(Cyber Security) OR Cybersecurity, Twitter, 10/4/2022 3:24:45 PM, 282294


FAQ | Problem?

(Cyber Security) OR Cybersecurity_2022-10-03_23-30-00.xlsx
(Cyber Security) OR Cybersecurity_2022-10-03_23-30-00.xlsx
From:
NodeXLExcelAutomator
Uploaded on:
October 04, 2022
Short Description:
(Cyber Security) OR Cybersecurity via NodeXL https://bit.ly/3ruKL5y
@cybersecurityn8
@sectest9
@guardocean_
@shubham_pen
@mrtdjames92
@cisagov
@paula_piccard
@hackinarticles
@jayeshmthakur
@itspmagazine

Top hashtags:
#cybersecurity
#datascience
#ai
#python

Description:
Description
The graph represents a network of 5,066 Twitter users whose tweets in the requested range contained "(Cyber Security) OR Cybersecurity", or who were replied to or mentioned in those tweets. The network was obtained from the NodeXL Graph Server on Tuesday, 04 October 2022 at 06:41 UTC.

The requested start date was Tuesday, 04 October 2022 at 00:01 UTC and the maximum number of days (going backward) was 14.

The maximum number of tweets collected was 7,500.

The tweets in the network were tweeted over the 2-day, 2-hour, 2-minute period from Saturday, 01 October 2022 at 21:58 UTC to Tuesday, 04 October 2022 at 00:01 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 5066
Unique Edges : 3334
Edges With Duplicates : 13101
Total Edges : 16435
Number of Edge Types : 5
Retweet : 5583
MentionsInRetweet : 6548
Mentions : 1749
Tweet : 2287
Replies to : 268
Self-Loops : 2441
Reciprocated Vertex Pair Ratio : 0.0109348529185276
Reciprocated Edge Ratio : 0.0216331505179768
Connected Components : 1033
Single-Vertex Connected Components : 508
Maximum Vertices in a Connected Component : 2479
Maximum Edges in a Connected Component : 12469
Maximum Geodesic Distance (Diameter) : 15
Average Geodesic Distance : 5.30103
Graph Density : 0.000255813781285453
Modularity : 0.381675
NodeXL Version : 1.0.1.504
Data Import : The graph represents a network of 5,066 Twitter users whose tweets in the requested range contained "(Cyber Security) OR Cybersecurity", or who were replied to or mentioned in those tweets. The network was obtained from the NodeXL Graph Server on Tuesday, 04 October 2022 at 06:41 UTC.

The requested start date was Tuesday, 04 October 2022 at 00:01 UTC and the maximum number of days (going backward) was 14.

The maximum number of tweets collected was 7,500.

The tweets in the network were tweeted over the 2-day, 2-hour, 2-minute period from Saturday, 01 October 2022 at 21:58 UTC to Tuesday, 04 October 2022 at 00:01 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

Layout Algorithm : The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.
Graph Source : GraphServerTwitterSearch
Graph Term : (Cyber Security) OR Cybersecurity
Groups : The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.
Edge Color : Edge Weight
Edge Width : Edge Weight
Edge Alpha : Edge Weight
Vertex Radius : Betweenness Centrality

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[121] https://www.explanations-pro.com/
[93] https://79f2fanvofsx8yfcfi952qey5a.hop.clickbank.net/
[39] https://apps.explanations-pro.com/2022/09/Best-App-builder-Without-Coding.html?m=1
[28] https://twinybots.ch/
[27] https://apps.explanations-pro.com/2022/10/rational-application-developer.html
[27] https://health.explanations-pro.com/2022/10/Health-Benefits-of-Tomatoes.html
[27] https://getpvaaccount.com/buy-edu-emails/
[25] https://apps.explanations-pro.com/2022/09/Online-App-Maker.html
[25] https://apps.explanations-pro.com/2022/09/Rational-Application-Developer.html
[23] https://getpvaaccount.com/buy-tinder-accounts/

Top URLs in Tweet in G1:
[118] https://www.explanations-pro.com/
[92] https://79f2fanvofsx8yfcfi952qey5a.hop.clickbank.net/
[37] https://apps.explanations-pro.com/2022/09/Best-App-builder-Without-Coding.html?m=1
[27] https://getpvaaccount.com/buy-edu-emails/
[25] https://health.explanations-pro.com/2022/10/Health-Benefits-of-Tomatoes.html
[24] https://apps.explanations-pro.com/2022/10/rational-application-developer.html
[23] https://apps.explanations-pro.com/2022/09/Rational-Application-Developer.html
[23] https://getpvaaccount.com/buy-tinder-accounts/
[22] https://apps.explanations-pro.com/2022/09/Online-App-Maker.html
[22] https://getpvaaccount.com/buy-snapchat-accounts/

Top URLs in Tweet in G2:
[13] https://twinybots.ch/
[7] https://www.password-sentry.com/
[5] https://staysafeonline.org/cybersecurity-awareness-month/
[4] https://www.forbes.com/sites/chuckbrooks/2022/10/02/for-cybersecurity-awareness-month-and-halloween--some-scary-cyber-threat-stats/
[3] https://staysafeonline.org/programs/cybersecurity-awareness-month/
[3] https://towardsdatascience.com/as-mlops-hits-maturity-its-time-to-consider-cybersecurity-ebd45e350532?source=social.tw
[3] https://www.forbes.com/sites/chuckbrooks/2022/10/02/for-cybersecurity-awareness-month-and-halloween--some-scary-cyber-threat-stats/?utm_source=dlvr.it&utm_medium=twitter
[3] https://heartonmy.com/discount/AdaLovelace?redirect=%2Fcollections%2Fada-lovelace-day-oct-12
[2] https://www.crowdstrike.com/cybersecurity-101/machine-learning-cybersecurity/?utm_source=dlvr.it&utm_medium=twitter
[2] https://www.dw.com/en/critical-cybersecurity-infrastructure-how-can-countries-protect-themselves-against-cyberattacks/a-63295176

Top URLs in Tweet in G3:
[12] https://foxutech.com/what-is-dns-and-how-it-works/
[12] https://www.whitehouse.gov/briefing-room/presidential-actions/2022/09/30/a-cybersecurity-awareness-month-2022/
[11] https://elbucheron.github.io/posters/tools_commands/linux_architecture.jpg
[9] https://helloitsliam.com/2015/06/03/web-app-penetration-testing-infographic/
[9] https://phoenixnap.com/kb/vim-commands-cheat-sheet
[8] https://bakerstreetforensics.com/2022/01/07/quickpcap-capturing-a-pcap-with-powershell/
[7] https://intellipaat.com/blog/tutorial/amazon-web-services-aws-tutorial/aws-cheat-sheet/
[7] https://www.git-tower.com/blog/command-line-cheat-sheet/
[6] http://www.securityweek.com/images/features/CTI_Mind_Map.png
[6] https://github.com/imran-parray/Mind-Maps/tree/master/Access%20Control%20Vulnerabilities%20-%20Pratik%20Gaikwad

Top URLs in Tweet in G4:
[2] https://aptlearn.io/courses/internet-cyber-security-certification-course/

Top URLs in Tweet in G5:
[11] https://www.electricbrain.com.au/pages/analytics/realtime-graphs-of-stuff.php
[8] https://www.sans.org/specials/north-america/?utm_medium=Social&utm_source=Twitter&utm_campaign=OnDemand#ondemand-specials
[8] https://conflictsoflaw.wordpress.com/2022/09/27/cyber-warfare-capabilities-must-be-developed-in-india-opined-visionary-praveen-dalal-in-2011/
[6] https://www.sans.org/webcasts/cyber-solutions-fest-2022-threat-hunting-intelligence/?source=landingpage?utm_medium=Social&utm_source=Twitter&utm_campaign=Cyber+Solutions+Fest+2022
[6] https://www.sans.org/u/1lvP
[6] https://conflictsoflaw.wordpress.com/2022/09/27/cyber-warfare-against-india-and-its-defenses-as-suggested-by-visionary-praveen-dalal-in-2012/
[5] https://www.sans.org/webcasts/cyber-solutions-fest-2022-soc-soar/?source=landingpage?utm_medium=Social&utm_source=Twitter&utm_campaign=Cyber+Solutions+Fest+2022
[5] https://www.sans.org/webcasts/cyber-solutions-fest-2022-cloud-security/?source=landingpage?utm_medium=Social&utm_source=Twitter&utm_campaign=Cyber+Solutions+Fest+2022
[4] https://streamivirtualschool.wordpress.com/2022/09/08/india-is-a-sitting-duck-in-cyber-security-area-warned-visionary-praveen-dalal-in-2014/
[4] https://conflictsoflaw.wordpress.com/2022/09/29/who-and-global-scientists-are-uncertain-on-effect-of-electromagnetic-fields-emfs-on-health/

Top URLs in Tweet in G6:
[2] https://go.dhs.gov/ZS8
[2] https://www.getcybersafe.gc.ca/en/cyber-security-awareness-month
[1] https://www.ncsc.gov.uk/speech/lindy-cameron-chatham-house-security-and-defence-conference-2022
[1] https://www.washingtonpost.com/politics/2022/09/28/camille-stewart-gloster-shares-her-plans-new-white-house-cyber-gig/
[1] https://www.youtube.com/watch?v=l7ZGCB-V9Ps

[1] https://cisa.gov/cybersecurity-awareness-month
[1] https://www.wsj.com/articles/temple-grandin-wants-all-types-of-minds-to-contribute-to-society-11664555131
[1] https://bit.ly/3dZ5NpM
[1] https://www.canada.ca/en/communications-security/news/2022/09/cyber-security-awareness-month-2022.html
[1] https://twitter.com/dannyjpalmer/status/1575481844132327424

Top URLs in Tweet in G9:
[8] https://twinybots.ch/
[3] https://www.helpnetsecurity.com/2022/09/19/vulnerabilities-harbor-open-source-artifact-registry/?utm_source=dlvr.it&utm_medium=twitter
[3] https://www.darkreading.com/attacks-breaches/malicious-apps-millions-downloads-apple-google-app-stores?utm_source=dlvr.it&utm_medium=twitter
[3] https://www.helpnetsecurity.com/2022/09/19/improving-soc-programs/?utm_source=dlvr.it&utm_medium=twitter
[3] https://go.theregister.com/feed/www.theregister.com/2022/09/27/samsung_data_theft_lawsuit/?utm_source=dlvr.it&utm_medium=twitter
[3] https://securitybrief.asia/story/yubico-research-finds-concerning-trends-around-authentication-security-practices?utm_source=dlvr.it&utm_medium=twitter
[3] https://www.helpnetsecurity.com/2022/09/27/everbridge-david-alexander/?utm_source=dlvr.it&utm_medium=twitter
[2] https://www.darkreading.com/vulnerabilities-threats/should-hacking-have-a-code-of-conduct-?utm_source=dlvr.it&utm_medium=twitter
[2] https://www.darkreading.com/application-security/recession-jitters-ma-dominates-robust-cybersecurity-market?utm_source=dlvr.it&utm_medium=twitter
[2] https://apps.explanations-pro.com/2022/10/rational-application-developer.html

Top URLs in Tweet in G10:
[3] https://www.youtube.com/watch?v=iPcdPks_nxc

[3] https://www.cnbc.com/video/2022/09/30/traditional-approaches-to-cybersecurity-dont-work-says-crowdstrike.html
[2] https://stockhead.com.au/experts/moneytalks-3-cybersecurity-stocks-to-watch-in-the-wake-of-the-optus-hack/
[2] https://www.briskinfosec.com/blogs/blogsdetail/6-Cybersecurity-measures-that-Organizations-tend-to-overlook
[2] https://www.informationweek.com/security-and-risk-strategy/cybersecurity-just-became-a-board-issue-for-real
[2] https://twitter.com/womenknowcyber/lists/women-in-cybersecurity-1/members
[2] https://www.pressreleasepoint.com/university-phoenix-lead-cybersecurity-faculty-stephanie-benoit-kurtz-keynote-women-it-special-event
[1] https://www.banyansecurity.io/resource/why-vpns-suck/?utm_medium=social-organic&utm_source=Twitter&utm_term=&utm_content=Resource&utm_campaign=ZTNA-VS-VPN-Video
[1] https://www.banyansecurity.io/resource/elevate-security-with-device-trust/?utm_medium=social-organic&utm_source=Twitter&utm_term=&utm_content=&utm_campaign=Solution_brief_Elevate_Security_with_Device_Trust
[1] https://www.banyansecurity.io/resource/episode-8-theresa-payton-in-conversation-with-den-jones/?utm_source=Twitter&utm_medium=LP&utm_campaign=PC

Top Domains
Top Domains in Tweet in Entire Graph:
[417] explanations-pro.com
[135] twitter.com
[126] youtube.com
[102] getpvaaccount.com
[93] clickbank.net
[67] medium.com
[65] channel969.com
[64] github.com
[62] com.au
[55] blogspot.com

Top Domains in Tweet in G1:
[391] explanations-pro.com
[101] getpvaaccount.com
[92] clickbank.net
[65] channel969.com
[64] youtube.com
[47] blogspot.com
[43] twitter.com
[29] cybersecjobs.io
[25] thejavasea.com
[24] semicolonit.com

Top Domains in Tweet in G2:
[21] twitter.com
[16] google.com
[14] linkedin.com
[13] twinybots.ch
[13] password-sentry.com
[11] com.au
[11] staysafeonline.org
[8] forbes.com
[8] bombolo.in
[6] hackthebox.com

Top Domains in Tweet in G3:
[29] github.com
[12] foxutech.com
[12] whitehouse.gov
[11] github.io
[10] networkwalks.com
[9] helloitsliam.com
[9] phoenixnap.com
[8] bakerstreetforensics.com
[7] intellipaat.com
[7] git-tower.com

Top Domains in Tweet in G4:
[2] aptlearn.io

Top Domains in Tweet in G5:
[40] sans.org
[28] wordpress.com
[16] youtube.com
[12] com.au
[12] explanations-pro.com
[11] cybersecurity-insiders.com
[9] hackers-arise.com
[9] twitter.com
[5] appcast.io
[4] bit.ly

Top Domains in Tweet in G6:
[3] twitter.com
[2] gov.uk
[2] dhs.gov
[2] bit.ly
[2] gc.ca
[1] washingtonpost.com
[1] youtube.com
[1] cisa.gov
[1] wsj.com
[1] canada.ca

Top Domains in Tweet in G9:
[13] theregister.com
[11] explanations-pro.com
[10] malwarebytes.com
[9] helpnetsecurity.com
[8] twinybots.ch
[7] darkreading.com
[6] securitybrief.asia
[5] thehackernews.com
[5] github.io
[4] twitter.com

Top Domains in Tweet in G10:
[5] twitter.com
[5] atos.net
[4] banyansecurity.io
[3] youtube.com
[3] cnbc.com
[2] com.au
[2] briskinfosec.com
[2] informationweek.com
[2] pressreleasepoint.com
[1] reddit.com

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[3637] cybersecurity
[1625] datascience
[1352] ai
[1131] python
[1112] machinelearning
[1038] infosec
[1004] bigdata
[697] analytics
[696] 100daysofcode
[531] pentesting



Top Hashtags in Tweet in G1:
[1853] cybersecurity
[1496] datascience
[1237] ai
[1063] python
[1057] machinelearning
[945] bigdata
[667] analytics
[643] 100daysofcode
[441] sql
[433] programming

Top Hashtags in Tweet in G2:
[253] cybersecurity
[35] security
[33] cybersecurityawarenessmonth
[33] infosec
[25] cyber
[22] becybersmart
[16] websitesecurity
[11] news
[9] trending
[8] gamers

Top Hashtags in Tweet in G3:
[469] cybersecurity
[360] pentesting
[353] infosec
[287] oscp
[218] informationsecurity
[149] cissp
[146] redteam
[116] cybersecuritytips
[88] hacking
[71] datascience

Top Hashtags in Tweet in G5:
[214] cybersecurity
[59] cyberwarfare
[53] digitalindia
[44] cyberlaw
[39] infosec
[25] cyberwar
[22] datascience
[14] pentesting
[14] ai
[14] technology

Top Hashtags in Tweet in G6:
[11] cybersecurityawarenessmonth
[9] cybermonth
[6] cybermonth2022
[4] cybersecurity
[4] becybersmart
[4] oascybersymposium22
[3] seeyourselfincyber
[3] becybersafe
[2] thegfce
[2] international

Top Hashtags in Tweet in G9:
[99] cybersecurity
[59] infosec
[31] news
[20] security
[13] datascience
[10] phishing
[10] ethicalhacking
[9] pentesting
[8] neuralnetworks
[7] cybersecuritynews

Top Hashtags in Tweet in G10:
[33] cybersecurity
[13] infosec
[10] business
[6] security
[6] ciso
[5] cybercrime
[5] women
[5] leadership
[5] management
[5] ceo

Top Words
Top Words in Tweet in Entire Graph:
[3637] #cybersecurity
[1684] cybersecurity
[1625] #datascience
[1363] security
[1352] #ai
[1352] cyber
[1131] #python
[1112] #machinelearning
[1038] #infosec
[1004] #bigdata

Top Words in Tweet in G1:
[1853] #cybersecurity
[1496] #datascience
[1237] #ai
[1063] #python
[1057] #machinelearning
[945] #bigdata
[667] #analytics
[649] #100daysofcode
[441] #sql
[433] #programming

Top Words in Tweet in G2:
[317] cybersecurity
[253] #cybersecurity
[184] security
[174] cyber
[137] month
[103] awareness
[67] more
[65] october
[54] data
[45] business

Top Words in Tweet in G3:
[469] #cybersecurity
[360] #pentesting
[353] #infosec
[287] #oscp
[218] #informationsecurity
[159] credit
[149] #cissp
[148] shubham_pen
[146] #redteam
[121] cybersecurity

Top Words in Tweet in G4:
[167] data
[164] design
[147] cyber
[147] security
[143] analysis
[142] management
[140] ui
[140] ux
[139] interested
[139] learning

Top Words in Tweet in G5:
[214] #cybersecurity
[94] india
[93] visionary
[91] impraveendalal
[59] #cyberwarfare
[53] #digitalindia
[48] cybersecurity
[48] congress
[48] bjp
[46] aadhaarlies

Top Words in Tweet in G6:
[120] cybersecurity
[100] month
[80] awareness
[54] rgb_lights
[38] cyber
[23] security
[19] year
[17] cisajen
[17] importance
[12] more

Top Words in Tweet in G7:
[129] degree
[128] mrtdjames92
[128] cyber
[126] officially
[126] done
[126] school
[126] bachelors
[126] computer
[126] information
[126] science

Top Words in Tweet in G8:
[196] server
[98] feel
[98] really
[98] bad
[98] smg4
[98] getting
[98] completely
[98] destroyed
[98] fm54321
[98] building

Top Words in Tweet in G9:
[99] #cybersecurity
[59] #infosec
[35] security
[31] #news
[27] cybersecurity
[22] cyber
[20] #security
[19] awareness
[17] microsoft
[16] month

Top Words in Tweet in G10:
[33] #cybersecurity
[31] cybersecurity
[20] gt
[18] women
[16] more
[14] security
[13] #infosec
[12] cybersecmeg
[12] cyber
[11] reddit

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[727] cyber,security
[565] #machinelearning,#datascience
[555] awareness,month
[539] #infosec,#cybersecurity
[522] #cybersecurity,#bigdata
[492] cybersecurity,awareness
[441] #bigdata,#analytics
[420] #analytics,#ai
[386] #pentesting,#oscp
[384] #sql,#cybersecurity

Top Word Pairs in Tweet in G1:
[550] #machinelearning,#datascience
[505] #cybersecurity,#bigdata
[427] #bigdata,#analytics
[407] #analytics,#ai
[371] #sql,#cybersecurity
[370] #datascience,#sql
[355] #ai,#iiot
[299] #datascience,#neuralnetworks
[296] #iiot,#python
[274] #python,#rstats

Top Word Pairs in Tweet in G2:
[90] cyber,security
[87] awareness,month
[76] cybersecurity,awareness
[26] october,cybersecurity
[18] #cybersecurity,#infosec
[18] learn,more
[17] safe,online
[17] #cybersecurity,#security
[17] security,awareness
[17] bachelor,science

Top Word Pairs in Tweet in G3:
[292] #infosec,#cybersecurity
[287] #pentesting,#oscp
[191] #cybersecurity,#pentesting
[115] #cybersecurity,#cybersecuritytips
[114] #cybersecuritytips,#pentesting
[114] #oscp,#redteam
[113] #redteam,#informationsecurity
[103] #oscp,#informationsecurity
[103] credit,#infosec
[100] #informationsecurity,#cissp

Top Word Pairs in Tweet in G4:
[147] cyber,security
[143] data,analysis
[141] analysis,cyber
[140] ui,ux
[139] interested,learning
[139] learning,skills
[139] skills,ui
[139] ux,design
[139] design,project
[139] project,management

Top Word Pairs in Tweet in G5:
[91] visionary,impraveendalal
[43] impraveendalal,2011
[38] suggested,visionary
[34] #digitalindia,#cybersecurity
[30] #cybersecurity,#cyberlaw
[28] congress,bjp
[25] #cyberlaw,#cyberwar
[24] opined,visionary
[22] policy,india
[21] #cyberwarfare,capabilities

Top Word Pairs in Tweet in G6:
[76] awareness,month
[70] cybersecurity,awareness
[52] rgb_lights,cybersecurity
[15] cyber,security
[9] year,#cybersecurityawarenessmonth
[9] #cybersecurityawarenessmonth,presents
[9] presents,opportunity
[9] opportunity,highlight
[9] highlight,importance
[9] importance,cybersecurity

Top Word Pairs in Tweet in G7:
[126] officially,done
[126] done,school
[126] school,bachelors
[126] bachelors,degree
[126] degree,computer
[126] computer,information
[126] information,science
[126] science,major
[126] major,cyber
[125] mrtdjames92,officially

Top Word Pairs in Tweet in G8:
[98] feel,really
[98] really,bad
[98] bad,smg4
[98] smg4,server
[98] server,getting
[98] getting,completely
[98] completely,destroyed
[98] destroyed,fm54321
[98] fm54321,building
[98] building,server

Top Word Pairs in Tweet in G9:
[41] #cybersecurity,#infosec
[23] #news,#cybersecurity
[16] cybersecurity,awareness
[16] awareness,month
[14] cyber,security
[8] covid,19
[8] #infosec,#cybersecurity
[8] #datascience,#neuralnetworks
[7] #neuralnetworks,#ethicalhacking
[7] month,explore

Top Word Pairs in Tweet in G10:
[11] reddit,cybersecurity
[11] cybersecurity,hosting
[11] hosting,ask
[11] ask,anything
[11] anything,several
[11] several,prominent
[11] prominent,cisos
[11] cisos,women
[11] women,wanna
[10] gt,gt

Top Replied-To
Top Replied-To in Entire Graph:
@itzareous
@themooncarl
@karenandrewsmp
@senshenderson
@_johnhammond
@cryptogems555
@thedoomerpluto
@davidgokhshtein
@joshgnosis
@thebayayk

Top Replied-To in G1:
@html5
@windows
@javascript
@sourabhskatoch
@cryptojack
@cryptogems555
@chinapumpwxc
@cryptogemspump
@cryptoemdarks
@ralvero

Top Replied-To in G3:
@nassorg
@chronicbabak
@kirkdborne

Top Replied-To in G4:
@itzareous
@unkleayo
@seunfunmiiii

Top Replied-To in G5:
@forget_them_bro
@l0psec
@cryptogemscom
@veracode
@_madjuwah_

Top Replied-To in G6:
@rgb_lights
@gossithedog

Top Replied-To in G7:
@mrtdjames92
@msgibson1

Top Replied-To in G8:
@dayihub

Top Replied-To in G9:
@molware1
@andrew___morris
@dennisf
@brysonbort

Top Replied-To in G10:
@thebayayk
@mandiant
@linkedin
@cybersecmeg

Top Mentioned
Top Mentioned in Entire Graph:
@explanationspro
@shubham_pen
@itspmagazine
@itzareous
@mrtdjames92
@hackinarticles
@paula_piccard
@sheraj99
@alludingassets
@fm54321

Top Mentioned in G1:
@explanationspro
@alludingassets
@sheraj99
@paula_piccard
@ingliguori
@adamm55563945
@jaanasyeda
@myrick_june
@42sz40
@legitwriters1

Top Mentioned in G2:
@adinividini
@claroty
@natlawgovtcon
@brand9couk
@vanillaweb
@ebargainstoday
@gwani_miss
@spj_tweets
@deeecyber
@adminbyrequest

Top Mentioned in G3:
@shubham_pen
@hackinarticles
@cisagov
@ptracesecurity
@bdanalyticsnews
@b0rk
@cyberknow20
@realest_tomi
@manieshneupane
@isc2

Top Mentioned in G4:
@itzareous
@unkleayo
@kynsofficial
@eugenedaniel_
@seunfunmiiii

Top Mentioned in G5:
@impraveendalal
@aadhaarlies
@conflictoflaw
@freedommyths
@_ptlb
@_groundreality
@odrconnect
@cecsrdi
@three_cube
@ptlbschool

Top Mentioned in G6:
@rgb_lights
@cisajen
@ncdinglis
@gossithedog
@cisagov
@getcybersafe
@tps_cyber
@ncsc
@lindy_cameron
@oncd

Top Mentioned in G7:
@mrtdjames92
@loveisntmylaneb
@brandon40706023

Top Mentioned in G8:
@fm54321
@dayihub
@smg4official

Top Mentioned in G9:
@deepfriedcyber
@msftsecurity
@explanationspro
@revbits
@redseal_co
@andrew___morris
@goprivacy1
@rodtrent
@microsoft
@deb_infosec

Top Mentioned in G10:
@cybersecmeg
@cybersecuritysf
@crowdstrike
@paula_piccard
@sechubb
@jhamnani_neha
@csmtonya
@ibmsecurity
@womenknowcyber
@corix_jc

Top Tweeters
Top Tweeters in Entire Graph:
@sectest9
@chidambara09
@jurylady5
@teamyoutube
@xaelbot
@codedailybot
@cybersecurityn8
@geoffrey_payne
@javascriptd
@davidbewart

Top Tweeters in G1:
@sectest9
@chidambara09
@xaelbot
@codedailybot
@cybersecurityn8
@javascriptd
@el_universal_mx
@evankirstel
@aaroncuddeback
@fabriciosx

Top Tweeters in G2:
@5bestthing
@strawberryng
@thedextazlab
@it_securitynews
@peacefmonline
@evanderburg
@ambulsiva
@tian_a1
@financialxpress
@fincalcaterra

Top Tweeters in G3:
@ovie52009
@rolandsmartin
@digitaldecoded1
@eddie_31003
@henleysecnethia
@stevewcarlson
@uk_daniel_card
@shirleyheavens
@atsen_
@bw

Top Tweeters in G4:
@times_of_caleb
@munachim_
@chidisteph_
@chouch_int
@kynsofficial
@__cobbyjnr
@nicoleudofa
@marketernat
@sundayd24112210
@keckoghey

Top Tweeters in G5:
@jayeshmthakur
@annemichie5
@ernestmaas55
@bttbbrack
@ictevangelist
@jax_masters
@jc_james_clark
@chicagoessays
@oseygh
@keoxes

Top Tweeters in G6:
@adekleine
@mosestamakloe
@komiska
@weseire
@hamsterico
@aushiker
@warwraith
@aroc725
@north_easton
@bymuyiwa

Top Tweeters in G7:
@covingtonq
@catlover1943
@northbelle4
@sandra_united
@joannef95945936
@rockets_wwwww
@you_love_ernest
@larryredwing
@braceyaself_
@lrick1960

Top Tweeters in G8:
@yukacyansinsuki
@xenojaed
@sombragames17
@froggythemii
@ccc_1933
@jacobhe20876770
@dreadethos616
@thedank_voyager
@becdoestweets
@jjlenthusiast69

Top Tweeters in G9:
@hephaistos_ai
@mrsyiswhy
@ennomnom
@rodtrent
@beefyspace
@doyleandre
@jnitterauer
@deepfriedcyber
@techradar
@infosec_tourist

Top Tweeters in G10:
@prpnews
@laveilletechno
@corix_jc
@corixpartners
@salesforce
@cryptoishard
@informationweek
@bot_cybernews
@andres_riscv
@womencybersec


We use necessary cookies to make our site work. We’d like to set additional cookies to understand site usage, make site improvements and to remember your settings. We also use cookies set by other sites to help deliver content from their services.