(Cyber Security) OR Cybersecurity, Twitter, 2/7/2023 7:43:20 AM, 288780


FAQ | Problem?

(Cyber Security) OR Cybersecurity_2023-02-06_23-30-00.xlsx
(Cyber Security) OR Cybersecurity_2023-02-06_23-30-00.xlsx
From:
NodeXLExcelAutomator
Uploaded on:
February 07, 2023
Short Description:
(Cyber Security) OR Cybersecurity via NodeXL https://bit.ly/3I2g80h
@eli_krumova
@cybersecurityn8
@twitter
@sectest9
@elonmusk
@securitytrybe
@hackinarticles
@navauriel311
@sofia_verga003
@merson_johnson

Top hashtags:
#cybersecurity
#infosec
#ai
#datascience

Description:
Description
The graph represents a network of 4,493 Twitter users whose recent tweets contained "(Cyber Security) OR Cybersecurity", or who were replied to, mentioned, retweeted or quoted in those tweets, taken from a data set limited to a maximum of 5,000 tweets, tweeted between 3/26/2006 12:00:00 AM and 2/6/2023 5:00:35 PM. The network was obtained from Twitter on Tuesday, 07 February 2023 at 07:36 UTC.

The tweets in the network were tweeted over the 2219-day, 3-hour, 26-minute period from Monday, 09 January 2017 at 21:34 UTC to Tuesday, 07 February 2023 at 01:00 UTC.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, an edge for each "retweet" relationship in a tweet, an edge for each "quote" relationship in a tweet, an edge for each "mention in retweet" relationship in a tweet, an edge for each "mention in reply-to" relationship in a tweet, an edge for each "mention in quote" relationship in a tweet, an edge for each "mention in quote reply-to" relationship in a tweet, and a self-loop edge for each tweet that is not from above.

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 4493
Unique Edges : 3076
Edges With Duplicates : 8097
Total Edges : 11173
Number of Edge Types : 9
MentionsInRetweet : 3216
MentionsInQuote : 165
Mentions : 1110
Retweet : 2573
Quote : 221
Tweet : 2018
Replies to : 685
MentionsInReplyTo : 1181
MentionsInQuoteReply : 4
Self-Loops : 2423
Reciprocated Vertex Pair Ratio : 0.016030373338958
Reciprocated Edge Ratio : 0.0315549096948308
Connected Components : 1062
Single-Vertex Connected Components : 572
Maximum Vertices in a Connected Component : 2151
Maximum Edges in a Connected Component : 7558
Maximum Geodesic Distance (Diameter) : 14
Average Geodesic Distance : 5.752727
Graph Density : 0.000238671454695827
Modularity : 0.447351
NodeXL Version : 1.0.1.510
Data Import : The graph represents a network of 4,493 Twitter users whose recent tweets contained "(Cyber Security) OR Cybersecurity", or who were replied to, mentioned, retweeted or quoted in those tweets, taken from a data set limited to a maximum of 5,000 tweets, tweeted between 3/26/2006 12:00:00 AM and 2/6/2023 5:00:35 PM. The network was obtained from Twitter on Tuesday, 07 February 2023 at 07:36 UTC.

The tweets in the network were tweeted over the 2219-day, 3-hour, 26-minute period from Monday, 09 January 2017 at 21:34 UTC to Tuesday, 07 February 2023 at 01:00 UTC.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, an edge for each "retweet" relationship in a tweet, an edge for each "quote" relationship in a tweet, an edge for each "mention in retweet" relationship in a tweet, an edge for each "mention in reply-to" relationship in a tweet, an edge for each "mention in quote" relationship in a tweet, an edge for each "mention in quote reply-to" relationship in a tweet, and a self-loop edge for each tweet that is not from above.

Layout Algorithm : The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.
Graph Source : TwitterSearch2
Graph Term : (Cyber Security) OR Cybersecurity
Groups : The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.
Edge Color : Edge Weight
Edge Width : Edge Weight
Edge Alpha : Edge Weight
Vertex Radius : Betweenness Centrality

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[47] https://www.youtube.com/watch?v=kj8IfmcY6Nc&feature=youtu.be

[34] https://instagram.com/cyber_mass_recovery/?igshid=YmMyMTA2M2Y=
[33] https://instagram.com/andreas_tech1/
[17] https://idov31.github.io/2022/07/14/lord-of-the-ring0-p1.html
[17] https://gist.github.com/yassineaboukir/8e12adefbd505ef704674ad6ad48743d
[17] https://fcw.com/security/2023/01/fcc-rule-would-require-telecom-providers-immediately-disclose-sensitive-data-breaches/381651/
[14] https://twitter.com/BowTiedCyber/status/1622668511934914582/photo/1
[8] https://justthenews.com/politics-policy/cybersecurity/monus-tech-giants-funding-chinas-race-supremacy-ai-battlefield-future?utm_medium=social_media&utm_source=twitter_social_icon&utm_campaign=social_icons
[8] https://instagram.com/mass_coder_fix/?igshid=YmMyMTA2M2Y=
[7] https://github.com/TalEliyahu/awesome-security-newsletters

Top URLs in Tweet in G1:
[16] https://fcw.com/security/2023/01/fcc-rule-would-require-telecom-providers-immediately-disclose-sensitive-data-breaches/381651/
[4] https://twitter.com/CyberSecurityCC/status/1622746383751979008/photo/1
[3] https://www.forbes.com/sites/petersuciu/2023/02/06/the-top-us-cybersecurity-diplomats-personal-twitter-account-was-hacked/
[2] https://dellyranks.com/cybersecurity-startup-firecompass-raises-7-million-in-early-stage-funding/?feed_id=305530&_unique_id=63e19ff6dab25
[2] https://twitter.com/8020lawyer/status/1622704735747801095/photo/1
[2] https://securityaffairs.com/141889/cyber-crime/experts-warn-esxi-ransomware-attacks.html
[2] https://www.infosecurity-magazine.com/blogs/chatgpt-wave-cybersecurity-concerns/
[2] https://reprints2.forrester.com/#/assets/2/108/RES176400/report
[2] https://pditechnologies.com/blog/2023-cybersecurity-trends/
[2] https://www.malwarebytes.com/blog/news/2023/02/financials-are-facing-an-unprecedented-number-of-cybersecurity-threats?utm_source=dlvr.it&utm_medium=twitter

Top URLs in Tweet in G2:
[2] https://hacklido.com/blog/278-the-key-components-of-the-iso-27001-framework
[2] https://hacklido.com/blog/279
[2] https://cybersecuritynews.com/secure-your-ci-cd-pipeline/
[2] https://www.helpnetsecurity.com/2023/02/07/u2opia-ornl-technologies/
[2] https://getpvaaccount.com/buy-edu-emails/
[2] https://www.wbrc.com/2023/02/05/birmingham-medical-practice-informs-patients-security-breach/
[2] https://www.jpost.com/breaking-news/article-730673
[2] https://www.threatshub.org/blog/massive-ransomware-attack-targets-vmware-esxi-servers-worldwide/
[2] https://paper.li/CloudReputation/1415403704?share_id=22b00240-a678-11ed-9506-fa163eed9ef2
[2] https://twitter.com/CoryKennedy/status/1622705840791715845/photo/1

Top URLs in Tweet in G3:
[34] https://instagram.com/cyber_mass_recovery/?igshid=YmMyMTA2M2Y=
[8] https://instagram.com/mass_coder_fix/?igshid=YmMyMTA2M2Y=
[5] https://instagram.com/cyber_mass_rec
[2] https://twitter.com/Weslieweski/status/1622715139865673735
[1] https://www.facebook.com/brindleposse/?mibextid=LQQJ4d
[1] https://twitter.com/CBucks3242/status/1622747728907304963/photo/1
[1] https://twitter.com/priteshpatel9/status/1622700944717742263/photo/1
[1] https://twitter.com/abdallh_kritm/status/1622736457302528001/photo/1
[1] https://twitter.com/ylecun/status/1622300311573651458
[1] https://twitter.com/LauraJo45459016/status/1622706258678620161

Top URLs in Tweet in G4:
[2] https://www.intel.co.uk/content/www/uk/en/business/enterprise-computers/resources/how-to-guide-intel-vpro-ema-amt.html?wapkw=vpro%20battery%20life&cid=iosm&source=twitter&campid=2022_uk_always_on_social_content&content=100003062253283&icid=ccg-commercial-vpro-campaign&linkId=100000122930340
[2] https://venturebeat.com/security/getting-results-from-your-zero-trust-initiatives-in-2023/
[2] https://twitter.com/Nickieyey/status/1622630539936268288/photo/1
[2] https://www.altcash.co.uk/?q=content/cryptocurrency-games
[2] https://usaonlineservice.com/product/buy-yelp-reviews/
[1] https://twitter.com/Eli_Krumova/status/1531737655276453896/photo/1
[1] https://twitter.com/IntelUK/status/1524026536390803456
[1] https://twitter.com/Eli_Krumova/status/1521182638303760384/photo/1
[1] https://twitter.com/AllanOluchiri/status/1408810751993786373
[1] https://twitter.com/Eli_Krumova/status/1621591228843270147

Top URLs in Tweet in G5:
[3] https://twitter.com/SecurityTrybe/status/1617535162140721152/photo/1
[2] https://twitter.com/TheDgtalEmpress/status/1622708669283532812/video/1
[2] http://nevonprojects.com
[1] https://ec.europa.eu/digital-single-market/en/news/eu105-million-eu-funding-available-projects-stepping-eus-cybersecurity-capabilities-and
[1] https://twitter.com/CoffeTechnology/status/1622730384155807746/photo/1
[1] https://github.com/TalEliyahu/awesome-security-newsletters
[1] https://twitter.com/NandanLohitaksh/status/1622537585020252160/photo/1
[1] https://twitter.com/TheDgtalEmpress/status/1622729462654681092/video/1
[1] https://straightblast.medium.com/my-poc-walkthrough-for-cve-2021-21974-a266bcad14b9
[1] https://www.fosstechnix.com/

Top URLs in Tweet in G6:
[17] https://gist.github.com/yassineaboukir/8e12adefbd505ef704674ad6ad48743d
[16] https://idov31.github.io/2022/07/14/lord-of-the-ring0-p1.html
[6] https://github.com/TalEliyahu/awesome-security-newsletters
[6] https://twitter.com/NandanLohitaksh/status/1622537585020252160/photo/1
[4] https://www.qualys.com/2021/01/26/cve-2021-3156/baron-samedit-heap-based-overflow-sudo.txt
[4] https://www.kalmarunionen.dk/writeups/sudo/
[4] https://twitter.com/ptracesecurity/status/1622701817120403457/photo/1
[2] https://github.com/A-poc/BlueTeam-Tools
[2] https://www.fosstechnix.com/
[2] https://straightblast.medium.com/my-poc-walkthrough-for-cve-2021-21974-a266bcad14b9

Top URLs in Tweet in G7:
[6] https://cyberstartupobservatory.com/cyber-security-observatory/
[3] https://www.fosstechnix.com/
[2] https://github.com/CMEPW/BypassAV
[2] https://github.com/Ignitetechnologies/Mindmap/tree/main/Owasp
[2] https://community.ui.com/questions/Ubiquiti-Cybersecurity-team-announces-changes-related-to-the-security-of-our-products-and-services/dc719a82-cb77-4894-9d8f-d62d507b9bc3
[1] https://twitter.com/hackinarticles/status/1622210907240816640/photo/1
[1] https://twitter.com/MaiteOrtegaCSO/status/1622688706854375426/photo/1
[1] https://hakin9.org/improper-error-handling-penetration-testing-owasp-top-10-vulnerabilities-free-course-content/
[1] https://github.com/Ignitetechnologies/Mindmap/tree/main/Privacy%20Tools
[1] https://twitter.com/EveryDayOnMyWay/status/1622718298935754759/photo/1

Top URLs in Tweet in G9:
[2] https://www.washingtonpost.com/politics/2023/02/06/how-cisa-plans-get-tech-firms-bake-security-into-their-products/
[2] https://www.darkreading.com/cloud/global-ransomware-attack-vmware-exsi-hypervisors-continues-to-spread
[1] https://www.foreignaffairs.com/articles/united-states/2021-12-07/hacking-cybersecurity-keeping-wrong-secrets?utm_medium=social
[1] https://twitter.com/ForeignAffairs/status/1622603292508291074
[1] https://channel969.com/all-you-need-to-know-to-get-them/
[1] https://thecyberwire.com/stories/9f4329667cf149908d3b36d1ed95faf7/new-ransomware-exploits-vmware-esxi-vulnerability
[1] https://www.linkedin.com/posts/the-cyber-security-hub_gartner-predictions-2025-activity-7028459002824904705-uJas?utm_source=share&utm_medium=member_ios
[1] https://www.armis.com/blog/ransomware-attack-targets-vmware-esxi-servers-worldwide/
[1] https://www.bleepingcomputer.com/news/security/linux-version-of-royal-ransomware-targets-vmware-esxi-servers/#.Y-EJ1bOnmKU.twitter
[1] https://twitter.com/ForeignAffairs/status/1621143428016017408

Top URLs in Tweet in G10:
[47] https://www.youtube.com/watch?v=kj8IfmcY6Nc&feature=youtu.be


Top Domains
Top Domains in Tweet in Entire Graph:
[1463] twitter.com
[145] youtube.com
[106] instagram.com
[90] github.com
[71] paper.li
[60] cyberiqs.com
[52] medium.com
[50] adzuna.com
[41] github.io
[39] linkedin.com

Top Domains in Tweet in G1:
[256] twitter.com
[26] fcw.com
[19] linkedin.com
[13] paper.li
[12] google.com
[11] securecybersolution.com
[9] com.au
[9] co.uk
[7] jdsupra.com
[6] medium.com

Top Domains in Tweet in G2:
[241] twitter.com
[60] cyberiqs.com
[25] medium.com
[20] thehackernews.com
[18] virustotal.com
[17] infosec-jobs.com
[15] dr-farfar.com
[15] csoonline.com
[15] urlscan.io
[14] scmagazine.com

Top Domains in Tweet in G3:
[218] twitter.com
[52] instagram.com
[1] facebook.com
[1] safety.google
[1] youtube.com
[1] thekingslife.com
[1] t.me
[1] washingtonpost.com

Top Domains in Tweet in G4:
[116] twitter.com
[21] youtube.com
[8] venturebeat.com
[7] netscout.com
[7] sentinelone.com
[6] iiot-world.com
[5] mltut.com
[5] grnh.se
[4] betterprogramming.pub
[4] co.uk

Top Domains in Tweet in G5:
[32] twitter.com
[5] netacad.com
[5] nevonprojects.com
[4] tryhackme.com
[3] voicestorm.com
[2] venturebeat.com
[2] utilitydive.com
[2] fosstechnix.com
[2] cyberjobcentral.com
[2] github.com

Top Domains in Tweet in G6:
[76] twitter.com
[60] github.com
[35] github.io
[15] qualys.com
[14] kalmarunionen.dk
[11] medium.com
[4] microsoft.com
[3] gitlab.io
[2] securityzines.com
[2] substack.com

Top Domains in Tweet in G7:
[34] twitter.com
[17] cyberstartupobservatory.com
[9] github.com
[7] hakin9.org
[6] fosstechnix.com
[5] nextgov.com
[4] hackers-arise.com
[3] hackingarticles.in
[3] paper.li
[2] microsoft.com

Top Domains in Tweet in G8:
[7] twitter.com
[1] medium.com

Top Domains in Tweet in G9:
[40] twitter.com
[20] channel969.com
[8] darkreading.com
[4] washingtonpost.com
[4] foreignaffairs.com
[3] whitehouse.gov
[3] jpost.com
[2] usajobs.gov
[2] bleepingcomputer.com
[2] cisa.gov

Top Domains in Tweet in G10:
[92] youtube.com
[1] twitter.com

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[2457] cybersecurity
[943] infosec
[341] ai
[333] datascience
[312] 100daysofcode
[303] python
[286] security
[267] bigdata
[250] hacking
[249] pentesting



Top Hashtags in Tweet in G1:
[368] cybersecurity
[40] infosec
[31] ransomware
[26] wireless
[26] ai
[22] crypto
[22] hacking
[21] security
[20] threatintel
[18] cyber

Top Hashtags in Tweet in G2:
[967] cybersecurity
[546] infosec
[238] 100daysofcode
[217] datascience
[185] python
[174] bigdata
[163] ransomware
[159] linux
[145] malware
[145] hacking

Top Hashtags in Tweet in G3:
[35] cyber_mass_recovery
[3] كلنا_حساب_المصحف
[2] smart_tech080
[2] ai
[2] meta
[2] openai
[2] elon
[2] virtualreality
[2] metaverse
[2] artificialintelligence

Top Hashtags in Tweet in G4:
[201] cybersecurity
[112] ai
[91] datascience
[86] machinelearning
[80] iiot
[80] python
[80] iot
[65] bigdata
[60] 100daysofcode
[59] tech

Top Hashtags in Tweet in G5:
[77] cybersecurity
[35] infosec
[26] hacking
[24] tech
[18] hacked
[17] cyberattack
[17] python
[16] cybersec
[16] programming
[15] coding

Top Hashtags in Tweet in G6:
[79] cybersecurity
[70] infosec
[49] bugbounty
[44] pentesting
[25] informationsecurity
[22] hacking
[20] bugbountytips
[19] datasecurity
[19] cybersec
[11] linux

Top Hashtags in Tweet in G7:
[170] cybersecurity
[112] infosec
[98] cybersecuritytips
[91] pentesting
[84] oscp
[81] redteam
[80] informationsecurity
[52] cissp
[50] cybersecurite
[17] bugbounty

Top Hashtags in Tweet in G8:
[2] scam
[2] coredao
[2] crypto
[1] cryptotoast
[1] getthatbread
[1] pissedthefuckoff
[1] wtf
[1] ens
[1] stolen
[1] cracked

Top Hashtags in Tweet in G9:
[58] cybersecurity
[26] seo
[26] google
[26] apple
[26] ios
[24] robotics
[23] ai
[7] ransomware
[7] cyberattack
[4] security

Top Words
Top Words in Tweet in Entire Graph:
[2457] #cybersecurity
[1341] security
[1141] cybersecurity
[1140] cyber
[943] #infosec
[730] account
[596] help
[442] dm
[410] instagram
[410] expert

Top Words in Tweet in G1:
[368] #cybersecurity
[226] cybersecurity
[173] security
[124] cyber
[75] data
[63] 2023
[58] more
[57] ransomware
[56] federal
[50] learn

Top Words in Tweet in G2:
[967] #cybersecurity
[546] #infosec
[270] dm
[238] #100daysofcode
[217] #datascience
[188] recovery
[185] #python
[174] #bigdata
[167] hacking
[163] #ransomware

Top Words in Tweet in G3:
[390] account
[286] instagram
[271] help
[264] cyber
[262] security
[240] expert
[197] professional
[163] ig
[148] send
[147] back

Top Words in Tweet in G4:
[201] #cybersecurity
[112] #ai
[91] #datascience
[86] #machinelearning
[81] #iot
[80] #python
[80] #iiot
[71] eli_krumova
[65] #bigdata
[60] #100daysofcode

Top Words in Tweet in G5:
[115] cybersecurity
[85] securitytrybe
[77] #cybersecurity
[65] free
[52] learn
[50] 2023
[49] platforms
[35] #infosec
[33] thread
[29] preparing

Top Words in Tweet in G6:
[79] #cybersecurity
[70] #infosec
[67] part
[54] 0xor0ne
[49] #bugbounty
[47] collection
[44] #pentesting
[43] kernel
[37] team
[37] tools

Top Words in Tweet in G7:
[170] #cybersecurity
[112] #infosec
[98] #cybersecuritytips
[91] #pentesting
[84] #oscp
[81] #redteam
[80] #informationsecurity
[76] hackinarticles
[58] attack
[52] #cissp

Top Words in Tweet in G8:
[58] write
[58] security
[57] recently
[57] directed
[57] talk
[57] expert
[57] cyber
[57] user
[57] awful
[56] evidence

Top Words in Tweet in G9:
[69] cybersecurity
[58] #cybersecurity
[48] cyber
[31] attacks
[26] #seo
[26] #ios
[26] #apple
[26] #google
[25] nation
[24] energy

Top Words in Tweet in G10:
[92] friends
[92] show
[92] retweet
[92] tag
[92] video
[92] giveaway
[92] security
[92] cyber
[92] support
[92] m4a4

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[799] cyber,security
[384] security,expert
[366] #infosec,#cybersecurity
[289] professional,cyber
[225] expert,hit
[170] #pentesting,#oscp
[164] account,professional
[153] #cybersecurity,#cybersecuritytips
[145] seek,help
[145] reactivating,account

Top Word Pairs in Tweet in G1:
[61] cyber,security
[27] data,here's
[26] proprietary,network
[26] telecom,orgs
[26] here's,mean
[26] require,telecom
[26] proposed,rule
[26] orgs,immediately
[26] mean,#cybersecurity
[26] federal,agencies

Top Word Pairs in Tweet in G2:
[160] #infosec,#cybersecurity
[91] #datascience,#datascientists
[89] #infosec,#infosecurity
[88] #malware,#ransomware
[83] #infosecurity,#cybersecurity
[81] #cybersecurity,#hacker
[80] #python,#coding
[79] #cybersecurity,#threatintel
[74] #hacker,#infosec
[74] #100daysofcode,#programming

Top Word Pairs in Tweet in G3:
[262] cyber,security
[226] security,expert
[197] professional,cyber
[133] expert,hit
[118] send,dm
[88] acct,fixed
[87] back,professional
[87] fixed,back
[86] instagram,help
[82] simply,reach

Top Word Pairs in Tweet in G4:
[47] #iot,#iiot
[40] #iiot,#iotpl
[38] #bigdata,#analytics
[32] #ai,#ml
[31] #analytics,#ai
[28] #iotpl,#iotcl
[24] #python,#rstats
[24] #machinelearning,#datascience
[23] #machinelearning,#ml
[23] #cybersecurity,#bigdata

Top Word Pairs in Tweet in G5:
[49] cybersecurity,2023
[49] platforms,learn
[49] learn,cybersecurity
[49] 2023,free
[48] securitytrybe,platforms
[29] preparing,cybersecurity
[29] cybersecurity,entry
[29] interview,thread
[29] entry,level
[29] level,interview

Top Word Pairs in Tweet in G6:
[38] #infosec,#cybersecurity
[34] part,part
[33] development,credits
[33] team,tools
[33] introduction,windows
[33] tools,development
[33] idov31,part
[33] drivers,red
[33] red,team
[33] credits,idov31

Top Word Pairs in Tweet in G7:
[93] #infosec,#cybersecurity
[89] #cybersecurity,#cybersecuritytips
[86] #cybersecuritytips,#pentesting
[84] #pentesting,#oscp
[77] #oscp,#redteam
[72] #redteam,#informationsecurity
[52] #informationsecurity,#cissp
[50] #cybersecurity,#cybersecurite
[50] touchscreen,#cybersecurity
[50] scrolling,attack

Top Word Pairs in Tweet in G8:
[57] talk,cyber
[57] cyber,security
[57] expert,user
[57] security,expert
[57] recently,directed
[57] directed,talk
[56] write,evidence
[50] awful,scammed
[49] wisdom_eth,write
[49] user,wisdom_eth

Top Word Pairs in Tweet in G9:
[26] #ios,#cybersecurity
[26] #google,#apple
[26] #apple,#ios
[26] #seo,#google
[24] #cybersecurity,#robotics
[22] #robotics,#ai
[16] cyber,attacks
[11] cyber,threats
[10] ransomware,attack
[10] leadership,act

Top Word Pairs in Tweet in G10:
[92] support,video
[92] security,giveaway
[92] cyber,security
[92] tag,friends
[92] giveaway,retweet
[92] m4a4,cyber
[92] friends,show
[92] retweet,tag
[92] show,support
[91] lepajeecsgo,m4a4

Top Replied-To
Top Replied-To in Entire Graph:
@boydclewis
@facebook
@teamyoutube
@instagram
@elonmusk
@tidefoundation
@timothepng
@uber_support
@securitytrybe
@shorterin_urmom

Top Replied-To in G2:
@tidefoundation
@palazzo_chigi
@trupulse
@flysoulfree
@franklin_graham
@officeoftheciso
@chuckdbrooks
@maxthatpadi
@investingbff
@easymillion_co

Top Replied-To in G3:
@facebook
@teamyoutube
@instagram
@elonmusk
@timothepng
@uber_support
@twittersupport
@discord
@jonthadon10
@smileysweed

Top Replied-To in G4:
@khulood_almani
@robmay70
@sallyeaves
@mvollmer1
@inteligenca4

Top Replied-To in G5:
@securitytrybe
@tityosatya
@ameermuminin

Top Replied-To in G7:
@hackinarticles

Top Replied-To in G8:
@bokchoybabynft
@swervortrades
@asad_alam7
@sharkeysharks
@libovski5
@ephrum
@toastpunk
@aryanyt_nft
@vicendraws
@nftmakima

Top Replied-To in G9:
@cisagov

Top Mentioned
Top Mentioned in Entire Graph:
@hackinarticles
@securitytrybe
@lepajeecsgo
@eli_krumova
@0xor0ne
@beboxos
@bowtiedcyber
@wisdom_eth
@joneshacksit
@idov31

Top Mentioned in G1:
@researchguru6
@complyapplyjobs
@gocloudwave
@poseidontpa
@vincema1951
@brand9couk
@newsconsumerbot
@info_sec_buzz
@activ8te_
@academicsaplus

Top Mentioned in G2:
@joneshacksit
@experthac_gary1
@hackinarticles
@feltech03
@technative
@cyberiqs_
@reach2ratan
@hackwithniklas
@eugenioromar
@noladefense

Top Mentioned in G3:
@osheyrecovery
@facebook
@elonmusk
@twittersupport
@instagram
@meta
@twitter
@uber_support
@teamyoutube
@sama

Top Mentioned in G4:
@eli_krumova
@sourabhskatoch
@sheraj99
@kred
@avrohomg
@khulood_almani
@iotchannel
@iotcommunity
@cybersecboardrm
@netscout

Top Mentioned in G5:
@securitytrybe
@ireteeh
@cristinamolendi
@hackinarticles
@alonso_reydes
@savetonotion
@securityaffairs
@realtryhackme
@khalilapriday
@davidbombal

Top Mentioned in G6:
@0xor0ne
@idov31
@mah3sec
@nandanlohitaksh
@shubham_pen
@ptracesecurity
@cyberk9x
@hackinarticles
@sansforensics
@marcvlp

Top Mentioned in G7:
@hackinarticles
@beboxos
@jmonteagudoe
@three_cube
@cybersecob
@hakin9
@owasp
@atomspam
@smersh_sec
@nextgov

Top Mentioned in G8:
@wisdom_eth
@ethan_eth01
@opensea
@pepe_kd
@ether
@visionofviii
@cvalley_
@spiritether
@terra_money
@coinlist

Top Mentioned in G9:
@cisagov
@cisajen
@jerusalem_post
@repdeborahross
@channel969
@darkreading
@repericsorensen
@repmikecarey
@potus
@tracylfox

Top Mentioned in G10:
@lepajeecsgo

Top Tweeters
Top Tweeters in Entire Graph:
@amazonhelp
@sectest9
@xboxsupport
@uber_support
@teamyoutube
@chidambara09
@tradermarcocost
@atviassist
@cybersecurityn8
@javascriptd

Top Tweeters in G1:
@netsecu
@miragenewscom
@322ahsiws
@suriyasubraman
@newsworldpress
@bizcommunityit
@fincalcaterra
@joviannfeed
@pcexpander
@sec_cyber

Top Tweeters in G2:
@sectest9
@cybersecurityn8
@rahul05ranjan
@timesofindia
@youranonriots
@andrewmorrisuk
@frcretweets
@tmobile
@laveilletechno
@fullnam35087976

Top Tweeters in G3:
@amazonhelp
@xboxsupport
@uber_support
@teamyoutube
@atviassist
@eahelp
@riotsupport
@snapchatsupport
@zerohedge
@discord

Top Tweeters in G4:
@chidambara09
@evankirstel
@100daysof2020
@jamesvgingerich
@arealhumanname1
@nicochan33
@trippbraden
@ajblackston
@akwyz
@ilovebooks786

Top Tweeters in G5:
@savetonotion
@t0rir0t
@pythonbot_by_pm
@securityaffairs
@robertosignore7
@fvtsqk7bvto6viv
@thedgtalempress
@titzbiltz
@cdwgwagov
@ireteeh

Top Tweeters in G6:
@securityblog
@rodtrent
@take_gattcha
@mariang1979
@1nf0s3cpt
@good_sector
@howtopam
@crypto___baby
@richard_s81
@iquechocosa

Top Tweeters in G7:
@deenie7940
@adam_it_
@01larryj
@uchuukaeru
@sacred__shadow
@three_cube
@nextgov
@chinaezurum
@er_wanchu
@el_tio_chus

Top Tweeters in G8:
@instacart
@demshenanigans
@ravers
@bo_________t
@shillin_villian
@ryancarson
@binancehelpdesk
@amber_vittoria
@ganartnft
@elixir_activity

Top Tweeters in G9:
@all435reps
@annoula64
@stlhd100
@mefbama
@mig30m6
@buckleyswartz
@keller_lind
@jerusalem_post
@valurank
@warriors_mom

Top Tweeters in G10:
@mihaiender
@aammaarrp
@piyaniko52
@knight5514
@deltacraft17
@lorranstz
@tomytenu
@russeras7
@blastyyyyyy
@matheus66198002


We use necessary cookies to make our site work. We’d like to set additional cookies to understand site usage, make site improvements and to remember your settings. We also use cookies set by other sites to help deliver content from their services.