
[27] https://github.com/mitchellkrogza/Phishing.Database/blob/master/phishing-links-ACTIVE-NOW.txt
[26] https://medium.com/@adam.toscher/top-five-ways-the-red-team-breached-the-external-perimeter-262f99dc9d17
[23] https://www.webiron.com/bot_feed/bd7f678e9b87f3079d9fda5d9f6157c7
[20] https://phishstats.info/
[18] http://open-sez.me
[18] http://uscybersecurity.net/subscribe/
[17] https://www.webiron.com/bot_feed/d26b8595518082af76db9f48f9f7e568
[17] https://www.webiron.com/bot_feed/3f588a26163867af7e848cd98d23889d
[15] https://twinybots.ch/

Top URLs in Tweet in G1:
[28] https://github.com/mitchellkrogza/Phishing.Database/blob/master/phishing-domains-NEW-last-hour.txt
[26] https://github.com/mitchellkrogza/Phishing.Database/blob/master/phishing-links-ACTIVE-NOW.txt
[18] http://open-sez.me
[17] https://phishstats.info/
[16] http://uscybersecurity.net/subscribe/
[14] https://securityaffairs.co/wordpress/90090/security/malware-analysis-sandboxes-data-leak.html
[11] http://www.viruss.eu/security/the-silence-hacking-crew-grows-louder/
[9] https://eforensicsmag.com/tools-to-help-you-protect-your-company-from-cyberthieves-by-magnolia-potter/
[9] https://www.simpliv.com/internetofthings/from-0-to-1-raspberry-pi-and-the-internet-of-things
[8] https://www.cpomagazine.com/cyber-security/extent-of-damage-for-state-farm-credential-stuffing-attack-still-in-question/

Top URLs in Tweet in G2:
[5] http://www.sectechno.com/redhunt-os-v2-adversary-emulation-threat-hunting-vm/
[5] http://sectechno.com/ldapper-ad-ldap-cli-searching-tool/
[3] https://twinybots.ch/
[3] https://www.privacysecurityacademy.com/infosectech-intensive/?utm_medium=social&utm_source=twitter&utm_campaign=postfity&utm_content=postfity83ac8
[3] https://stateofsecurity.com/make-the-most-of-your-it-inventories/?utm_campaign=make-the-most-of-your-it-inventories&utm_medium=social_link&utm_source=missinglettr-twitter
[3] https://stateofsecurity.com/zelle-quick-easy-and-problematic/?utm_campaign=zellequick-easy-andproblematic&utm_medium=social_link&utm_source=missinglettr-twitter
[3] https://stateofsecurity.com/iam-we-should-use-all-the-factors-we-can/?utm_campaign=iam-we-should-use-all-the-factors-we-can&utm_medium=social_link&utm_source=missinglettr-twitter
[3] https://www.simpliv.com/internetofthings/microsoft-project-2016-from-startup-to-ready-to-control
[2] https://www.lebigdata.fr/top-navigateurs-web-protection-donnees
[2] https://www.darkreading.com/endpoint/capital-one-breach-what-security-teams-can-do-now/a/d-id/1335475?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Top URLs in Tweet in G3:
[3] https://www.itspmagazine.com/events/ntsc-2019-western-region-ciso-policy-roundtable
[3] https://itspmagazine.com/event-listings/
[2] https://alyssasec.com/2019/08/you-cant-do-anything-why-havent-you-done-something
[1] https://twitter.com/i/web/status/1165353934174789633
[1] https://twitter.com/i/web/status/1164964381387628544
[1] https://www.csoonline.com/article/3432960/how-to-avoid-using-rdp-on-windows.html#tk.rss_all
[1] https://www.reddit.com/r/netsec/comments/cuw9fe/hashcatch_a_script_to_capture_handshakes_of/?utm_medium=android_app&utm_source=share
[1] https://twitter.com/i/web/status/1165398406782582784
[1] https://twitter.com/i/web/status/1165367873512103936
[1] https://paper.li/PredictableData/1476944552?edition_id=dd4249c0-c6b5-11e9-a59d-0cc47a0d1609

Top URLs in Tweet in G4:
[10] https://www.peerlyst.com/posts/osint-for-n00bs-kimberly-crawley
[5] https://www.peerlyst.com/posts/challenges-that-cause-cisos-to-fail-gary-hayslip-cissp-cisa-crisc-ccsk?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[4] https://www.peerlyst.com/posts/breaking-into-infosec-attitude-and-mindset-jack-baylor?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[4] https://twitter.com/BYOSradio/status/1164544060016795651
[4] https://github.com/mitchellkrogza/Phishing.Database/blob/master/phishing-domains-NEW-last-hour.txt
[3] https://www.peerlyst.com/posts/resource-free-infosec-books-list?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[3] https://www.peerlyst.com/posts/how-to-handle-information-security-incidents-part2-chiheb-chebbi?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[3] https://www.nbins.com/blog/cyber-risk/data-backup-good-habits-and-common-pitfalls/?utm_content=98917385&utm_medium=social&utm_source=twitter&hss_channel=tw-237043493
[3] https://www.peerlyst.com/posts/level-up-your-infosec-career-part-13-j-geno?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[2] https://www.alienvault.com/blogs/security-essentials/deep-web-and-dark-web

Top URLs in Tweet in G5:
[23] https://www.webiron.com/bot_feed/bd7f678e9b87f3079d9fda5d9f6157c7
[17] https://www.webiron.com/bot_feed/3f588a26163867af7e848cd98d23889d
[17] https://www.webiron.com/bot_feed/d26b8595518082af76db9f48f9f7e568
[7] https://www.webiron.com/bot_feed/bf25f05a475c5bbeb3a2f02be3f8b883
[6] https://twinybots.ch/
[5] https://securityonline.info/asyncrat/
[5] http://www.kyivstar.ua/
[5] https://www.webiron.com/bot_feed/5021f23a5ed70f691ea28b65aa702895
[4] https://www.tobem.com/cyberwar/nmap-cookbook-the-fat-free-guide-to-network-scanning/
[4] https://www.pcmag.com/news/370363/peripheral-maker-fanatec-hacked-customer-details-stolen

Top URLs in Tweet in G6:
[9] https://securityintelligence.com/posts/digital-identity-trust-life-cycle-implementing-your-fraud-protection-solution/
[7] http://website.com/admin/
[5] https://www.alctraining.com.au/blog/how-can-government-services-use-big-data/
[4] https://www.continuitycentral.com/index.php/news/erm-news/4351-the-importance-of-cyber-due-diligence-in-mergers-and-acquisition-risk-management
[4] https://www.cpomagazine.com/cyber-security/the-impact-of-artificial-intelligence-on-cyber-security/
[2] https://www.alctraining.com.au/blog/cybersecurity-as-code-in-office-365/
[2] https://blog.paloaltonetworks.com/2019/07/4-practical-steps-shift-left-security/
[2] https://www.theregister.co.uk/2019/08/22/cisco_patch_bundle/
[2] https://www.ktoo.org/2019/08/22/city-and-borough-of-juneau-loses-almost-80000-to-wire-fraud-scam/
[2] https://www.cpomagazine.com/cyber-security/the-impact-of-artificial-intelligence-on-cyber-security

Top URLs in Tweet in G7:
[22] https://medium.com/@adam.toscher/top-five-ways-the-red-team-breached-the-external-perimeter-262f99dc9d17
[12] https://speakerdeck.com/roshantanisha/machine-learning-for-infosec
[9] https://www.youtube.com/playlist?list=PLwvifWoWyqwqkmJ3ieTG6uXUSuid95L33

[7] https://link.medium.com/HnYIIk1OnZ
[3] https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/
[2] https://hansesecure.de/2018/06/backdooring-pe-file-with-aslr/
[2] https://glanfield.co.uk/using-empire-with-a-reverse-proxy/
[2] https://amonsec.net/2018/09/23/Common-Windows-Misconfiguration-Services.html
[2] https://jivoi.github.io/2015/08/21/pentest-tips-and-tricks-number-2/
[1] https://twitter.com/i/web/status/1164827601480765441

Top URLs in Tweet in G8:
[1] https://twitter.com/i/web/status/1164156176369672192
[1] https://twitter.com/i/web/status/1164156180131962882
[1] https://www.welivesecurity.com/2019/08/22/first-spyware-android-ahmyth-google-play/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+eset%2Fblog+%28ESET+Blog%3A+We+Live+Security%29
[1] https://twitter.com/i/web/status/1165167013469274112
[1] https://twitter.com/i/web/status/1165160432199450624
[1] https://twitter.com/i/web/status/1164925577406636032
[1] https://infosec.exchange/
[1] https://twitter.com/i/web/status/1165154886616588289
[1] https://medium.com/@adam.toscher/top-five-ways-the-red-team-breached-the-external-perimeter-262f99dc9d17
[1] https://twitter.com/i/web/status/1165014577580511242

Top URLs in Tweet in G9:
[8] https://hakin9.org/people-tracker-on-the-internet-osint-analysis-and-research-tool/
[6] https://www.privacysecurityacademy.com/infosectech-intensive/?utm_medium=social&utm_source=twitter&utm_campaign=postfity&utm_content=postfity83ac8
[5] https://hakin9.org/the-importance-of-data-encryption-in-cybersecurity/
[5] https://hakin9.org/top-5-secure-email-services-by-dominique-rene/
[4] https://hakin9.org/pwning-wordpress-passwords-by-mitch-moser-2/
[4] https://highside.io/blog/a-banks-biggest-challenge-data-security-compliance/
[4] https://www.weforum.org/agenda/2019/08/we-must-treat-cybersecurity-like-public-good/
[3] https://hakin9.org/download/programming-hackers-preview/
[2] https://hakin9.org/download/nexpose-and-metasploit-pro-hacking-preview/
[2] https://hakin9.org/voip-hacking-techniques/

Top URLs in Tweet in G10:
[2] https://www.scmagazine.com/home/security-news/apts-cyberespionage/u-s-intel-agencies-issue-analysis-of-north-koreas-electricfish-tunneling-tool/
[2] https://www.bleepingcomputer.com/news/security/emotet-botnet-is-back-servers-active-across-the-world/
[1] https://twitter.com/i/web/status/1165266508378968064
[1] https://nakedsecurity.sophos.com/2019/08/21/webcam-woes-worlds-oldest-online-camera-struggles-with-security/?utm_source=dlvr.it&utm_medium=twitter
[1] https://nakedsecurity.sophos.com/2019/08/22/massive-moviepass-database-found-exposed-on-public-server/?utm_source=dlvr.it&utm_medium=twitter
[1] https://twitter.com/i/web/status/1165408299447193600
[1] https://twitter.com/i/web/status/1165388670620205056
[1] https://twitter.com/i/web/status/1165381945951510529
[1] https://twitter.com/i/web/status/1165372283512414211
[1] https://www.helpnetsecurity.com/2019/08/06/government-cloud-first-strategy/?utm_source=dlvr.it&utm_medium=twitter

Top Domains
Top Domains in Tweet in Entire Graph:
[1526] twitter.com
[243] paper.li
[214] tobem.com
[137] webiron.com
[107] feedburner.com
[90] pastebeen.com
[72] github.com
[66] darkreading.com
[64] hakin9.org
[56] simpliv.com

Top Domains in Tweet in G1:
[428] twitter.com
[83] pastebeen.com
[62] github.com
[52] simpliv.com
[42] csoonline.com
[28] eforensicsmag.com
[19] securityaffairs.co
[18] open-sez.me
[17] phishstats.info
[16] uscybersecurity.net

Top Domains in Tweet in G2:
[354] twitter.com
[48] freie-welt.eu
[34] paper.li
[13] darkreading.com
[10] sectechno.com
[9] stateofsecurity.com
[8] zone-h.org
[8] hakin9.org
[6] blogspot.com
[6] gov.co

Top Domains in Tweet in G3:
[36] twitter.com
[9] itspmagazine.com
[2] reddit.com
[2] alyssasec.com
[1] csoonline.com
[1] paper.li
[1] technocrit.com
[1] stealthbits.com
[1] itspm.ag
[1] alphacybersecurity.tech

Top Domains in Tweet in G4:
[82] twitter.com
[35] peerlyst.com
[6] github.com
[5] tobem.com
[5] linuxsecurity.expert
[3] nbins.com
[3] tradepub.com
[2] alienvault.com
[2] linkedin.com
[2] cfptime.org

Top Domains in Tweet in G5:
[195] tobem.com
[149] twitter.com
[134] webiron.com
[36] boardtownblast.com
[25] techcrunch.com
[23] darkreading.com
[19] securityonline.info
[14] securityaffairs.co
[14] packetstormsecurity.com
[12] co.uk

Top Domains in Tweet in G6:
[25] twitter.com
[9] securityintelligence.com
[7] com.au
[7] website.com
[6] cpomagazine.com
[5] paper.li
[4] continuitycentral.com
[2] paloaltonetworks.com
[2] co.uk
[2] ktoo.org

Top Domains in Tweet in G7:
[30] medium.com
[12] speakerdeck.com
[9] youtube.com
[6] twitter.com
[5] paper.li
[3] absolomb.com
[2] hansesecure.de
[2] co.uk
[2] amonsec.net
[2] github.io

Top Domains in Tweet in G8:
[15] twitter.com
[1] welivesecurity.com
[1] infosec.exchange
[1] medium.com
[1] opensoc.io

Top Domains in Tweet in G9:
[45] hakin9.org
[25] twitter.com
[11] privacysecurityacademy.com
[7] paper.li
[6] eforensicsmag.com
[4] highside.io
[4] weforum.org
[2] linkedin.com
[1] phishstats.info
[1] cpomagazine.com

Top Domains in Tweet in G10:
[12] twitter.com
[3] paper.li
[2] scmagazine.com
[2] bleepingcomputer.com
[2] sophos.com
[2] dlvr.it
[2] any.run
[1] helpnetsecurity.com
[1] youtube.com
[1] pastebin.com

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[3470] infosec
[1822] cybersecurity
[538] security
[243] cyberwarfare
[209] databreach
[205] malware
[201] iot
[192] hacking
[188] hackers
[164] cybersec



Top Hashtags in Tweet in G1:
[1137] infosec
[860] cybersecurity
[267] security
[157] databreach
[152] iot
[126] bigdata
[116] cybersec
[113] malware
[104] hackers
[92] phishing

Top Hashtags in Tweet in G2:
[288] infosec
[123] cybersecurity
[49] youtube
[48] video
[40] security
[28] hacking
[24] privacy
[20] iot
[16] tech
[13] hackers

Top Hashtags in Tweet in G3:
[80] infosec
[16] cybersecurity
[14] ff
[4] pyjamas
[4] pubcrawls
[4] nerds
[4] cfps
[3] detroit
[3] inthenews
[2] penetrationtesting

Top Hashtags in Tweet in G4:
[182] infosec
[35] cybersecurity
[29] ff
[23] osint
[18] security
[11] cyberwarfare
[8] phishing
[7] ciso
[7] cyber
[7] cybersec

Top Hashtags in Tweet in G5:
[699] infosec
[335] cybersecurity
[205] cyberwarfare
[92] security
[61] follow
[55] rt
[39] software
[38] technology
[37] dataprivacy
[37] malware

Top Hashtags in Tweet in G6:
[62] infosec
[35] cybersecurity
[12] security
[8] cyber
[6] ai
[6] cybercrime
[6] cybersecuirty
[6] iiot
[6] iot
[6] weak

Top Hashtags in Tweet in G7:
[64] infosec
[46] pentest
[31] redteam
[9] oswe
[8] bugbounty
[7] bugs
[7] backup
[7] root
[6] php
[5] cybersecurity

Top Hashtags in Tweet in G8:
[12] infosec
[2] amazonrainforest
[2] btv
[1] cybersecurity
[1] hacker
[1] pentest
[1] redteam
[1] grcon19

Top Hashtags in Tweet in G9:
[92] infosec
[53] hacking
[40] hackers
[29] pentesting
[27] cybersecurity
[19] programming
[13] pentest
[11] privacy
[11] gdpr
[9] ccpa

Top Hashtags in Tweet in G10:
[14] infosec
[11] cybersecurity
[8] malware
[7] threatintel
[7] threathunting
[5] lokibot
[5] trojan
[5] dfir
[2] cybersec
[2] privacy

Top Words
Top Words in Tweet in Entire Graph:
[2370] Words in Sentiment List#1: Positive
[2471] Words in Sentiment List#2: Negative
[5] Words in Sentiment List#3: Angry/Violent
[79367] Non-categorized Words
[84208] Total Words
[3468] #infosec
[1823] #cybersecurity
[538] #security
[519] security
[427] infosec

Top Words in Tweet in G1:
[1136] #infosec
[861] #cybersecurity
[267] #security
[173] fisher85m
[159] #databreach
[153] random
[152] #iot
[138] new
[134] security
[126] #bigdata

Top Words in Tweet in G2:
[288] #infosec
[123] #cybersecurity
[77] security
[70] infosec
[49] #youtube
[48] #video
[40] #security
[33] out
[31] news
[30] new

Top Words in Tweet in G3:
[80] #infosec
[62] alyssam_infosec
[56] please
[55] out
[54] help
[51] research
[51] important
[51] survey
[50] chloemessdaghi
[50] calling

Top Words in Tweet in G4:
[182] #infosec
[41] infosec
[35] #cybersecurity
[31] peerlyst
[29] #ff
[23] post
[23] #osint
[21] security
[21] up
[21] check

Top Words in Tweet in G5:
[699] #infosec
[335] #cybersecurity
[205] #cyberwarfare
[126] network
[126] new
[102] issue
[102] node
[98] security
[92] #security
[64] bot

Top Words in Tweet in G6:
[62] #infosec
[35] #cybersecurity
[23] lt
[23] gt
[21] url
[19] xss
[16] archonsec
[16] alert
[15] com
[14] file

Top Words in Tweet in G7:
[64] #infosec
[46] #pentest
[38] hansesecure
[31] #redteam
[25] infosec
[25] nullahm
[24] team
[22] top
[22] five
[22] ways

Top Words in Tweet in G8:
[21] infosec
[12] #infosec
[11] marcusjcarey
[9] first
[9] tinkersec
[9] swid
[8] jcanlas159
[8] advice
[8] those
[8] starting

Top Words in Tweet in G9:
[92] #infosec
[53] #hacking
[40] #hackers
[31] hakin9
[29] #pentesting
[27] #cybersecurity
[23] security
[19] #programming
[13] #pentest
[11] #privacy

Top Words in Tweet in G10:
[20] infosec
[18] gabsmashh
[14] #infosec
[11] #cybersecurity
[8] #malware
[7] #threatintel
[7] #threathunting
[7] com
[6] 50's
[6] skills

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[679] #cybersecurity,#infosec
[361] #infosec,#cybersecurity
[235] #cyberwarfare,#infosec
[220] #security,#infosec
[130] #cybersecurity,#databreach
[113] secure,random
[111] #infosec,#hacking
[105] #infosec,#security
[103] new,node
[93] #cybersec,#cybersecurity

Top Word Pairs in Tweet in G1:
[276] #cybersecurity,#infosec
[137] #security,#infosec
[113] secure,random
[111] #cybersecurity,#databreach
[91] #infosec,#cybersecurity
[83] emails,paste
[75] powerball,pick
[71] #cybersec,#cybersecurity
[64] passwords,emails
[63] new,#phishing

Top Word Pairs in Tweet in G2:
[48] #youtube,#video
[48] #video,#infosec
[43] #cybersecurity,#infosec
[22] #infosec,#cybersecurity
[17] #security,#infosec
[13] information,security
[13] last,week's
[13] week's,engaging
[13] engaging,news
[11] cyber,security

Top Word Pairs in Tweet in G3:
[50] calling,ladies
[50] ladies,#infosec
[50] #infosec,please
[50] please,help
[50] help,out
[50] out,janefrankland's
[50] janefrankland's,research
[50] research,completing
[50] completing,important
[50] important,survey

Top Word Pairs in Tweet in G4:
[17] #infosec,#cybersecurity
[16] #osint,#infosec
[15] #infosec,peeps
[14] keep,short
[14] short,second
[14] second,#ff
[14] #ff,tweet
[14] tweet,go
[14] go,#osint
[14] peeps,bendobrown

Top Word Pairs in Tweet in G5:
[201] #cyberwarfare,#infosec
[150] #infosec,#cybersecurity
[137] #cybersecurity,#infosec
[101] new,node
[55] #follow,#rt
[55] #rt,#cybersecurity
[46] #infosec,#security
[42] bot,network
[38] #infosec,#software
[38] #software,#technology

Top Word Pairs in Tweet in G6:
[20] #cybersecurity,#infosec
[14] file,php
[14] php,url
[11] archonsec,#cybersecurity
[10] active,lt
[10] gt,lt
[9] #infosec,ibmsecurity
[9] ibmsecurity,implementing
[9] implementing,fraud
[9] fraud,protection

Top Word Pairs in Tweet in G7:
[37] #infosec,#pentest
[31] #pentest,#redteam
[22] top,five
[22] five,ways
[22] ways,red
[22] red,team
[22] team,breached
[22] breached,external
[22] external,perimeter
[22] perimeter,#infosec

Top Word Pairs in Tweet in G8:
[9] tinkersec,swid
[9] swid,marcusjcarey
[8] advice,those
[8] those,starting
[8] starting,first
[8] first,jobs
[8] jobs,#infosec
[8] #infosec,excited
[8] excited,nervous
[8] nervous,tinkersec

Top Word Pairs in Tweet in G9:
[49] #infosec,#hacking
[40] #hacking,#hackers
[29] #hackers,#pentesting
[19] #pentesting,#programming
[13] #programming,#pentest
[11] #privacy,#infosec
[11] #infosec,#gdpr
[9] cyber,security
[9] infosec,tech
[9] tech,intensive

Top Word Pairs in Tweet in G10:
[9] #infosec,#cybersecurity
[7] #threatintel,#threathunting
[7] #threathunting,#infosec
[5] dad,50's
[5] 50's,wondering
[5] wondering,practicality
[5] practicality,starting
[5] starting,learn
[5] learn,infosec
[5] infosec,skills

Top Replied-To
Top Replied-To in Entire Graph:
@alyssam_infosec
@gabsmashh
@badassbowden
@jbizzle703
@raebress
@mitchparkerciso
@malwarejake
@infosec_taylor
@sidragon1
@danielmiessler

Top Replied-To in G1:
@gregorydupuis
@clavdiamartin

Top Replied-To in G3:
@alyssam_infosec
@badassbowden
@jbizzle703
@raebress
@mitchparkerciso
@sidragon1
@ellearmageddon
@nah_imdone
@alicynx
@infosec_taylor

Top Replied-To in G4:
@malwarejake
@rag_sec
@cisakrebs
@mllelicious
@cybersecfill
@5w0rdfish
@notameadow
@malwareowl
@alyssam_infosec
@cyberprotectgrp

Top Replied-To in G5:
@danielmiessler

Top Replied-To in G7:
@r00tdk
@pavanw3b

Top Replied-To in G8:
@0xnorff
@itsecj
@eznix2
@danielmiessler
@lacosteaef
@brysonbort
@munin
@maliciouslink

Top Replied-To in G9:
@googlechrome

Top Replied-To in G10:
@gabsmashh
@alyssam_infosec
@wesleytb13
@initinfosec
@machinedidact
@nuxxhalcyon
@oscaron
@mainframed767

Top Mentioned
Top Mentioned in Entire Graph:
@fisher85m
@cybersecboardrm
@jinibabd
@reach2ratan
@janefrankland
@cybertoolsbooks
@chloemessdaghi
@alyssam_infosec
@hansesecure
@kaigrunwitz

Top Mentioned in G1:
@fisher85m
@cybersecboardrm
@jinibabd
@reach2ratan
@kaigrunwitz
@simplivllc
@wiprodigital
@sourceils
@cioamaro
@uscybermag

Top Mentioned in G2:
@z3rotrust
@garage4hackers
@itempathy
@share_in_blue
@thegeekzweb
@stevesanders7
@gtpintado
@dvdsmpsn

Top Mentioned in G3:
@chloemessdaghi
@janefrankland
@alyssam_infosec
@marigalloway
@laticiacarrow
@akolsuoicauqol
@infosec_taylor
@theluxetech
@thefrug
@katerosebee

Top Mentioned in G4:
@peerlyst
@bendobrown
@yaolri
@obretix
@kim_crawley
@sector035
@mwosint
@nix
@cybertoolsbooks
@seanwrightsec

Top Mentioned in G5:
@cybertoolsbooks
@jinibabd
@the_yellow_fall
@webimprints
@davidjoberly
@infosec_jobscom
@itsoftgmbh
@boardtownblast
@teiss
@emahmoudsoliman

Top Mentioned in G6:
@archonsec
@google
@ibmsecurity
@chu
@spyerror
@loosesecurity
@neirajones
@siemens
@alcgroup
@mirko_ross

Top Mentioned in G7:
@hansesecure
@null0x00
@thelogicalkoan
@nullahm
@mtoecker
@mrunal110
@0x09al
@mdseclabs
@bohops
@nullhyd

Top Mentioned in G8:
@marcusjcarey
@tinkersec
@swid
@jcanlas159
@whiskeyneon
@alievinfo
@jaysonstreet
@iancoldwater
@v3rbaal
@jonselman

Top Mentioned in G9:
@hakin9
@redtapechron
@eforensics_mag
@privsecacademy
@brendandiaz
@wef
@taiyyib
@binary_defense
@corix_jc
@instagram

Top Mentioned in G10:
@gabsmashh
@reecdeep
@malwaretechblog
@goprivacy1
@james_inthe_box
@deb_infosec
@redseal_co
@initinfosec
@secstelle
@psalvitti

Top Tweeters
Top Tweeters in Entire Graph:
@arkangelscrap
@sectest9
@sirajs0l
@cyberdomain
@nosqldigest
@klm
@cybertoolsbooks
@webironbots
@1denmadrid
@evankirstel

Top Tweeters in G1:
@arkangelscrap
@sectest9
@nosqldigest
@startupsbot
@chidambara09
@fintechna
@iam__network
@machinelearnflx
@santchiweb
@nicochan33

Top Tweeters in G2:
@sirajs0l
@freiewelteu
@csa_dvillamizar
@hotjobfinder
@chaiberia
@gtpintado
@shellykramer
@securitynewsbot
@vectorfiveus
@fatimacherkasov

Top Tweeters in G3:
@chuckwendig
@electricboyo
@andrewdwilliams
@ellearmageddon
@ghlid42
@dave_cochran
@patrickcmiller
@jccraves
@scynewaive
@darksim905

Top Tweeters in G4:
@elcidbarett
@kas_stoner
@rdsweb
@securityblog
@swiftonsecurity
@campuscodi
@troyhunt
@claushoumann
@brianlinuxing
@lucasoft_co_uk

Top Tweeters in G5:
@cybertoolsbooks
@webironbots
@johnedginton
@pdp00000001
@saukel
@digital_mine_
@insecurestuff
@biogirl09
@vishne0
@emahmoudsoliman

Top Tweeters in G6:
@akwyz
@windows
@gvalan
@yvesmulkers
@forbes
@clairvoyant_the
@brianhonan
@techpearce2
@topcybernews
@pvynckier

Top Tweeters in G7:
@fhhknews
@joeklemmer
@jax_masters
@n3dj0ck
@yokoacc
@mtoecker
@gowthamsadasiva
@hansesecure
@paladin63
@hintz2010

Top Tweeters in G8:
@weems
@viss
@munin
@jaysonstreet
@wilk3ns
@cryptoishard
@omens
@marcusjcarey
@mcgrewsecurity
@tiwaggoner

Top Tweeters in G9:
@aaroncuddeback
@arauz2012
@wef
@dargon74
@korezian
@ethicsretweet
@jobinindia
@googlechrome
@tricorpscyber
@kits_news

Top Tweeters in G10:
@alizardx
@juliebhunt
@oscaron
@ralexjimenez
@kfalconspb
@daniel_bilar
@jaythl
@malwrhunterteam
@malwaretechblog
@jameswt_mht


We use necessary cookies to make our site work. We’d like to set additional cookies to understand site usage, make site improvements and to remember your settings. We also use cookies set by other sites to help deliver content from their services.