NodeXL Graph Gallery: Interactive Graph


Donate to the Social Media Research Foundation's NodeXL development fund

vmworld OR vmware_2021-06-10_18-24-08.xlsx (experimental version)
NOTE: This version of the graph is not available with the browser you are using. A more recent version of the browser is required.
Zoom in Zoom out Reset the graph
Go to the graph's main page

From:
NodeXLExcelAutomator
Uploaded on:
June 11, 2021
Short Description:
vmworld OR vmware via NodeXL https://bit.ly/3v82TS5
@vmware
@mitchellh
@poleai
@thehackersnews
@iotcybersec24
@arstechnica
@dangoodin001
@cybersec_feeds
@bad_packets
@publickey

Top hashtags:
#vmware
#cybersecurity
#cloud
#security
#infosec
#vexpert
#kubernetes
#ai

Description:
Description
The graph represents a network of 5,269 Twitter users whose tweets in the requested range contained "vmworld OR vmware", or who were replied to or mentioned in those tweets. The network was obtained from the NodeXL Graph Server on Friday, 11 June 2021 at 01:40 UTC.

The requested start date was Friday, 11 June 2021 at 00:01 UTC and the maximum number of days (going backward) was 14.

The maximum number of tweets collected was 7,500.

The tweets in the network were tweeted over the 4-day, 19-hour, 34-minute period from Saturday, 05 June 2021 at 13:05 UTC to Thursday, 10 June 2021 at 08:39 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 5269
Unique Edges : 4160
Edges With Duplicates : 9214
Total Edges : 13374
Number of Edge Types : 5
Retweet : 3178
MentionsInRetweet : 4333
Tweet : 3342
Mentions : 2182
Replies to : 339
Self-Loops : 3380
Reciprocated Vertex Pair Ratio : 0.027375485694101
Reciprocated Edge Ratio : 0.0532920749527248
Connected Components : 1604
Single-Vertex Connected Components : 1276
Maximum Vertices in a Connected Component : 3040
Maximum Edges in a Connected Component : 10021
Maximum Geodesic Distance (Diameter) : 15
Average Geodesic Distance : 5.117729
Graph Density : 0.000209568062821566
Modularity : 0.434027
NodeXL Version : 1.0.1.445
Data Import : The graph represents a network of 5,269 Twitter users whose tweets in the requested range contained "vmworld OR vmware", or who were replied to or mentioned in those tweets. The network was obtained from the NodeXL Graph Server on Friday, 11 June 2021 at 01:40 UTC.

The requested start date was Friday, 11 June 2021 at 00:01 UTC and the maximum number of days (going backward) was 14.

The maximum number of tweets collected was 7,500.

The tweets in the network were tweeted over the 4-day, 19-hour, 34-minute period from Saturday, 05 June 2021 at 13:05 UTC to Thursday, 10 June 2021 at 08:39 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

Layout Algorithm : The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.
Graph Source : GraphServerTwitterSearch
Graph Term : vmworld OR vmware
Groups : The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.
Edge Color : Edge Weight
Edge Width : Edge Weight
Edge Alpha : Edge Weight
Vertex Radius : Betweenness Centrality

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[265] https://arstechnica.com/gadgets/2021/06/under-exploit-vmware-vulnerability-with-severity-rating-of-9-8-out-of-10/
[155] https://arstechnica.com/gadgets/2021/06/under-exploit-vmware-vulnerability-with-severity-rating-of-9-8-out-of-10/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
[91] https://www.publickey1.jp/blog/21/terraform10awsazurevmware.html
[58] https://thehackernews.com/2021/06/alert-critical-rce-bug-in-vmware.html
[55] https://www.cyberscoop.com/vmware-exploit-virtual-machine-cisa/
[49] https://www.zdnet.com/article/patch-now-attackers-are-hunting-for-this-critical-vmware-vcentre-flaw/
[47] https://vexpert.vmware.com/apply
[45] https://www.bleepingcomputer.com/news/security/attackers-are-scanning-for-vulnerable-vmware-servers-patch-now/
[38] https://blogs.vmware.com/euc/2021/05/forrester-tei-workspace-one-modern-management.html
[36] https://www.heise.de/news/Jetzt-patchen-Angreifer-attackieren-VMware-vCenter-Server-6063523.html

Top URLs in Tweet in G1:
[92] https://arstechnica.com/gadgets/2021/06/under-exploit-vmware-vulnerability-with-severity-rating-of-9-8-out-of-10/
[36] https://blogs.vmware.com/euc/2021/05/forrester-tei-workspace-one-modern-management.html
[26] https://www.publickey1.jp/blog/21/terraform10awsazurevmware.html
[23] https://thehackernews.com/2021/06/alert-critical-rce-bug-in-vmware.html
[15] https://www.zdnet.com/article/patch-now-attackers-are-hunting-for-this-critical-vmware-vcentre-flaw/
[12] https://thehackernews.com/2021/06/alert-critical-rce-bug-in-vmware.html?utm_source=dlvr.it&utm_medium=twitter
[12] https://www.sesin.at/
[10] https://www.cyberscoop.com/vmware-exploit-virtual-machine-cisa/
[9] https://www.bleepingcomputer.com/news/security/attackers-are-scanning-for-vulnerable-vmware-servers-patch-now/
[9] https://news.mynavi.jp/article/20210606-1899804/

Top URLs in Tweet in G2:
[44] https://vexpert.vmware.com/apply
[13] https://www.veritas.com/protection/netbackup
[8] https://blogs.vmware.com/wprss
[7] https://www.forbes.com/sites/patrickmoorhead/2021/06/08/vmware-is-an-easy-button-for-multi-cloud/
[7] https://www.hashicorp.com/blog/announcing-hashicorp-terraform-1-0-general-availability
[6] https://advocacy.vmware.com/Article/Redirect/09105304-392f-4d78-a6da-67331bba89b6?uc=80431&g=d3472362-a9d9-44b5-8541-76a0bc0d1e74&f=2593923
[5] https://r.socialstudio.radian6.com/bebc05f5-bdea-4bdc-b4ed-ad0cdec8195c
[5] https://r.socialstudio.radian6.com/9194d3b9-510f-484a-9803-5d8ad001da71
[5] https://r.socialstudio.radian6.com/a1dd21c2-7c90-429c-a4b1-880c3dbb83bb
[5] https://blogs.vmware.com/virtualblocks/2021/06/07/applications-moving-to-hci/

Top URLs in Tweet in G3:
[24] https://arstechnica.com/gadgets/2021/06/under-exploit-vmware-vulnerability-with-severity-rating-of-9-8-out-of-10/
[22] https://www.zdnet.com/article/patch-now-attackers-are-hunting-for-this-critical-vmware-vcentre-flaw/
[20] https://www.bleepingcomputer.com/news/security/freakout-malware-worms-its-way-into-vulnerable-vmware-servers/
[19] https://thehackernews.com/2021/06/alert-critical-rce-bug-in-vmware.html
[14] https://thehackernews.com/2021/06/alert-critical-rce-bug-in-vmware.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+TheHackersNews+%28The+Hackers+News+-+Cyber+Security+Blog%29
[14] https://www.bleepingcomputer.com/news/security/attackers-are-scanning-for-vulnerable-vmware-servers-patch-now/
[14] https://github.com/r0ckysec/CVE-2021-21985
[13] https://www.reddit.com/r/blueteamsec/comments/nkpa4o/vmware_esxi_exploit_for_cve202121974_which_is_a/?utm_source=dlvr.it&utm_medium=twitter
[9] https://www.cyberscoop.com/vmware-exploit-virtual-machine-cisa/
[9] https://www.darkreading.com/attacks-breaches/cisa-warns-criminals-seek-to-exploit-critical-vmware-bug/d/d-id/1341224

Top URLs in Tweet in G4:
[148] https://arstechnica.com/gadgets/2021/06/under-exploit-vmware-vulnerability-with-severity-rating-of-9-8-out-of-10/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
[5] https://twitter.com/bad_packets/status/1401989507839188995?s=20
[5] https://arstechnica.com/gadgets/2021/06/under-exploit-vmware-vulnerability-with-severity-rating-of-9-8-out-of-10/?utm_source=twitter&utm_medium=social&utm_brand=ars&utm_social-type=owned
[2] https://twitter.com/bad_packets/status/1400519385194766336?s=20
[2] https://arstechnica.com/information-technology/2020/12/nsa-says-russian-state-hackers-are-using-a-vmware-flaw-to-ransack-networks/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
[2] https://blog.snort.org/2021/06/rule-released-to-protect-against-severe.html
[1] https://arstechnica.com/gadgets/2021/05/vulnerability-in-vmware-product-has-severity-rating-of-9-8-out-of-10/
[1] https://us-cert.cisa.gov/ncas/current-activity/2021/06/04/unpatched-vmware-vcenter-software
[1] https://blogs.vmware.com/security/2021/06/disrupting-ransomware-and-dismantling-the-cybercrime-ecosystem.html
[1] https://twitter.com/catc0n/status/1401206119519883267

Top URLs in Tweet in G5:
[26] https://arstechnica.com/gadgets/2021/06/under-exploit-vmware-vulnerability-with-severity-rating-of-9-8-out-of-10/
[19] https://buaq.net/go-75544.html
[16] https://www.cyberscoop.com/vmware-exploit-virtual-machine-cisa/
[15] https://www.iswin.org/2021/06/02/Vcenter-Server-CVE-2021-21985-RCE-PAYLOAD/
[15] https://github.com/xnianq/cve-2021-21985_exp
[8] https://www.cyberscoop.com/vmware-exploit-virtual-machine-cisa/?utm_source=dlvr.it&utm_medium=linkedin
[6] https://www.zdnet.com/article/patch-now-attackers-are-hunting-for-this-critical-vmware-vcentre-flaw/
[5] https://www.vmware.com/security/advisories/VMSA-2021-0010.html
[2] https://www.ncsc.gov.ie/pdfs/VMware_260521.pdf
[1] https://twitter.com/bad_packets/status/1397388928403984394

Top URLs in Tweet in G6:
[17] https://blog.eucse.com/how-to-run-macos-monterey-12-beta-in-vmware-fusion/
[2] https://www.vagrantup.com/docs/providers/vmware
[2] https://github.com/FriedrichWilken/KubernetesOnWindows/issues
[1] https://github.com/hashicorp/vagrant-vmware-desktop
[1] https://github.com/hashicorp/vagrant-vmware-desktop/blob/main/lib/vagrant-vmware-desktop/driver/base.rb
[1] https://github.com/vmware-tanzu/carvel-ytt/tree/develop/examples/helm-ytt-post-renderer
[1] https://octo.vmware.com/the-cost-of-cloud-and-the-need-for-a-multi-cloud-strategy
[1] https://twitter.com/grantorchard/status/1399558838567661568
[1] https://code.vmware.com/apis/1043#/
[1] https://infl.tv/jBv3

Top URLs in Tweet in G7:
[9] https://arstechnica.com/gadgets/2021/06/under-exploit-vmware-vulnerability-with-severity-rating-of-9-8-out-of-10/
[6] https://isc.sans.edu/podcastdetail.html?id=7530
[5] https://www.bleepingcomputer.com/news/security/attackers-are-scanning-for-vulnerable-vmware-servers-patch-now/
[4] https://www.nextron-systems.com/2021/06/07/analyze-vmware-esx-systems-with-thor-thunderstorm/
[4] https://viz.greynoise.io/query/?gnql=tags%3A%22VMware%20vCenter%20RCE%20Attempt%22
[2] https://buaq.net/go-75544.html
[2] https://twitter.com/CNMF_CyberAlert/status/1401212529276248072
[2] https://www.bleepingcomputer.com/news/security/freakout-malware-worms-its-way-into-vulnerable-vmware-servers/
[1] https://us-cert.cisa.gov/ncas/current-activity/2021/06/04/unpatched-vmware-vcenter-software
[1] https://github.com/alt3kx/CVE-2021-21985_PoC

Top URLs in Tweet in G8:
[13] https://www.cyberscoop.com/vmware-exploit-virtual-machine-cisa/
[6] https://cloud.google.com/blog/products/cloud-migration/google-cloud-vmware-engine-has-achieved-hipaa-compliance
[6] Cloud
[4] https://register.gotowebinar.com/register/6060153364964648719
[4] Executive
[3] https://twitter.com/WinTechSeries/status/1402309506806255621
[3] http://dlvr.it/S1FGnl
[2] https://advocacy.vmware.com/Article/Redirect/7fb85b05-1348-427d-a9b3-4e7d76c467a7?uc=42792&g=ac04d3d7-7853-42e8-b355-5d1e07335b7e&f=2594134
[2] https://advocacy.vmware.com/Article/Redirect/09105304-392f-4d78-a6da-67331bba89b6?uc=127457&g=e89f3c8a-b68b-4347-8ad2-35d9cf109033&f=2594082
[2] https://www.forbes.com/sites/patrickmoorhead/2021/06/08/vmware-is-an-easy-button-for-multi-cloud/

Top URLs in Tweet in G9:
[53] https://www.publickey1.jp/blog/21/terraform10awsazurevmware.html
[1] http://www.ikura-oisii.com/1764/
[1] https://twitter.com/tomocha0/status/1399071668832636928

Top URLs in Tweet in G10:
[4] https://www.idc.com/mea/events/68290-idc-cloud-roadshow
[4] https://aws.amazon.com/events/summits/online/emea/?sc_channel=el&sc_campaign=2021emeaonlinesummit&sc_geo=emea&sc_country=mult&sc_outcome=atd&trkCampaign=emea21_summitonlineq2&trk=el_emea21_summitonlineq2_sponsorship
[2] https://cloud.google.com/blog/topics/developers-practitioners/how-big-cloud-bigtable
[1] https://cloud.google.com/blog/topics/developers-practitioners/google-cloud-vmware-engine-cheat-sheet?linkId=118340235
[1] https://advocacy.vmware.com/Article/Redirect/634ca1b5-0c7e-4611-9a84-ad17a1a915ff?uc=41140&g=7e1069df-97d2-4cd3-896c-809075066a2e&f=2594206
[1] https://advocacy.vmware.com/Article/Redirect/ae819052-8c1f-4373-aa20-ac5544a0273b?uc=41140&g=269ffc83-948d-416f-b72c-253bc0ed2bfd&f=2590901
[1] https://advocacy.vmware.com/Article/Redirect/8e4485a3-a5fb-444d-86d1-b62ce86cf056?uc=41140&g=c1b60358-20e9-4834-b214-38b11de8f0df&f=2590903
[1] https://advocacy.vmware.com/Article/Redirect/37542d8c-ac07-487a-ab26-1fd5be4cb4e4?uc=41140&g=b8228b82-85e3-4f5b-bc7d-7e926a7232a7&f=2590909
[1] https://advocacy.vmware.com/Article/Redirect/96ef743f-0cf8-48e0-b2c2-fd07bbff7a4c?uc=41140&g=cbdb50f6-9c1b-48d3-b258-60cacd87b5bd&f=2590918
[1] https://advocacy.vmware.com/Article/Redirect/eb0e5f3e-9608-45e1-a653-43009b949674?uc=41140&g=17a20113-2e8a-40a0-bac0-b37ca9af9585&f=2590924

Top Domains
Top Domains in Tweet in Entire Graph:
[1519] vmware.com
[446] arstechnica.com
[201] radian6.com
[144] twitter.com
[111] zdnet.com
[110] thehackernews.com
[105] linkedin.com
[91] publickey1.jp
[90] bleepingcomputer.com
[70] cyberscoop.com

Top Domains in Tweet in G1:
[655] vmware.com
[100] arstechnica.com
[62] linkedin.com
[42] thehackernews.com
[38] zdnet.com
[31] darkreading.com
[26] publickey1.jp
[25] twitter.com
[25] google.com
[24] sesin.at

Top Domains in Tweet in G2:
[494] vmware.com
[160] radian6.com
[41] twitter.com
[19] linkedin.com
[13] veritas.com
[11] forbes.com
[11] co.uk
[8] youtube.com
[8] bit.ly
[8] vfairs.com

Top Domains in Tweet in G3:
[57] zdnet.com
[45] bleepingcomputer.com
[36] thehackernews.com
[28] amazon.com
[25] arstechnica.com
[21] github.com
[20] darkreading.com
[19] reddit.com
[15] vmware.com
[13] cyberscoop.com

Top Domains in Tweet in G4:
[159] arstechnica.com
[10] twitter.com
[2] snort.org
[1] cisa.gov
[1] vmware.com
[1] talosintelligence.com
[1] bleepingcomputer.com

Top Domains in Tweet in G5:
[27] arstechnica.com
[24] cyberscoop.com
[19] buaq.net
[16] github.com
[15] iswin.org
[6] vmware.com
[6] zdnet.com
[3] twitter.com
[3] gov.ie
[1] virten.net

Top Domains in Tweet in G6:
[17] eucse.com
[5] github.com
[5] vmware.com
[2] vagrantup.com
[1] twitter.com
[1] infl.tv
[1] osxdaily.com

Top Domains in Tweet in G7:
[11] arstechnica.com
[7] bleepingcomputer.com
[6] sans.edu
[4] nextron-systems.com
[4] greynoise.io
[2] github.com
[2] linkedin.com
[2] buaq.net
[2] twitter.com
[2] security.nl

Top Domains in Tweet in G8:
[22] vmware.com
[13] cyberscoop.com
[13] dlvr.it
[7] google.com
[5] co.nz
[4] gotowebinar.com
[3] twitter.com
[2] forbes.com
[2] bit.ly
[2] idg.com

Top Domains in Tweet in G9:
[53] publickey1.jp
[1] ikura-oisii.com
[1] twitter.com

Top Domains in Tweet in G10:
[57] vmware.com
[9] dy.si
[4] idc.com
[4] google.com
[4] amazon.com
[3] carlwebster.com
[2] contentmx.com
[2] twitter.com
[1] wordpress.com
[1] vfairs.com

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[1003] vmware
[308] cybersecurity
[195] cloud
[142] security
[113] infosec
[95] vexpert
[90] kubernetes
[84] ai
[71] python
[66] vcenter



Top Hashtags in Tweet in G1:
[204] vmware
[46] cybersecurity
[35] workspaceone
[32] cloud
[25] security
[23] infosec
[17] microsoft
[15] vexpert
[14] news
[13] aws

Top Hashtags in Tweet in G2:
[130] vmware
[44] cloud
[40] kubernetes
[35] vexpert
[30] nsx
[26] multicloud
[24] opensource
[24] vsan
[19] securityconnect
[18] tanzu

Top Hashtags in Tweet in G3:
[253] vmware
[210] cybersecurity
[77] infosec
[69] security
[53] malware
[33] vulnerability
[28] cplusplus
[28] devlife
[28] coding
[28] cve

Top Hashtags in Tweet in G4:
[16] vmware
[10] vcenter
[3] vulnerability
[1] openserver
[1] smb
[1] cybersecurity
[1] dib
[1] patch

Top Hashtags in Tweet in G5:
[15] cve
[4] threatintel
[4] vmware
[1] bug
[1] update
[1] nsx
[1] ciberint
[1] esint
[1] hackers
[1] flaw

Top Hashtags in Tweet in G6:
[2] vmware
[2] fusion
[2] monterey
[1] apple
[1] digitalworkspace

Top Hashtags in Tweet in G7:
[15] vmware
[8] vulnerability
[7] cybersecurity
[7] cve
[6] threatprotection
[3] dfir
[3] cyberattack
[3] incident
[3] cyberthreats
[2] exploit

Top Hashtags in Tweet in G8:
[69] cloud
[43] vmware
[39] mi
[39] ar
[39] augmentedreality
[39] edge
[34] tech
[21] innovation
[14] aws
[14] technology

Top Hashtags in Tweet in G9:
[29] 情報漏洩
[1] 情報流出
[1] vmware
[1] サーバー
[1] 中古
[1] オークション
[1] 初期化

Top Hashtags in Tweet in G10:
[53] vmware
[28] vmware_me
[28] everythingvmware
[26] vexpert
[22] vmwaretam
[22] vcommunity
[13] qatar
[11] idcdigital
[10] multicloud
[10] idcclouddc

Top Words
Top Words in Tweet in Entire Graph:
[4793] vmware
[1216] cloud
[1023] 2021
[1000] #vmware
[849] vcenter
[511] critical
[504] under
[484] attack
[478] cve
[465] server

Top Words in Tweet in G1:
[1298] vmware
[477] cloud
[204] #vmware
[195] multi
[179] vcenter
[155] 2021
[141] critical
[119] easy
[116] attack
[115] button

Top Words in Tweet in G2:
[951] vmware
[351] cloud
[231] vexpert
[218] 2021
[165] learn
[155] more
[129] applications
[127] #vmware
[117] security
[99] multi

Top Words in Tweet in G3:
[371] vmware
[258] vcenter
[253] #vmware
[210] #cybersecurity
[180] critical
[172] servers
[159] alert
[141] 2021
[133] scanning
[129] internet

Top Words in Tweet in G4:
[177] vmware
[157] dangoodin001
[153] arstechnica
[151] severity
[151] under
[150] drill
[150] vuln
[150] rating
[150] attack
[23] vcenter

Top Words in Tweet in G5:
[150] vmware
[92] 2021
[88] 21985
[88] systems
[77] cve
[74] exploit
[62] vcenter
[61] activity
[60] detected
[59] patch

Top Words in Tweet in G6:
[142] plugin
[119] vmware
[76] mitchellh
[73] vagrant
[73] source
[72] free
[71] open
[70] re
[70] happy
[70] announce

Top Words in Tweet in G7:
[81] 2021
[81] 21985
[79] exploit
[74] cve
[72] remote
[72] code
[68] cisagov
[66] aware
[66] likelihood
[66] cyber

Top Words in Tweet in G8:
[78] vmware
[69] #cloud
[53] cloud
[43] #vmware
[39] #mi
[39] #ar
[39] #augmentedreality
[39] #edge
[35] ronald_vanloon
[34] #tech

Top Words in Tweet in G9:
[53] terraformがバージョン1
[53] 0に到達
[53] 正式版に
[53] awsやazure
[53] vmwareなどマルチクラウド対応のプロビジョニングツール
[51] publickey
[32] ブログ書きました
[29] パーティションを解放
[29] rhel8をインスコしただけのようなでddでdisk総なめしていくと面白いログが出てきた
[29] vmwareが動いていたようでディスクには残っているようだ

Top Words in Tweet in G10:
[75] vmware
[53] #vmware
[28] #vmware_me
[28] #everythingvmware
[26] cloud
[26] #vexpert
[22] #vmwaretam
[22] #vcommunity
[18] idcmea
[18] intel

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[561] vmware,vcenter
[461] cve,2021
[441] 2021,21985
[395] severity,rating
[361] multi,cloud
[360] under,attack
[346] rating,under
[341] vuln,severity
[334] vmware,vuln
[326] drill,vmware

Top Word Pairs in Tweet in G1:
[192] multi,cloud
[151] vmware,vcenter
[113] easy,button
[110] button,multi
[109] vmware,easy
[103] forbes,vmware
[95] vcenter,server
[87] vmware,cloud
[81] critical,vmware
[67] under,attack

Top Word Pairs in Tweet in G2:
[95] multi,cloud
[71] vmware,cloud
[61] vexpert,2021
[49] learn,more
[47] applications,open
[44] 2021,2nd
[44] 2nd,half
[44] vexpert,applications
[44] open,applications
[44] applications,close

Top Word Pairs in Tweet in G3:
[140] #vmware,vcenter
[136] vcenter,servers
[117] scanning,internet
[116] actively,scanning
[112] alert,cybercriminals
[112] cybercriminals,actively
[112] internet,#vmware
[112] servers,patched
[103] vmware,vcenter
[99] cve,2021

Top Word Pairs in Tweet in G4:
[150] severity,rating
[150] rating,under
[150] under,attack
[149] drill,vmware
[149] vmware,vuln
[149] vuln,severity
[148] attack,dangoodin001
[146] arstechnica,drill
[20] vmware,vcenter
[12] remote,code

Top Word Pairs in Tweet in G5:
[88] 2021,21985
[77] cve,2021
[60] activity,detected
[52] 21985,exploit
[52] exploit,activity
[52] vmware,vcenter
[50] bad_packets,cve
[45] build,number
[44] identify,vulnerable
[44] vulnerable,systems

Top Word Pairs in Tweet in G6:
[72] vmware,plugin
[72] plugin,free
[71] vagrant,vmware
[71] free,open
[71] open,source
[70] re,happy
[70] happy,announce
[70] announce,vagrant
[70] source,plugin
[70] plugin,paid

Top Word Pairs in Tweet in G7:
[81] 2021,21985
[74] cve,2021
[72] remote,code
[66] cisagov,aware
[66] aware,likelihood
[66] likelihood,cyber
[66] cyber,threat
[66] threat,actors
[66] actors,attempting
[66] attempting,exploit

Top Word Pairs in Tweet in G8:
[39] #cloud,#mi
[39] #ar,#augmentedreality
[39] #augmentedreality,#edge
[31] check,industrious
[31] industrious,little
[31] little,co
[31] co,workers
[31] workers,intengineering
[31] intengineering,#cloud
[31] #mi,#tech

Top Word Pairs in Tweet in G9:
[53] terraformがバージョン1,0に到達
[53] 0に到達,正式版に
[53] 正式版に,awsやazure
[53] awsやazure,vmwareなどマルチクラウド対応のプロビジョニングツール
[32] ブログ書きました,terraformがバージョン1
[31] publickey,ブログ書きました
[29] パーティションを解放,rhel8をインスコしただけのようなでddでdisk総なめしていくと面白いログが出てきた
[29] rhel8をインスコしただけのようなでddでdisk総なめしていくと面白いログが出てきた,vmwareが動いていたようでディスクには残っているようだ
[29] vmwareが動いていたようでディスクには残っているようだ,これからディスクサルベージを行います
[29] これからディスクサルベージを行います,楽しいことになりそうw

Top Word Pairs in Tweet in G10:
[28] #vmware_me,#everythingvmware
[22] #vmware,#vmwaretam
[22] #vmwaretam,#vexpert
[22] #vexpert,#vcommunity
[15] #vmware,#vmware_me
[12] ian,jansen
[11] roadshow,#qatar
[11] jansen,rensburg
[10] episode,291
[10] 291,introducing

Top Replied-To
Top Replied-To in Entire Graph:
@vmware
@davidmirror
@josh__ferrell
@spoonen
@tsugliani
@tscalzott
@mikeroysoft
@mitchellh
@keithrichardlee
@entapprepo

Top Replied-To in G1:
@entapprepo
@malnote

Top Replied-To in G2:
@vmware
@davidmirror
@josh__ferrell
@spoonen
@tsugliani
@tscalzott
@theshankm
@hari5611
@csbarratt
@vmwareeducation

Top Replied-To in G3:
@thehackersnews

Top Replied-To in G4:
@teknogrow
@gossithedog

Top Replied-To in G5:
@gossithedog
@teknogrow
@cyberscoopnews
@briankrebs
@hackergautam

Top Replied-To in G6:
@mikeroysoft
@mitchellh
@mstine
@aaronbbrown777
@timothysc
@impost0r_
@j23evan
@vmwarefusion
@plankers

Top Replied-To in G7:
@lennaert89

Top Replied-To in G8:
@ronald_vanloon

Top Replied-To in G10:
@honeywell
@vodafonegroup

Top Mentioned
Top Mentioned in Entire Graph:
@vmware
@dangoodin001
@arstechnica
@vexpert
@thehackersnews
@vmwaretanzu
@mitchellh
@bad_packets
@cisagov
@uscert_gov

Top Mentioned in G1:
@entapprepo
@examsdumps
@alisterbrenton
@towardscybersec
@info_sec_buzz
@techzineeu
@dougbrowndba
@rmarcelozano

Top Mentioned in G2:
@vmware
@vexpert
@vmwaretanzu
@vmwarevsan
@vmwarensx
@vmwarevsphere
@kitcolbert
@lamw
@vmwareeducation
@vmwarevcf

Top Mentioned in G3:
@thehackersnews
@zdnet
@vmware
@blueteamsec1
@ajblackston
@veeam
@seamlessblend
@liamt
@ptracesecurity
@jinibabd

Top Mentioned in G4:
@dangoodin001
@arstechnica
@gossithedog
@snort
@eoneill
@briankrebs
@certbund
@uuallan
@infosecrick
@takellermann

Top Mentioned in G5:
@bad_packets
@cyb3rops
@ncsc_gov_ie
@danielmiessler
@ncsc_
@jas502n
@thecybersechub
@snlyngaas
@cyberscoopnews
@securitytrails

Top Mentioned in G6:
@mitchellh
@sdotknight
@vmware
@jayunit100
@apple
@vmwarefusion
@dmitriykalinin
@aaronbbrown777
@phillipsj73
@naadirjeewa

Top Mentioned in G7:
@cisagov
@uscert_gov
@bad_packets
@threatintel
@sans_isc
@cyb3rops
@greynoiseio
@thor_scanner
@thehackersnews
@supriyamaz

Top Mentioned in G8:
@ronald_vanloon
@intengineering
@paula_piccard
@vmware
@wef
@lenzker
@ri
@ronkita0306
@sofiaitc
@sbucloud

Top Mentioned in G9:
@publickey
@tomocha0
@ikuraoisiiii
@musicdump0710
@mitchellh

Top Mentioned in G10:
@vmware
@idcmea
@intel
@netapp
@vmware_me
@idc
@citrix
@psu_ruh
@ezzeldinhussein
@ramabhardi

Top Tweeters
Top Tweeters in Entire Graph:
@rojname_com
@sectest9
@wkwkrnht
@hrblock_21
@cybersec_feeds
@chidambara09
@edinburghwatch
@freiewelteu
@bella623
@as_sakimori

Top Tweeters in G1:
@rojname_com
@freiewelteu
@matiere
@yoshiki7111
@crweworld
@zephel01
@flashalert_me
@thedextazlab
@newsfilterio
@csa_dvillamizar

Top Tweeters in G2:
@businessinsider
@discovertech3
@cnbc
@stfuimtweetn0_o
@windows
@hunthertornado
@k3vk4
@ibrahimacar5334
@forbes
@francmolica

Top Tweeters in G3:
@sectest9
@cybersec_feeds
@cybersecurityn8
@rvp
@netsecu
@clarinetwoman2
@youranonriots
@devvibesbot
@xzpwedvhhh37i3c
@techjunkiejh

Top Tweeters in G4:
@zerglinator
@ppiixx
@sponson
@jingbay
@komiska
@jb2x
@jearle
@ouij
@eighttons
@chasapple

Top Tweeters in G5:
@baarahk
@adekleine
@mig30m6
@arenasjoseluis4
@serghiosir
@enriquereyes
@dyfustic
@brianhonan
@thesiliconhill
@unixdoss

Top Tweeters in G6:
@siuying
@kwuchu
@juev
@shochdoerfer
@skpodila
@dougfort
@gep13
@ripienaar
@joepferguson
@fideloper

Top Tweeters in G7:
@hassan_k82
@andre3verzaal
@securityblog
@jayeshmthakur
@jeanfrancis
@csocintel
@gideonpekun
@nicoladiaz
@cybsecbot
@xeck29x

Top Tweeters in G8:
@femtech_
@bexxmodd
@jamesjava
@artificialbra1n
@gezgintrk
@trippbraden
@nicochan33
@gokula15sai
@openmarketingtv
@periscopeislit

Top Tweeters in G9:
@wkwkrnht
@as_sakimori
@lm700j
@you_and_i
@bb45_colorado
@7n2jju
@toru_inoue
@innocent_zero
@keiki22
@k_wakita

Top Tweeters in G10:
@andytoronto
@vicustomercare
@capgemini
@commvault
@nutanix
@rseroter
@citrix
@trendmicro
@netapp
@nfsdudeabides


We use necessary cookies to make our site work. We’d like to set additional cookies to understand site usage, make site improvements and to remember your settings. We also use cookies set by other sites to help deliver content from their services.