NodeXL Graph Gallery: Interactive Graph


Donate to the Social Media Research Foundation's NodeXL development fund

(Cyber Security) OR Cybersecurity_2023-01-16_23-30-00.xlsx (experimental version)
NOTE: This version of the graph is not available with the browser you are using. A more recent version of the browser is required.
Zoom in Zoom out Reset the graph
Go to the graph's main page

From:
NodeXLExcelAutomator
Uploaded on:
January 17, 2023
Short Description:
(Cyber Security) OR Cybersecurity via NodeXL https://bit.ly/3XmqQnt
@eli_krumova
@felixjo34588135
@elonmusk
@sectest9
@cybersecurityn8
@georgeicebek90
@twitter
@bowtiedcyber
@ucloudify
@benihacks

Top hashtags:
#cybersecurity
#infosec
#security
#100daysofcode
#ai

Description:
Description
The graph represents a network of 4,662 Twitter users whose recent tweets contained "(Cyber Security) OR Cybersecurity", or who were replied to, mentioned, retweeted or quoted in those tweets, taken from a data set limited to a maximum of 5,000 tweets, tweeted between 3/26/2006 12:00:00 AM and 1/16/2023 5:00:34 PM. The network was obtained from Twitter on Tuesday, 17 January 2023 at 07:36 UTC.

The tweets in the network were tweeted over the 3234-day, 16-hour, 28-minute period from Monday, 10 March 2014 at 08:31 UTC to Tuesday, 17 January 2023 at 01:00 UTC.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, an edge for each "retweet" relationship in a tweet, an edge for each "quote" relationship in a tweet, an edge for each "mention in retweet" relationship in a tweet, an edge for each "mention in reply-to" relationship in a tweet, an edge for each "mention in quote" relationship in a tweet, an edge for each "mention in quote reply-to" relationship in a tweet, and a self-loop edge for each tweet that is not from above.

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 4662
Unique Edges : 3441
Edges With Duplicates : 7546
Total Edges : 10987
Number of Edge Types : 8
Mentions : 1296
Retweet : 2317
MentionsInRetweet : 2917
Replies to : 665
MentionsInReplyTo : 1154
Tweet : 1988
Quote : 523
MentionsInQuote : 127
Self-Loops : 2427
Reciprocated Vertex Pair Ratio : 0.015245158632056
Reciprocated Edge Ratio : 0.0300324675324675
Connected Components : 1019
Single-Vertex Connected Components : 552
Maximum Vertices in a Connected Component : 2601
Maximum Edges in a Connected Component : 7994
Maximum Geodesic Distance (Diameter) : 17
Average Geodesic Distance : 6.402902
Graph Density : 0.00022678761146901
Modularity : 0.465329
NodeXL Version : 1.0.1.508
Data Import : The graph represents a network of 4,662 Twitter users whose recent tweets contained "(Cyber Security) OR Cybersecurity", or who were replied to, mentioned, retweeted or quoted in those tweets, taken from a data set limited to a maximum of 5,000 tweets, tweeted between 3/26/2006 12:00:00 AM and 1/16/2023 5:00:34 PM. The network was obtained from Twitter on Tuesday, 17 January 2023 at 07:36 UTC.

The tweets in the network were tweeted over the 3234-day, 16-hour, 28-minute period from Monday, 10 March 2014 at 08:31 UTC to Tuesday, 17 January 2023 at 01:00 UTC.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, an edge for each "retweet" relationship in a tweet, an edge for each "quote" relationship in a tweet, an edge for each "mention in retweet" relationship in a tweet, an edge for each "mention in reply-to" relationship in a tweet, an edge for each "mention in quote" relationship in a tweet, an edge for each "mention in quote reply-to" relationship in a tweet, and a self-loop edge for each tweet that is not from above.

Layout Algorithm : The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.
Graph Source : TwitterSearch2
Graph Term : (Cyber Security) OR Cybersecurity
Groups : The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.
Edge Color : Edge Weight
Edge Width : Edge Weight
Edge Alpha : Edge Weight
Vertex Radius : Betweenness Centrality

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[205] http://agram.com/cyber_recovery
[76] https://www.microsoft.com/security/blog/2021/12/08/new-research-shows-iot-and-ot-innovation-is-critical-to-business-but-comes-with-significant-risks/
[36] https://customers.microsoft.com/en-us/story/1412070689447388491-lhoist-manufacturing-defender-for-iot-security
[31] https://www.cyberark.com/resources/threat-research-blog/fantastic-rootkits-and-where-to-find-them-part-1
[31] https://instagram.com/josh_hack001/?igshid=YmMyMTA2M2Y=
[30] http://cyberiqs.com/latestnews
[21] https://skynettools.com/shells-a-script-for-generating-common-revshells-fast-easy/
[19] https://twinybots.ch/
[18] https://www.nusurtech.ca/2022/11/CyberSecurity.html?m=1
[18] https://www.nusurtech.ca/2022/11/CyberSecurity2.html

Top URLs in Tweet in G1:
[21] https://customers.microsoft.com/en-us/story/1412070689447388491-lhoist-manufacturing-defender-for-iot-security
[12] https://www.dailymail.co.uk/sciencetech/article-11641209/Cybersecurity-expert-reveals-warning-signs-hacked-webcam-smartphone.html
[6] https://www.forbes.com/sites/stewartroom/2023/01/16/europe-beefs-up-cybersecurity-law-trumping-the-uk/
[6] https://twinybots.ch/
[6] https://www.electricbrain.com.au/pages/analytics/realtime-graphs-of-stuff.php
[4] https://twitter.com/botdmtktwo/status/1591115908189417472/photo/1
[4] https://twitter.com/livreurdeweed5/status/1615077860103913490/photo/1
[4] https://twitter.com/livreurdeweed5/status/1615077930945904640/photo/1
[4] https://twitter.com/livreurdeweed5/status/1615077892089585670/photo/1
[4] https://www.bizjournals.com/kansascity/news/2022/10/01/why-your-business-could-be-denied-cybersecurity.html

Top URLs in Tweet in G2:
[30] http://cyberiqs.com/latestnews
[11] https://blogs.jpcert.or.jp/en/2023/01/cloud_malware_analysis.html
[8] https://twitter.com/CyberJamie/status/1615060566011220008/photo/1
[8] https://www.cio.com/article/419288/2-innovations-that-can-tip-the-balance-in-cybersecurity.html
[8] https://www.hackread.com/starting-cybersecurity-business/?utm_content=bufferada2c&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
[8] https://atomspam.com/
[8] https://infosec-jobs.com/job/22243-soc-analyst-l2/
[8] https://getpvaaccount.com/buy-edu-emails/
[7] https://www.infosecurity-magazine.com/news/russian-hackers-to-bypass-chatgpt/
[7] https://www.bleepingcomputer.com/news/security/vice-society-ransomware-leaks-university-of-duisburg-essen-s-data/

Top URLs in Tweet in G3:
[4] https://twitter.com/XxCL0UDxX1990/status/1615118009747574784/photo/1
[3] https://twitter.com/Summeryasia/status/1615086618993623040/photo/1
[2] https://twitter.com/JimmysaysYeah/status/1615113854937186310
[1] https://hitmarker.net/jobs/discord-security-software-engineer-intern-1812030
[1] https://hitmarker.net/jobs/discord-data-engineering-intern-1811981
[1] https://twitter.com/defiancemediatv/status/1612528256132997135/video/1
[1] https://twitter.com/izzyzorc19/status/1615121602190114817/photo/1
[1] https://twitter.com/CintrixKing/status/1615093886652751884/photo/1
[1] https://twitter.com/Foxeeeejeongin/status/1615111939125805056/photo/1
[1] https://twitter.com/Razerflash1/status/1615108608815165440/photo/1

Top URLs in Tweet in G4:
[205] http://agram.com/cyber_recovery
[3] https://twitter.com/itscassiecass/status/1615139896494022657/photo/1
[3] https://instagram.com/apexxrecoverytech
[3] https://instagram.com/jeffscott_hack
[2] https://twitter.com/nikoincognito/status/1614484207635517442
[2] https://twitter.com/teezyitainteazy/status/1567230943668350976
[2] https://twitter.com/TheSocialsScene/status/1612112235035492353/photo/1
[2] https://twitter.com/simonpeter0812/status/1614528987711127553/photo/1
[2] https://instagram.com/charlottehack1111/?igshid=YmMyMTA2M2Y=
[2] https://twitter.com/AlSultan_Meriam/status/1615110031237844994/photo/1

Top URLs in Tweet in G5:
[4] https://twitter.com/BaycNyc/status/1615063741569327104/photo/1
[2] https://twitter.com/White_Jae/status/1591215565469020160/photo/1
[2] https://twitter.com/White_Jae/status/1591211658680340480/photo/1
[1] https://twitter.com/thefirehood/status/1615147891097575425/photo/1
[1] https://twitter.com/Idonthavename06/status/1615146305491447808/photo/1
[1] https://twitter.com/gracelover712/status/1615149643540664321
[1] https://twitter.com/SamZanto/status/1614995093936803845
[1] https://twitter.com/jmrhyme1/status/1615143514685460481
[1] https://twitter.com/tallandfatt/status/1615147280658739200
[1] https://twitter.com/xtrosage/status/1615146827460005892

Top URLs in Tweet in G6:
[7] https://bowtiedcyber.substack.com
[5] https://bowtiedraptor.substack.com/p/start-here
[5] https://bowtiedraptor.substack.com/p/cybersecurity-and-data-science-converge
[2] https://tryhackme.com/why-subscribe
[1] https://tryhackme.com/room/pentestingfundamentals
[1] https://twitter.com/danielmakelley/status/1614240956559024132
[1] https://www.credly.com/badges/3a8870ef-3212-4b61-8148-dc1e47453ce6/twitter?t=roky8k
[1] https://startups.co.uk/startups-100/2023/hack-the-box/
[1] https://twitter.com/CyberOutlook/status/1613972248360259586
[1] https://www.cyberoutlook.org/post/top-cybersecurity-podcasts-to-keep-up-with-security-news-and-trends

Top URLs in Tweet in G7:
[31] https://instagram.com/josh_hack001/?igshid=YmMyMTA2M2Y=
[15] https://instagram.com/reid_cyber_security/
[3] https://www.progathers.com/regulation/
[2] http://ds3-bandwidth.com
[2] https://www.nccgroup.com/us/insights/?utm_source=IIoTWorldSocialMedia
[2] https://twitter.com/Lattey999/status/1613232341497040897
[2] https://twitter.com/ShinStar_WT/status/1614722706829905920/photo/1
[1] https://www.linkedin.com/posts/cisco_cybersecurity-risks-activity-7019151352245186560-qNPc?utm_source=share&utm_medium=member_ios
[1] https://www.marklynd.com/5-reasons-zero-trust/
[1] https://twitter.com/mclynd/status/1613636363110256665/photo/1

Top URLs in Tweet in G8:
[26] https://www.cyberark.com/resources/threat-research-blog/fantastic-rootkits-and-where-to-find-them-part-1
[15] https://skynettools.com/shells-a-script-for-generating-common-revshells-fast-easy/
[10] https://twitter.com/DailyDarkWeb/status/1615052793966129153/photo/1
[9] https://raw.githubusercontent.com/Orange-Cyberdefense/arsenal/master/mindmap/pentest_ad.png
[5] https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development?s=09
[4] https://twitter.com/0xor0ne/status/1615038730544218117/photo/1
[4] https://twitter.com/0xor0ne/status/1614706498097090560/photo/1
[3] https://www.comparitech.com/net-admin/subnetting-guide/
[3] https://foxutech.com/what-is-dns-and-how-it-works/
[3] https://twitter.com/0xor0ne/status/1613589181388701696/photo/1

Top URLs in Tweet in G9:
[12] https://www.mltut.com/best-math-courses-for-machine-learning/
[6] https://www.tomshardware.com/news/raspberry-pi-pico-powered-open-source-ebook-reader
[4] https://twitter.com/Eli_Krumova/status/1551558210959679489/photo/1
[4] https://verticalinsider.tradepub.com/free/w_bund20/prgm.cgi?a=1
[4] https://twitter.com/Eli_Krumova/status/1359491699811233799/photo/1
[4] https://twitter.com/Eli_Krumova/status/1565023615342596104/photo/1
[4] https://enterprivacy.com/2017/03/01/categories-of-personal-information/
[3] https://www.youtube.com/watch?v=KtKZVc0joYQ

[3] https://twitter.com/Eli_Krumova/status/1559179121816752129/photo/1
[3] https://twitter.com/HarbRimah/status/1506514847021912070

Top URLs in Tweet in G10:
[9] https://twitter.com/SecurityTrybe/status/1614987267633995781/photo/1
[3] https://fedvte.usalearning.gov/publiccourses/cyberessentials/index.htm?track=trackingon
[2] https://cloud.connect.isc2.org/CISSP-eBook-Fundamentals-Focus?utm_source=metatarget&utm_medium=email&utm_campaign=GBL-cisspfundamentalsinfocus&utm_term=dec6&utm_content=ebook
[2] https://www.cybersecurity-insiders.com/cuba-ransomware-gang-hacking-microsoft-exchange-servers/
[1] https://drive.google.com/drive/folders/1DqvFPxC3ROZgRndVYsfpX7C7Nqx1CnmL?usp=sharing
[1] https://twitter.com/SecurityTrybe/status/1615083760713891840/photo/1
[1] https://fedvte.usalearning.gov/publiccourses/IMR_cloud/index01.htm?track=trackingon
[1] https://fedvte.usalearning.gov/publiccourses/cloud2/cloudframe.php
[1] https://twitter.com/SecurityTrybe/status/1615083031127097355/photo/1
[1] https://twitter.com/SecurityTrybe/status/1614956803032317952/photo/1

Top Domains
Top Domains in Tweet in Entire Graph:
[1823] twitter.com
[205] agram.com
[122] microsoft.com
[97] paper.li
[62] instagram.com
[55] youtube.com
[49] bleepingcomputer.com
[45] medium.com
[42] co.uk
[39] nusurtech.ca

Top Domains in Tweet in G1:
[220] twitter.com
[24] microsoft.com
[22] paper.li
[20] co.uk
[15] google.com
[13] com.au
[12] linkedin.com
[11] hackthebox.com
[10] forbes.com
[8] t.me

Top Domains in Tweet in G2:
[322] twitter.com
[39] cyberfeed.io
[31] nationalcybersecurity.com
[30] cyberiqs.com
[29] infosec-jobs.com
[28] medium.com
[27] bleepingcomputer.com
[16] dr-farfar.com
[14] securityboulevard.com
[12] infosecurity-magazine.com

Top Domains in Tweet in G3:
[244] twitter.com
[2] hitmarker.net
[1] d.va
[1] somachar.us
[1] variety.com

Top Domains in Tweet in G4:
[266] twitter.com
[205] agram.com
[10] instagram.com
[2] tiktok.com
[1] whatsapp.com
[1] trib.al
[1] kwwl.com
[1] businessinsider.com
[1] musical.ly
[1] worldstar.com

Top Domains in Tweet in G5:
[54] twitter.com
[1] petitions.net
[1] reddit.com
[1] instagram.com
[1] nypost.com
[1] stupidpartyland.com
[1] twittertrails.com

Top Domains in Tweet in G6:
[18] substack.com
[8] twitter.com
[3] tryhackme.com
[3] nature.com
[2] cyberoutlook.org
[2] towardsdatascience.com
[2] securitymagazine.com
[2] hackthebox.com
[1] credly.com
[1] co.uk

Top Domains in Tweet in G7:
[48] twitter.com
[46] instagram.com
[6] youtube.com
[3] progathers.com
[2] linkedin.com
[2] ds3-bandwidth.com
[2] nccgroup.com
[2] iiot-world.com
[2] paper.li
[1] marklynd.com

Top Domains in Tweet in G8:
[46] twitter.com
[26] cyberark.com
[16] skynettools.com
[11] securecybersolution.com
[9] githubusercontent.com
[5] comparitech.com
[5] gitbook.io
[5] intezer.com
[4] github.io
[4] k3170makan.com

Top Domains in Tweet in G9:
[102] twitter.com
[16] youtube.com
[15] mltut.com
[6] tomshardware.com
[4] medium.com
[4] tradepub.com
[4] kdnuggets.com
[4] enterprivacy.com
[2] securityboulevard.com
[2] betterprogramming.pub

Top Domains in Tweet in G10:
[24] twitter.com
[6] cybersecurity-insiders.com
[5] usalearning.gov
[2] isc2.org
[2] wehackpurple.com
[1] google.com
[1] github.com
[1] youtube.com
[1] ow.ly
[1] or.jp

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[2478] cybersecurity
[876] infosec
[343] security
[332] 100daysofcode
[330] ai
[293] datascience
[285] hacking
[265] machinelearning
[248] pentesting
[238] tech



Top Hashtags in Tweet in G1:
[350] cybersecurity
[38] infosec
[34] security
[31] crypto
[27] ai
[22] technology
[19] tech
[18] cyber
[16] invest
[15] investment

Top Hashtags in Tweet in G2:
[1093] cybersecurity
[603] infosec
[242] 100daysofcode
[194] datascience
[186] pentesting
[170] hacking
[159] cloudsecurity
[151] machinelearning
[151] privacy
[149] oscp

Top Hashtags in Tweet in G3:
[3] cybersecurity
[2] lensaai
[1] hackers
[1] iphone
[1] android
[1] iwasntnaked
[1] bhfamily
[1] prohuman
[1] amazon
[1] silverlining

Top Hashtags in Tweet in G4:
[6] tiktok
[4] snapchat
[4] snapchatsupport
[3] banned
[2] viral
[2] the_webhack
[1] transwomenareconmen
[1] letwomenspeak
[1] twam
[1] deadbydaylgiht

Top Hashtags in Tweet in G5:
[12] cybersecurity
[11] web3trainer
[9] bigfacts
[8] jaethehybridwhite
[7] bitcoin
[5] mayc
[5] education
[4] blockchaintechnology
[4] blockchain
[4] nycbbyc

Top Hashtags in Tweet in G6:
[26] cybersecurity
[15] machinelearning
[11] 100daysofcode
[11] bigdata
[11] datascience
[9] 100daysofmlcode
[9] python
[9] flutter
[9] rstats
[9] devcommunity

Top Hashtags in Tweet in G7:
[29] cybersecurity
[10] security
[9] technology
[5] ai
[5] hacked
[4] iot
[4] wireless
[4] hacking
[3] infosec
[3] vr

Top Hashtags in Tweet in G8:
[99] cybersecurity
[94] infosec
[41] pentesting
[33] oscp
[28] malware
[27] windows
[26] rootkit
[18] informationsecurity
[17] pentest
[16] netsec

Top Hashtags in Tweet in G9:
[77] ai
[71] cybersecurity
[67] iot
[64] datascience
[62] machinelearning
[56] ml
[55] bigdata
[54] analytics
[49] 100daysofcode
[48] iiot

Top Hashtags in Tweet in G10:
[69] cybersecurity
[43] tech
[43] hacked
[43] hacking
[43] security
[42] infosec
[40] cyberattack
[21] community
[18] cyber
[16] cybersec

Top Words
Top Words in Tweet in Entire Graph:
[2479] #cybersecurity
[1555] security
[1258] account
[1232] cyber
[1088] cybersecurity
[876] #infosec
[581] expert
[572] professional
[567] dm
[547] help

Top Words in Tweet in G1:
[350] #cybersecurity
[236] cybersecurity
[163] security
[131] cyber
[69] more
[57] learn
[56] data
[47] 2023
[42] read
[38] #infosec

Top Words in Tweet in G2:
[1093] #cybersecurity
[603] #infosec
[242] #100daysofcode
[230] security
[198] dm
[194] #datascience
[186] #pentesting
[170] #hacking
[161] account
[159] #cloudsecurity

Top Words in Tweet in G3:
[483] account
[298] security
[297] instagram
[296] cyber
[295] expert
[294] send
[293] simply
[293] contact
[293] ig
[293] dm

Top Words in Tweet in G4:
[353] account
[273] help
[225] security
[221] cyber
[219] recovering
[219] professional
[214] good
[212] whatsapp
[212] hit
[211] expert

Top Words in Tweet in G5:
[124] account
[63] security
[59] cyber
[53] recovery
[52] help
[50] hacker
[48] recover
[37] elonmusk
[35] sure
[35] cozy_j7

Top Words in Tweet in G6:
[232] cybersecurity
[202] data
[166] science
[140] bowtiedcyber
[33] know
[32] job
[26] #cybersecurity
[25] need
[23] cyber
[23] career

Top Words in Tweet in G7:
[68] account
[61] cyber
[46] security
[38] hacked
[34] youtube
[32] won
[31] 854
[31] assist
[31] 639
[31] recovered

Top Words in Tweet in G8:
[99] #cybersecurity
[94] #infosec
[46] 0xor0ne
[41] #pentesting
[33] #oscp
[30] series
[30] intro
[28] #malware
[28] windows
[27] #c

Top Words in Tweet in G9:
[78] #ai
[72] #cybersecurity
[67] #iot
[64] #datascience
[63] #machinelearning
[59] eli_krumova
[57] #ml
[55] #bigdata
[54] #analytics
[49] #100daysofcode

Top Words in Tweet in G10:
[70] cybersecurity
[69] #cybersecurity
[67] securitytrybe
[43] #hacked
[43] #hacking
[43] #security
[43] #tech
[42] #infosec
[40] #cyberattack
[32] security

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[965] cyber,security
[532] security,expert
[506] professional,cyber
[500] account,professional
[334] send,dm
[321] #infosec,#cybersecurity
[292] retrieve,reactivate
[292] brian,j5
[292] instagram,retrieve
[292] simply,contact

Top Word Pairs in Tweet in G1:
[63] cyber,security
[24] learn,more
[22] iot,ot
[21] addressing,vulnerabilities
[21] ot,environment
[21] proactively,addressing
[21] customer,story
[21] learn,vital
[21] vulnerabilities,iot
[21] read,mfstsecurity

Top Word Pairs in Tweet in G2:
[243] #infosec,#cybersecurity
[149] #pentesting,#oscp
[122] #cybersecurity,#cybersecuritytips
[117] #cybersecuritytips,#pentesting
[102] #datasecurity,#privacy
[99] #cybersecurity,#infosec
[97] #oscp,#redteam
[95] #privacy,#100daysofcode
[84] #datascience,#datascientists
[81] #100daysofcode,#cloudsecurity

Top Word Pairs in Tweet in G3:
[296] cyber,security
[295] security,expert
[292] retrieve,reactivate
[292] brian,j5
[292] contact,brian
[292] simply,contact
[292] j5,instagram
[292] dm,ig
[292] expert,send
[292] professional,cyber

Top Word Pairs in Tweet in G4:
[221] cyber,security
[211] security,expert
[208] seek,help
[208] advise,seek
[208] reach,whatsapp
[207] professional,cyber
[207] reactivating,account
[207] good,recovering
[207] account,professional
[207] expert,hit

Top Word Pairs in Tweet in G5:
[58] cyber,security
[47] recover,account
[35] security,hacker
[35] sure,help
[32] help,recover
[32] fully,sure
[32] hacker,fully
[32] cozy_j7,ig
[25] support,team
[23] haven't,gotten

Top Word Pairs in Tweet in G6:
[163] data,science
[104] bowtiedcyber,cybersecurity
[81] science,cybersecurity
[80] science,data
[80] cybersecurity,data
[18] data,analytics
[16] cybersecurity,defense
[16] blue,team
[15] know,read
[15] read,data

Top Word Pairs in Tweet in G7:
[46] cyber,security
[31] whatsapp,639
[31] 639,854
[31] 854,1167
[31] recovered,reach
[31] assist,hit
[31] account,recovered
[31] hit,cyber
[31] reach,whatsapp
[31] won,assist

Top Word Pairs in Tweet in G8:
[38] #infosec,#cybersecurity
[33] #pentesting,#oscp
[30] intro,series
[30] #cybersecurity,#pentesting
[28] series,windows
[26] #malware,#windows
[26] cyberarklabs,#malware
[26] #rootkit,#infosec
[26] rootkits,internals
[26] internals,cyberarklabs

Top Word Pairs in Tweet in G9:
[43] #iot,#iiot
[34] #iiot,#iotpl
[33] #ai,#ml
[29] #bigdata,#analytics
[21] #analytics,#ai
[19] #ai,#machinelearning
[18] #programming,#coding
[16] #ml,#machinelearning
[16] #datascience,#bigdata
[15] #iot,#100daysofmlcode

Top Word Pairs in Tweet in G10:
[43] #hacked,#hacking
[18] #cybersecurity,#cyberattack
[18] #cyber,#security
[18] #tech,#infosec
[18] #infosec,#hacked
[18] vectors,#cybersecurity
[18] attack,vectors
[18] #hacking,#cyber
[18] cybersecurity,attack
[18] securitytrybe,cybersecurity

Top Replied-To
Top Replied-To in Entire Graph:
@snapchatsupport
@elonmusk
@bowtiedcyber
@digitalniit
@instagram
@snapchat
@tiktoksupport
@tiktok_us
@facebook
@perfectlyadnan

Top Replied-To in G1:
@addressintel

Top Replied-To in G2:
@pepsi_is_great
@hubnutvids
@bbctech
@ncsventurescorp
@rekcahcomics
@veeam
@deepakprab

Top Replied-To in G3:
@jksthv
@tiktoksupport
@1tules
@eddie_j_g
@adoswhiz
@the_weed_shop
@patpetterson2
@catlaw75
@microsofthelps
@discord

Top Replied-To in G4:
@snapchatsupport
@instagram
@snapchat
@tiktok_us
@tiktoksupport
@perfectlyadnan
@facebook
@whatsapp
@hasanthehun

Top Replied-To in G5:
@elonmusk
@stats_feed
@davidsacks
@camecoulove
@fanduel
@instagram
@cloakbrand
@ronaldd86530213
@snowgod635
@flavortowndon92

Top Replied-To in G6:
@bowtiedcyber
@hackinglz
@b_bonaventure_
@ralphyflex
@0bin_cyber
@miketalonnyc
@imposecost
@jsayushthakur

Top Replied-To in G7:
@youtube
@facebook
@rbx_coeptus
@gmail
@google
@comicsexplained
@bitzelyt
@nightmareloona
@maurice51132848
@nitajay_

Top Replied-To in G9:
@bostondynamics

Top Replied-To in G10:
@xymbiz
@hamadhady

Top Mentioned
Top Mentioned in Entire Graph:
@bowtiedcyber
@hackinarticles
@securitytrybe
@msftsecurity
@eli_krumova
@0xor0ne
@hackwithilaria
@hackwithgibson1
@dkeys_hacks

Top Mentioned in G1:
@oramcyberadvice
@kinlesen1
@a4etechnologies
@poseidontpa
@eksored
@futurumcareers
@dedicatedessays
@gocleared
@andres_btos

Top Mentioned in G2:
@hackinarticles
@hackwithilaria
@hackwithgibson1
@dkeys_hacks
@smartcodeteh77
@point2tech
@technative
@three_cube
@reach2ratan
@sophos

Top Mentioned in G3:
@twitter
@twittersupport
@uber
@discord
@joebiden
@iamtabithabrown
@defiancemediatv
@pokerstars
@elonmusk
@amrullahsaleh2

Top Mentioned in G4:
@instagram
@facebook
@snapchatsupport
@snapchat
@tiktok_us
@tiktoksupport
@aidspott
@jaspercods
@metaforbusiness

Top Mentioned in G5:
@elonmusk
@white_jae
@boredapeyc
@yugalabs
@scottadamssays
@machibigbrother
@baycnyc
@_shanicebest
@cz_binance
@creamdotfinance

Top Mentioned in G6:
@bowtiedcyber
@kevinclarity
@hackthebox_eu
@bowtied_raptor
@0bin_cyber
@realtryhackme
@delancecrockett
@danielmakelley
@bowtiedpussycat
@echoctf

Top Mentioned in G7:
@youtube
@teamyoutube
@shirastweet
@google
@paypal
@liyaraht
@fogoros
@m49d4ch3lly
@nydfs
@evankirstel

Top Mentioned in G8:
@0xor0ne
@cyberarklabs
@shubham_pen
@_cpresearch_
@skynettools
@dailydarkweb
@infoseccomm
@ptracesecurity
@thebinarybot
@_jenniferdavis1

Top Mentioned in G9:
@eli_krumova
@analytics_699
@sourabhskatoch
@tut_ml
@ingliguori
@harbrimah
@gp_pulipaka
@wef
@mvollmer1
@antgrasso

Top Mentioned in G10:
@securitytrybe
@notshenetworks
@wehackpurple
@ireteeh
@bowtiedcyber
@shehackspurple
@womencyberjutsu
@shubham_pen
@cyb_detective
@isc2

Top Tweeters
Top Tweeters in Entire Graph:
@amazonhelp
@pulpnews
@flipkartsupport
@sectest9
@uber_support
@teamyoutube
@chidambara09
@andyvermaut
@rk70534
@hrblock_21

Top Tweeters in G1:
@andyvermaut
@thedextazlab
@123trabajo
@postjobfree
@nwjs_jobs
@hillbeverlyhill
@fincalcaterra
@warriors_mom
@rutkowskidr
@stock_market_pr

Top Tweeters in G2:
@sectest9
@cybersecurityn8
@thehill
@rahul05ranjan
@dataaugmented
@periscopeislit
@royalmail
@andrewmorrisuk
@botstreamer
@fintechna

Top Tweeters in G3:
@amazonhelp
@flipkartsupport
@uber_support
@jot_au
@ola_supports
@discord
@microsofthelps
@lenubienne
@banjarbase
@joncoopertweets

Top Tweeters in G4:
@_kw_23
@snapchatsupport
@nytimes
@lamhfada
@omgstacks
@perfectlyadnan
@shanatic_nimra1
@alyssa_marchese
@morganesdiary
@nizaiah1221

Top Tweeters in G5:
@eahelp
@stillgray
@torontostar
@newstatesman
@fanduel
@gracelover712
@_shanicebest
@100dblockchain
@scottadamssays
@my_muslim

Top Tweeters in G6:
@kaykayhoops23
@deztheplug
@trayvonee
@lamarhefner
@munachim_
@qprovocateur
@richardkimphd
@innagtrey
@ronald_vanloon
@mirakulous_

Top Tweeters in G7:
@teamyoutube
@evankirstel
@askpaypal
@rwang0
@gmail
@google
@domingonarvaez1
@billmew
@jibako44
@cybersecboardrm

Top Tweeters in G8:
@ayirpelle
@sec_cyber
@take_gattcha
@alternative200
@precision_mats
@je6whx
@massar_gueye
@proxyqtr5
@jmacc
@8p1t1h

Top Tweeters in G9:
@reuters
@trippbraden
@kirkdborne
@eli_krumova
@mvollmer1
@ing_martin_v
@socialcurrencie
@haroldsinnott
@taranoland
@realrubberduck1

Top Tweeters in G10:
@ireteeh
@circuitswan
@defcon201nj
@chinaezurum
@xymbiz
@jmlaurio
@cybersecinsider
@shehackspurple
@thepuchiherald
@solchi_06