infosec, Twitter, 3/7/2022 10:57:38 PM, 272754


FAQ | Problem?

infosec_2022-03-07_11-24-24.xlsx
infosec_2022-03-07_11-24-24.xlsx
From:
NodeXLExcelAutomator
Uploaded on:
March 07, 2022
Short Description:
infosec via NodeXL https://bit.ly/3hJ8dqN
@alyssam_infosec
@botcybersec
@cybersec_feeds
@botsecx
@filipipires
@hackinarticles
@sectest9
@shad0wbits
@cybersecurityn8
@cyberknow20

Top hashtags:
#infosec
#cybersecurity
#python
#javascript
#security
#iot
#iiot
#reactjs

Description:
Description
The graph represents a network of 3,407 Twitter users whose tweets in the requested range contained "infosec", or who were replied to or mentioned in those tweets. The network was obtained from the NodeXL Graph Server on Monday, 07 March 2022 at 19:45 UTC.

The requested start date was Monday, 07 March 2022 at 01:01 UTC and the maximum number of days (going backward) was 14.

The maximum number of tweets collected was 7,500.

The tweets in the network were tweeted over the 2-day, 2-hour, 19-minute period from Wednesday, 02 March 2022 at 18:46 UTC to Friday, 04 March 2022 at 21:06 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 3407
Unique Edges : 4063
Edges With Duplicates : 15617
Total Edges : 19680
Number of Edge Types : 5
Retweet : 5435
MentionsInRetweet : 7021
Replies to : 933
Mentions : 4708
Tweet : 1583
Self-Loops : 1647
Reciprocated Vertex Pair Ratio : 0.0549450549450549
Reciprocated Edge Ratio : 0.104166666666667
Connected Components : 285
Single-Vertex Connected Components : 119
Maximum Vertices in a Connected Component : 2769
Maximum Edges in a Connected Component : 18843
Maximum Geodesic Distance (Diameter) : 12
Average Geodesic Distance : 4.210782
Graph Density : 0.000670099779029083
Modularity : 0.331628
NodeXL Version : 1.0.1.449
Data Import : The graph represents a network of 3,407 Twitter users whose tweets in the requested range contained "infosec", or who were replied to or mentioned in those tweets. The network was obtained from the NodeXL Graph Server on Monday, 07 March 2022 at 19:45 UTC.

The requested start date was Monday, 07 March 2022 at 01:01 UTC and the maximum number of days (going backward) was 14.

The maximum number of tweets collected was 7,500.

The tweets in the network were tweeted over the 2-day, 2-hour, 19-minute period from Wednesday, 02 March 2022 at 18:46 UTC to Friday, 04 March 2022 at 21:06 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

Layout Algorithm : The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.
Graph Source : GraphServerTwitterSearch
Graph Term : infosec
Groups : The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.
Edge Color : Edge Weight
Edge Width : Edge Weight
Edge Alpha : Edge Weight
Vertex Radius : Betweenness Centrality

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[26] https://www.cisa.gov/uscert/ncas/current-activity/2022/03/03/cisco-releases-security-updates-multiple-products
[12] https://hakin9.org/opensquat-domain-squatting-and-phishing-watchdog/
[11] http://ADExplorerSnapshot.py
[11] https://securityonline.info/adexplorersnapshot-py-ad-explorer-snapshot-ingestor-for-bloodhound/
[10] https://www.jobpreference.com/
[8] https://github.com/Ignitetechnologies/Linux-Privilege-Escalation
[8] https://www.coursereport.com/blog/python-for-cyber-security-with-flatiron-school
[7] https://www.youtube.com/channel/UCysdQYPU8M4Fa5fFlwwEw0Q
[7] https://www.infosec.news/2022/03/02/editoriale/guerra-cyber-e-rischio-russo-kaspersky-una-spina-nel-fianco/
[7] https://0x434b.dev/dabbling-with-linux-kernel-exploitation-ctf-challenges-to-learn-the-ropes/

Top URLs in Tweet in G1:
[10] https://www.jobpreference.com/
[7] https://www.coursereport.com/blog/python-for-cyber-security-with-flatiron-school
[6] https://play.google.com/store/apps/details?id=com.master.media.recovery.data.recovery&utm_source=Master+tech
[4] https://www.youtube.com/channel/UCysdQYPU8M4Fa5fFlwwEw0Q
[4] https://www.linkedin.com/pulse/how-identity-platform-drives-real-business-value-thwarting-mark-lynd
[4] https://centeridentity.com/
[4] https://phishstats.info/
[3] https://open.spotify.com/track/2o8kmcip6yKFcYGluRxWe5?si=FJx9wKfWRV-9ePQRcu9niw
[3] https://open.spotify.com/album/0y0WxAxhyfYQwaIrgwBfNs?si=WDOCJ6GFSCIPIP6-RKVKSA
[3] https://softclouds.com/devops-automate-workplace.html

Top URLs in Tweet in G2:
[1] https://www-pub.iaea.org/MTCD/Publications/PDF/PUB1918_web.pdf
[1] https://www.innocentlivesfoundation.org/ilf-board-of-directors-announcement-march-2022/
[1] https://twitter.com/LSimancek/status/1499103337949577217
[1] https://twitter.com/fairycakepixie/status/1499374080981708807
[1] https://www.linkedin.com/feed/update/urn:li:share:6904870234122264576
[1] https://thehackernews.com/2022/03/critical-bugs-reported-in-popular-open.html

Top URLs in Tweet in G3:
[25] https://www.cisa.gov/uscert/ncas/current-activity/2022/03/03/cisco-releases-security-updates-multiple-products
[12] https://hakin9.org/opensquat-domain-squatting-and-phishing-watchdog/
[9] http://ADExplorerSnapshot.py
[9] https://securityonline.info/adexplorersnapshot-py-ad-explorer-snapshot-ingestor-for-bloodhound/
[8] https://github.com/Ignitetechnologies/Linux-Privilege-Escalation
[7] https://0x434b.dev/dabbling-with-linux-kernel-exploitation-ctf-challenges-to-learn-the-ropes/
[6] https://dzone.com/articles/10-tips-to-become-a-better-java-developer-in-2018
[5] https://securityonline.info/nrich-quickly-analyze-all-ips/
[5] https://hakin9.org/h4rpy-an-automated-wpa-wpa2-psk-attack-tool/
[5] https://blog.finxter.com/python-cheat-sheets/

Top URLs in Tweet in G4:
[2] https://twitter.com/i/lists/1471377222371995650
[2] https://twitter.com/i/lists/1471736382146056193
[2] https://oxagast.org/posts/CVE-2019-15947-bitcoin-wallet-dat-core-dumps-design-flaw/
[1] https://ddanchev.blogspot.com/2022/02/public-stix-stix2-taxii-threat-actor.html
[1] https://www.prnewswire.com/news-releases/uptycs-adds-advanced-detection-capabilities-in-xdr-solution-to-bolster-protection-for-remote-workforces-301495194.html?tc=eml_cleartime&utm_content=199885434&utm_medium=social&utm_source=twitter&hss_channel=tw-771758396810952704
[1] https://tryhackme.com/b4db0y17/badges/hash-cracker
[1] https://twitter.com/i/lists/1471719126338920449
[1] https://twitter.com/i/lists/1471367805731696641
[1] https://twitter.com/i/lists/1471397901469245445
[1] https://twitter.com/TheHackersNews/status/1499328168410300416

Top URLs in Tweet in G5:
[2] https://www.theregister.com/2022/03/03/amazon_alexa_speaker_vuln/
[1] https://www.remotetechjobs.com/aws/93568/infosec-encryption-engineer
[1] https://www.enzoic.com/full-credentials-monitoring/
[1] https://thehackernews.com/2022/03/hackers-begin-weaponizing-tcp-middlebox.html?utm_content=199747597&utm_medium=social&utm_source=twitter&hss_channel=tw-414062274
[1] https://bit.ly/3ghvC1x?utm_content=199607856&utm_medium=social&utm_source=twitter&hss_channel=tw-1120345712514883584
[1] https://www.nqa.com/en-us/resources/blog/february-2022/infosec-standard-revisions
[1] https://projecthyphae.com/threat/does-your-hardened-network-keep-the-bad-guys-from-daxin-in/
[1] https://apple.news/AysNflSbETRGGV1GIsVqM-w?utm_content=buffer0261f&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
[1] https://github.com/awslabs/aws-cloudsaga
[1] https://www.cimcor.com/blog/what-are-software-supply-chain-attacks?utm_campaign=Software%20Supply%20Chain&utm_content=197022981&utm_medium=social&utm_source=twitter&hss_channel=tw-236995760

Top URLs in Tweet in G7:
[1] https://twitter.com/Ajediday/status/1499434121680019482

Top URLs in Tweet in G8:
[2] http://ADExplorerSnapshot.py
[2] https://securityonline.info/adexplorersnapshot-py-ad-explorer-snapshot-ingestor-for-bloodhound/
[2] https://kloudle.com/blog/piercing-the-cloud-armor-the-8kb-bypass-in-google-cloud-platform-waf
[2] https://citizenlab.ca/2022/01/2022-information-controls-fellowship-program/
[1] https://twitter.com/SwiftOnSecurity/status/1499442212098265089
[1] https://github.com/haidon603/PowerShellSecurityOps/blob/main/PulsediveThreatIndicatorAPI.ps1

Top URLs in Tweet in G9:
[1] https://www.corderycompliance.com/scce-webinar-data-protection-privacy-infringement/
[1] https://www.trustradius.com/products/infosec-skills/reviews?utm_source=linkedin&utm_medium=organic+social&utm_content=1646322178
[1] https://www.csoonline.com/article/3651348/how-to-prep-for-increased-russia-based-cyberattacks.html#tk.rss_all
[1] https://captimes.com/news/business/madison-cybersecurity-training-company-infosec-sells-for-191-million/article_ecfd5254-1521-54fc-83b4-d9dda399f011.html
[1] https://securityboulevard.com/2022/03/epic-psyop-ukrainians-leak-120000-russian-troops-info/

Top Domains
Top Domains in Tweet in Entire Graph:
[297] twitter.com
[175] cyberiqs.com
[145] hakin9.org
[110] google.com
[107] youtube.com
[103] github.com
[99] jobpreference.com
[85] darkreading.com
[84] bleepingcomputer.com
[77] thehackernews.com

Top Domains in Tweet in G1:
[222] twitter.com
[175] cyberiqs.com
[105] google.com
[99] jobpreference.com
[78] darkreading.com
[75] youtube.com
[68] bleepingcomputer.com
[59] hakin9.org
[57] scmagazine.com
[56] thehackernews.com

Top Domains in Tweet in G2:
[10] twitter.com
[3] innocentlivesfoundation.org
[3] thehackernews.com
[3] blogspot.com
[2] youtube.com
[1] realtor.ca
[1] google.com
[1] kitploit.com
[1] saporo.io
[1] techtarget.com

Top Domains in Tweet in G3:
[81] hakin9.org
[64] github.com
[38] hackers-arise.com
[32] securityonline.info
[31] cisa.gov
[25] kitploit.com
[15] isaac.tips
[13] cyberstartupobservatory.com
[12] adexplorersnapshot.py
[11] hackingarticles.in

Top Domains in Tweet in G4:
[16] twitter.com
[6] uptycs.com
[5] medium.com
[4] open-sez.me
[3] bleepingcomputer.com
[3] hakin9.org
[2] thehackernews.com
[2] blogspot.com
[2] darkreading.com
[2] wired.com

Top Domains in Tweet in G5:
[13] twitter.com
[4] theregister.com
[3] secureworks.com
[3] youtube.com
[3] securityweek.com
[3] clearedjobs.net
[2] thehackernews.com
[2] bit.ly
[2] github.com
[2] hispasec.com

Top Domains in Tweet in G6:
[1] securityonline.info

Top Domains in Tweet in G7:
[1] microsoft.com
[1] wikipedia.org
[1] twitter.com

Top Domains in Tweet in G8:
[3] twitter.com
[3] citizenlab.ca
[2] youtube.com
[2] adexplorersnapshot.py
[2] securityonline.info
[2] kloudle.com
[1] magnetsummit.com
[1] github.com

Top Domains in Tweet in G9:
[18] 1kosmos.com
[11] securityboulevard.com
[10] co.uk
[6] csoonline.com
[6] asureti.com
[3] zdnet.com
[3] knowledgespeak.com
[2] top10techtweets.com
[2] corderycompliance.com
[1] cyvatar.ai

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[3797] infosec
[2879] cybersecurity
[1854] python
[1705] javascript
[1657] security
[1493] iot
[1421] iiot
[1398] reactjs
[1371] pytorch
[1330] wordpress



Top Hashtags in Tweet in G1:
[2122] infosec
[1832] python
[1692] javascript
[1686] cybersecurity
[1523] security
[1483] iot
[1419] iiot
[1396] reactjs
[1370] pytorch
[1329] wordpress

Top Hashtags in Tweet in G2:
[40] infosec
[17] cybersecurity
[8] hacking
[8] ff
[7] pentesting
[6] security
[6] cyber
[6] womenshistorymonth
[5] opensource
[5] malware

Top Hashtags in Tweet in G3:
[770] infosec
[667] cybersecurity
[526] pentesting
[391] oscp
[348] informationsecurity
[347] redteam
[287] cissp
[206] cybersec
[125] hacking
[78] pentest

Top Hashtags in Tweet in G4:
[142] infosec
[97] cybersecurity
[58] ukrainerussiawar
[41] cyber
[22] threatintelligence
[22] cyberattacks
[22] cybertracker
[21] ukraine
[20] conti
[16] cobaltstrike

Top Hashtags in Tweet in G5:
[101] infosec
[52] cybersecurity
[23] security
[7] itsecurity
[7] privacy
[7] cyber
[6] cloud
[6] hacking
[6] technology
[6] cybersec

Top Hashtags in Tweet in G6:
[107] pentesting
[107] cybersecurity
[106] infosec
[105] hacking
[105] pentest
[1] windows
[1] oscp
[1] informationsecurity
[1] cissp
[1] redteam

Top Hashtags in Tweet in G8:
[29] ddos
[9] infosec
[4] pentesting
[3] securityonion
[3] research
[2] stopwar
[2] dfir
[2] bloodhound
[1] stopputinnow
[1] infosecurity

Top Hashtags in Tweet in G9:
[58] infosec
[56] cybersecurity
[26] dataprotection
[17] dataprivacy
[17] gdpr
[14] blog
[10] datavault
[10] regulations
[10] ccpa
[9] cybersec

Top Hashtags in Tweet in G10:
[25] infosec

Top Words
Top Words in Tweet in Entire Graph:
[3797] #infosec
[2879] #cybersecurity
[1877] #python
[1732] #javascript
[1668] #security
[1516] #iot
[1444] #iiot
[1411] #reactjs
[1388] #pytorch
[1342] #wordpress

Top Words in Tweet in G1:
[2122] #infosec
[1855] #python
[1719] #javascript
[1686] #cybersecurity
[1534] #security
[1506] #iot
[1442] #iiot
[1409] #reactjs
[1387] #pytorch
[1341] #wordpress

Top Words in Tweet in G2:
[513] alyssam_infosec
[135] infosec
[108] security
[100] cyber
[78] information
[51] infosec_taylor
[49] think
[47] more
[41] coleens_
[40] bobotjones

Top Words in Tweet in G3:
[770] #infosec
[667] #cybersecurity
[526] #pentesting
[391] #oscp
[348] #informationsecurity
[347] #redteam
[287] #cissp
[229] hackinarticles
[209] #cybersec
[153] cheat

Top Words in Tweet in G4:
[142] #infosec
[99] groups
[97] #cybersecurity
[82] cyberknow20
[58] updated
[58] #ukrainerussiawar
[50] list
[50] mar
[50] added
[42] more

Top Words in Tweet in G5:
[101] #infosec
[52] #cybersecurity
[26] infosec
[23] #security
[20] security
[15] cybersecurity
[11] more
[11] cyber
[10] compliance
[8] data

Top Words in Tweet in G6:
[107] #pentesting
[107] #cybersecurity
[106] #infosec
[105] #hacking
[105] #pentest
[104] shad0wbits

Top Words in Tweet in G7:
[42] zarchasmpgmr
[40] alyssam_infosec
[37] alexmuentz
[37] elkentaro
[37] kobeski1906
[36] justthisguy
[36] m0nkeydrag0n
[36] trashp4ndasec
[35] ajediday
[35] philly2600

Top Words in Tweet in G8:
[31] russia
[30] belorus
[29] stop
[29] providing
[29] #ddos
[29] protection
[29] dear
[29] akamai
[29] cloudflare
[29] awscloud

Top Words in Tweet in G9:
[58] #infosec
[56] #cybersecurity
[26] #dataprotection
[17] #dataprivacy
[17] #gdpr
[14] read
[14] more
[14] #blog
[13] identity
[12] today

Top Words in Tweet in G10:
[32] know
[29] wookiee__
[25] #infosec
[25] really
[25] needs
[25] decent
[25] human
[25] beings
[16] infosec
[7] many

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[1389] #iot,#iiot
[1297] #javascript,#reactjs
[1223] #reactjs,#wordpress
[1094] #wordpress,#security
[1013] #infosec,#cybersecurity
[997] #iiot,#pytorch
[970] #security,#defi
[876] #python,#iot
[770] #pytorch,#javascript
[695] #cybersecurity,#infosec

Top Word Pairs in Tweet in G1:
[1388] #iot,#iiot
[1296] #javascript,#reactjs
[1222] #reactjs,#wordpress
[1093] #wordpress,#security
[996] #iiot,#pytorch
[969] #security,#defi
[875] #python,#iot
[770] #pytorch,#javascript
[582] #defi,#ad
[554] #python,#ai

Top Word Pairs in Tweet in G2:
[26] girlgerms,alyssam_infosec
[25] information,security
[25] nickbown,alsa_dat
[25] alsa_dat,pest64
[25] pest64,girlgerms
[25] alyssam_infosec,thateffinflower
[25] thateffinflower,neurorebel
[25] neurorebel,biggmattweaford
[25] tartanllama,synack
[25] blakesobczak,zbraiterman

Top Word Pairs in Tweet in G3:
[521] #infosec,#cybersecurity
[388] #cybersecurity,#pentesting
[385] #pentesting,#oscp
[337] #oscp,#informationsecurity
[266] #cissp,#redteam
[200] #informationsecurity,#cissp
[178] #redteam,#cybersec
[145] cheat,sheet
[87] #informationsecurity,#hacking
[87] #hacking,#cissp

Top Word Pairs in Tweet in G4:
[50] mar,updated
[50] groups,added
[46] cyberknow20,mar
[40] involved,#ukrainerussiawar
[39] #cybersecurity,#infosec
[37] list,#cyber
[37] #cyber,groups
[35] updated,list
[35] groups,involved
[29] #ukrainerussiawar,more

Top Word Pairs in Tweet in G5:
[18] #infosec,#cybersecurity
[12] #cybersecurity,#infosec
[6] #cybersec,#infosec
[5] #security,#infosec
[4] #itsecurity,#infosec
[4] #infosec,#threatintelligence
[4] #cybersecurity,#security
[4] #security,#technology
[4] cyber,security
[3] data,privacy

Top Word Pairs in Tweet in G6:
[105] #hacking,#pentesting
[105] #pentesting,#pentest
[105] #pentest,#cybersecurity
[105] #cybersecurity,#infosec
[104] shad0wbits,#hacking

Top Word Pairs in Tweet in G7:
[36] elkentaro,kobeski1906
[35] philly2600,trashp4ndasec
[35] trashp4ndasec,alexmuentz
[35] alexmuentz,elkentaro
[29] dcuplink,nousie
[29] nousie,sidragon1
[29] quadling,1dark0ne
[29] slangwife,siliconshecky
[29] siliconshecky,kingthorin_rm
[29] evm_sec,katecrime13

Top Word Pairs in Tweet in G8:
[30] russia,belorus
[29] stop,providing
[29] providing,#ddos
[29] #ddos,protection
[29] protection,russia
[29] belorus,dear
[29] dear,akamai
[29] akamai,cloudflare
[29] cloudflare,awscloud
[29] awscloud,awssecurityinfo

Top Word Pairs in Tweet in G9:
[22] #cybersecurity,#infosec
[10] #datavault,compare
[10] compare,#dataprotection
[10] #dataprotection,#regulations
[10] #regulations,#ccpa
[10] #ccpa,#gdpr
[10] #gdpr,#blog
[10] #blog,#dataprivacy
[9] #cybersecurity,#cybersec
[9] #cybersec,#infosec

Top Word Pairs in Tweet in G10:
[25] know,#infosec
[25] #infosec,really
[25] really,needs
[25] needs,decent
[25] decent,human
[25] human,beings
[24] wookiee__,know
[3] many,years
[2] progeer,extremely
[2] extremely,yes

Top Replied-To
Top Replied-To in Entire Graph:
@alyssam_infosec
@kiiara
@infosec_taylor
@ellearmageddon
@kim_crawley
@sherrod_im
@infosec_90
@deviantollam
@teck923
@amunfox

Top Replied-To in G1:
@kiiara
@supimbianca
@albertogaruccio
@culer014
@kylejgabriel
@lilaaron911
@readersdigest
@dynamicciso
@shillman1

Top Replied-To in G2:
@alyssam_infosec
@infosec_taylor
@ellearmageddon
@kim_crawley
@sherrod_im
@deviantollam
@teck923
@notshenetworks
@mrjeffman
@s0ciabl3ng

Top Replied-To in G7:
@amunfox
@fpieces
@docwho76
@zarchasmpgmr
@markmorow
@joeknowscyber
@litmoose
@khaxan
@ajediday
@alyssam_infosec

Top Replied-To in G8:
@laughing_mantis
@cyb3rops
@taosecurity
@doomsdaygoth
@alyssam_infosec
@youreafed
@mrjeffman
@swiftonsecurity

Top Replied-To in G9:
@tecflack

Top Replied-To in G10:
@siliconshecky
@progeer
@alyssam_infosec
@wookiee__
@bettersafetynet
@rjacksix

Top Mentioned
Top Mentioned in Entire Graph:
@kiiara
@mobile_morgue
@hackinarticles
@unlimitedcursor
@alyssam_infosec
@cyberiqs_
@hakin9
@three_cube
@shubham_pen
@programmerjoke9

Top Mentioned in G1:
@kiiara
@mobile_morgue
@unlimitedcursor
@cyberiqs_
@programmerjoke9
@detroit_riddler
@emergingexit
@hackinarticles
@paula_piccard
@bamitav

Top Mentioned in G2:
@alyssam_infosec
@coleens_
@bobotjones
@synack
@alsa_dat
@medus4_cdc
@pest64
@girlgerms
@neurorebel
@thateffinflower

Top Mentioned in G3:
@hackinarticles
@three_cube
@hakin9
@ptracesecurity
@shubham_pen
@uscert_gov
@nandanlohitaksh
@securityguill
@cybersecob
@nsacyber

Top Mentioned in G4:
@cyberknow20
@s0ufi4n3
@campuscodi
@interlockweb3
@alvierid
@vxunderground
@sosintel
@gossithedog
@hackinarticles
@stephanenappo

Top Mentioned in G5:
@aware_hq
@stevesanders7
@tucutech
@daedalus_mag
@1lpic

Top Mentioned in G6:
@shad0wbits
@ptracesecurity
@hackinarticles

Top Mentioned in G7:
@zarchasmpgmr
@alyssam_infosec
@alexmuentz
@kobeski1906
@trashp4ndasec
@justthisguy
@m0nkeydrag0n
@philly2600
@elkentaro
@ajediday

Top Mentioned in G8:
@akamai
@cloudflare
@awscloud
@awssecurityinfo
@imperva
@radware
@andriinb
@ptracesecurity
@taosecurity
@swiftonsecurity

Top Mentioned in G9:
@datavault_uk
@cyvatar
@securityblvd
@datashadow
@reach2ratan
@infosecedu
@armstrongjp
@tag_cyber
@janeparrish
@netabstraction

Top Mentioned in G10:
@wookiee__
@progeer
@alyssam_infosec
@saraislet
@mangopdf
@the
@thegrugq
@rjacksix
@johnmccumber
@bettersafetynet

Top Tweeters
Top Tweeters in Entire Graph:
@informacija
@sectest9
@cybersec_feeds
@codedailybot
@javascriptd
@united
@ipythonistabot
@cybersecurityn8
@morolswediu
@coder_487

Top Tweeters in G1:
@informacija
@sectest9
@cybersec_feeds
@codedailybot
@javascriptd
@ipythonistabot
@cybersecurityn8
@morolswediu
@coder_487
@discovertech3

Top Tweeters in G2:
@kas_stoner
@greatdismal
@kim_crawley
@toadcialism
@uk_daniel_card
@royalhoeliness
@ellearmageddon
@dominickevans
@hacks4pancakes
@munin

Top Tweeters in G3:
@thomasclone
@raivoonet
@adekleine
@youranonriots
@jose_baha
@mrpshropshire
@urbanosoax
@matuken
@rdsweb
@hectorduathlon1

Top Tweeters in G4:
@francodespecho
@superteamml
@serghiosir
@verge
@ipfconline1
@juliewa43117224
@topcybernews
@campuscodi
@techie_wiz
@soundmigration

Top Tweeters in G5:
@skoops
@cybersecdn
@softwarnet
@lopezunwired
@tazwake
@future_of_ai
@clearedjobsnet
@neurovagrant
@hbbisenieks
@remotetechjobs0

Top Tweeters in G6:
@walker8701
@raypride
@andrewdwilliams
@philile_zandi
@terence_da_amog
@lockon_rftf
@jhlrsn
@allanmatic
@snacksized__
@probgoblin

Top Tweeters in G7:
@nerdpyle
@whereisthespai
@justthisguy
@zarchasmpgmr
@sqlcheesecake
@carmencrincoli
@shatter242
@malwarejake
@khaxan
@mx0x20wednesday

Top Tweeters in G8:
@securityblog
@dare_dems
@swiftonsecurity
@mkedgt2
@skymarkeer
@cloudflare
@awscloud
@jaapengel79
@z_everson
@krasnomovets

Top Tweeters in G9:
@superteamup
@productier1
@gdpr25thmay18
@datavault_uk
@rohanpinto
@metodologiaecs
@secdevb
@richi
@technativewire
@captimes

Top Tweeters in G10:
@alizardx
@thegrugq
@wettanaam
@geo_walters
@rjacksix
@virtadpt
@olagoke__
@drb0n3z
@bydisable
@amygdaloidspew


We use necessary cookies to make our site work. We’d like to set additional cookies to understand site usage, make site improvements and to remember your settings. We also use cookies set by other sites to help deliver content from their services.