NodeXL Graph Gallery: Interactive Graph


Donate to the Social Media Research Foundation's NodeXL development fund

(Cyber Security) OR Cybersecurity_2023-03-13_23-30-00.xlsx (experimental version)
NOTE: This version of the graph is not available with the browser you are using. A more recent version of the browser is required.
Zoom in Zoom out Reset the graph
Go to the graph's main page

From:
NodeXLExcelAutomator
Uploaded on:
March 14, 2023
Short Description:
(Cyber Security) OR Cybersecurity via NodeXL https://bit.ly/3l7OzKq
@jamesauto10
@elonmusk
@beefyspace
@dc_draino
@hackinarticles
@monhoo_39
@jayeshmthakur
@vanessafreejan6
@spreadingjoy615
@alvierid

Top hashtags:
#cybersecurity
#infosec
#datascience
#python
#ai

Description:
Description
The graph represents a network of 4,928 Twitter users whose recent tweets contained "(Cyber Security) OR Cybersecurity", or who were replied to, mentioned, retweeted or quoted in those tweets, taken from a data set limited to a maximum of 5,000 tweets, tweeted between 3/26/2006 12:00:00 AM and 3/13/2023 5:00:35 PM. The network was obtained from Twitter on Tuesday, 14 March 2023 at 06:36 UTC.

The tweets in the network were tweeted over the 2861-day, 10-hour, 14-minute period from Wednesday, 13 May 2015 at 13:45 UTC to Tuesday, 14 March 2023 at 00:00 UTC.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, an edge for each "retweet" relationship in a tweet, an edge for each "quote" relationship in a tweet, an edge for each "mention in retweet" relationship in a tweet, an edge for each "mention in reply-to" relationship in a tweet, an edge for each "mention in quote" relationship in a tweet, an edge for each "mention in quote reply-to" relationship in a tweet, and a self-loop edge for each tweet that is not from above.

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 4928
Unique Edges : 2753
Edges With Duplicates : 7968
Total Edges : 10721
Number of Edge Types : 9
Retweet : 2724
MentionsInRetweet : 3154
MentionsInQuote : 70
Quote : 542
Mentions : 849
Replies to : 520
MentionsInReplyTo : 1024
Tweet : 1837
MentionsInQuoteReply : 1
Self-Loops : 2152
Reciprocated Vertex Pair Ratio : 0.015704584040747
Reciprocated Edge Ratio : 0.0309235269536147
Connected Components : 942
Single-Vertex Connected Components : 478
Maximum Vertices in a Connected Component : 2344
Maximum Edges in a Connected Component : 6361
Maximum Geodesic Distance (Diameter) : 20
Average Geodesic Distance : 6.784469
Graph Density : 0.000197114890386658
Modularity : 0.466391
NodeXL Version : 1.0.1.510
Data Import : The graph represents a network of 4,928 Twitter users whose recent tweets contained "(Cyber Security) OR Cybersecurity", or who were replied to, mentioned, retweeted or quoted in those tweets, taken from a data set limited to a maximum of 5,000 tweets, tweeted between 3/26/2006 12:00:00 AM and 3/13/2023 5:00:35 PM. The network was obtained from Twitter on Tuesday, 14 March 2023 at 06:36 UTC.

The tweets in the network were tweeted over the 2861-day, 10-hour, 14-minute period from Wednesday, 13 May 2015 at 13:45 UTC to Tuesday, 14 March 2023 at 00:00 UTC.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, an edge for each "retweet" relationship in a tweet, an edge for each "quote" relationship in a tweet, an edge for each "mention in retweet" relationship in a tweet, an edge for each "mention in reply-to" relationship in a tweet, an edge for each "mention in quote" relationship in a tweet, an edge for each "mention in quote reply-to" relationship in a tweet, and a self-loop edge for each tweet that is not from above.

Layout Algorithm : The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.
Graph Source : TwitterSearch2
Graph Term : (Cyber Security) OR Cybersecurity
Groups : The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.
Edge Color : Edge Weight
Edge Width : Edge Weight
Edge Alpha : Edge Weight
Vertex Radius : Betweenness Centrality

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[199] https://www.instagram.com/web_cyber1/
[16] https://federalnewsnetwork.com/cybersecurity/2023/03/congress-members-warned-of-significant-health-data-breach/
[15] https://www.darkreading.com/risk/svb-meltdown-cybersec-startups-access-capital
[12] https://www.hackingarticles.in/password-crackingvnc/
[12] https://www.hackingarticles.in/password-crackingssh/
[8] https://github.com/Ignitetechnologies/Mindmap/tree/main/Mitre%20Attack
[8] https://www.darkreading.com/application-security/north-korean-hackers-targeting-security-researchers
[7] https://twinybots.ch/
[7] https://www.hackingarticles.in/lateral-movement-pass-the-ticket-attack/
[6] https://www.hackingarticles.in/understanding-the-csrf-vulnerability-a-beginners-guide/

Top URLs in Tweet in G1:
[199] https://www.instagram.com/web_cyber1/
[3] https://twitter.com/DharakshanS/status/1635426990994890753/photo/1
[2] https://twitter.com/bjorkswag/status/1635422050675474432
[2] https://twitter.com/jmseank/status/1635419564065579008
[2] https://twitter.com/mjlink19/status/1635422555610787841
[2] https://twitter.com/realVileHQ/status/1635408951956348931
[2] https://twitter.com/AmazingWomen6/status/1635424240337039360
[2] https://twitter.com/stonedshego/status/1635418880159125506
[1] https://twitter.com/Towelie07/status/1635380006473064460
[1] https://twitter.com/encorekimano/status/1635386784908709888

Top URLs in Tweet in G3:
[10] https://www.darkreading.com/risk/svb-meltdown-cybersec-startups-access-capital
[7] https://twinybots.ch/
[5] https://www.darkreading.com/application-security/north-korean-hackers-targeting-security-researchers
[5] https://blogs.cisco.com/security/authenticity-paves-the-way-to-an-inclusive-future-at-women-in-cybersecurity-conference?utm_medium=feed&utm_source=feedpress.me&utm_campaign=Feed%3A+CiscoBlogs
[4] https://www.entrepreneur.com/science-technology/how-phishing-is-threatening-the-cybersecurity-landscape/446772?utm_source=dlvr.it&utm_medium=twitter
[4] https://discord.com/invite/7gZuXn4tvz
[4] https://twitter.com/vivarodigital/status/1635400868915716098/photo/1
[3] https://www.lakelandtoday.ca/beyond-local/mps-want-annual-national-security-reports-aid-for-businesses-to-thwart-cyber-threats-6693176
[2] https://thehill.com/opinion/cybersecurity/3897447-cyber-regulations-can-make-our-nation-safer/
[2] https://www.dell.com/en-us/dt/services/managed-services/managed-workplace-services/managed-detection-response.htm#pdf-overlay=//www.delltechnologies.com/asset/en-us/services/managed-services/briefs-summaries/mdr-infographic.pdf

Top URLs in Tweet in G4:
[3] https://www.helpnetsecurity.com/2022/10/04/mandatory-password-expiration-helping-or-hurting-password-security/
[3] https://usbestsoft.com/product/buy-verified-paypal-accounts/
[3] https://usbestsoft.com/product/buy-verified-cash-app-accounts/
[3] https://www.youtube.com/watch?v=WQaiClLdvSI&feature=youtu.be

[3] https://twitter.com/NahamSec/status/1635317546344751114/photo/1
[2] https://www.bleepingcomputer.com/news/security/fortinet-new-fortios-bug-used-as-zero-day-to-attack-govt-networks/
[2] https://www.pcmatic.com/blog/international-deliveries-in-limbo-how-royal-mail-could-have-avoided-ransomware-attack/
[2] https://www.accesspointconsulting.com/briefing/march-8-2023
[2] https://github.com/Ignitetechnologies/Mindmap/tree/main/Mitre%20Attack
[2] https://www.redbubble.com/i/t-shirt/Black-hat-hacker-with-hoodie-by-zomgwtfbekjam/142129670.1YYVU?asc=u

Top URLs in Tweet in G6:
[11] https://www.hackingarticles.in/password-crackingvnc/
[11] https://www.hackingarticles.in/password-crackingssh/
[6] https://www.hackingarticles.in/lateral-movement-pass-the-ticket-attack/
[6] https://www.hackingarticles.in/understanding-the-csrf-vulnerability-a-beginners-guide/
[4] https://github.com/Ignitetechnologies/Mindmap/tree/main/Mitre%20Attack
[1] https://www.amazon.com/Getting-Started-Becoming-Master-Hacker/dp/1711729299?crid=2Q2GQ529DA27H&keywords=getting+started+becoming+a+master+hacker&qid=1671634223&sprefix=getting+started,aps,196&sr=8-1&linkCode=sl1&tag=hackerarise-20&linkId=5919579e1fd659c648b46b72277eab91&language=en_US&ref_=as_li_ss_tl
[1] https://www.hackers-arise.com/post/basics-of-xoring
[1] https://www.lanner-america.com/blog/waf-vs-ips-whats-difference/
[1] https://technative.io/cybersecurity-risk-management-how-and-where-to-focus/
[1] https://technative.io/why-cyber-security-is-now-a-board-level-leadership-imperative/

Top URLs in Tweet in G7:
[1] https://cointelegraph.com/explained/how-blockchain-technology-revolutionizes-digital-ownership?utm_content=buffer9ebde&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
[1] https://twitter.com/globaliqx/status/1635396322470637568/photo/1
[1] https://twitter.com/Eli_Krumova/status/1631626397918560256/photo/1
[1] https://twitter.com/davebart/status/1630063297650376704
[1] https://twitter.com/Eli_Krumova/status/1589336299689095170/photo/1
[1] https://twitter.com/Eli_Krumova/status/1600130577784414208/photo/1
[1] https://twitter.com/NETSCOUT/status/1635385247184371720/photo/1
[1] https://twitter.com/Lago72/status/1635398831150882818/photo/1
[1] https://editorialia.com/2022/09/25/publications-r0identifier_035d2ee6677504e68a7eb8820884a335-sequence-feature-extraction-for-malware-family-analysis-via-graph-neural-network/

Top URLs in Tweet in G8:
[1] https://content.govdelivery.com/accounts/USEPAOGWDW/bulletins/34e711e/
[1] https://twitter.com/andyjabbour/status/1634320087309078529

Top URLs in Tweet in G9:
[1] https://twitter.com/staritzen/status/1635341311908913152
[1] https://github.com/MFMokbel/Crawlector
[1] https://fedvte.usalearning.gov/publiccourses/cyberessentials/index.htm?track=trackingon
[1] https://fedvte.usalearning.gov/publiccourses/IMR_cloud/index01.htm?track=trackingon
[1] https://twitter.com/SecurityTrybe/status/1635220794233229314/photo/1

Top URLs in Tweet in G10:
[3] https://twitter.com/malmoeb/status/1635165539097264128/photo/1
[2] https://github.com/Ignitetechnologies/Mindmap/tree/main/Mitre%20Attack
[1] https://paper.li/metaflows/1313536088?edition_id=33a5d380-c1f4-11ed-9537-fa163e6ccaff
[1] https://www.hackingarticles.in/password-crackingvnc/
[1] https://www.hackingarticles.in/password-crackingssh/
[1] https://www.hackingarticles.in/lateral-movement-pass-the-ticket-attack/
[1] https://www.theregister.com/2023/03/13/cisa_joins_forces_with_women/?utm_source=twitter&utm_medium=twitter&utm_campaign=auto&utm_content=article
[1] https://twitter.com/cisajen/status/1635311535232004096
[1] https://thehackernews.com/2023/03/international-law-enforcement-takes.html

Top Domains
Top Domains in Tweet in Entire Graph:
[1813] twitter.com
[209] instagram.com
[106] hackingarticles.in
[72] darkreading.com
[57] paper.li
[57] youtube.com
[49] github.com
[41] cyberiqs.com
[35] google.com
[32] virustotal.com

Top Domains in Tweet in G1:
[562] twitter.com
[199] instagram.com
[1] snowdin.town
[1] linkedin.com
[1] youtube.com
[1] msn.com

Top Domains in Tweet in G2:
[2] twitter.com

Top Domains in Tweet in G3:
[269] twitter.com
[33] darkreading.com
[26] cisco.com
[21] google.com
[17] youtube.com
[14] linkedin.com
[13] entrepreneur.com
[9] thehackernews.com
[8] twinybots.ch
[8] jdsupra.com

Top Domains in Tweet in G4:
[379] twitter.com
[41] cyberiqs.com
[32] virustotal.com
[32] urlscan.io
[19] bleepingcomputer.com
[17] atomspam.com
[12] youtube.com
[11] medium.com
[11] helpnetsecurity.com
[8] usbestsoft.com

Top Domains in Tweet in G5:
[5] twitter.com
[1] paper.li

Top Domains in Tweet in G6:
[99] hackingarticles.in
[73] twitter.com
[29] github.com
[18] hackers-arise.com
[5] technative.io
[4] paper.li
[3] cellstream.com
[3] white-hat-hacker.com
[3] github.io
[3] kitploit.com

Top Domains in Tweet in G7:
[30] twitter.com
[7] cointelegraph.com
[4] kitploit.com
[3] microsoft.com
[3] veille-cyber.com
[3] thehill.com
[2] helpnetsecurity.com
[2] businesstechweekly.com
[2] csoonline.com
[2] darkreading.com

Top Domains in Tweet in G8:
[6] twitter.com
[2] hackingarticles.in
[2] selar.co
[2] govdelivery.com
[1] donorbox.org
[1] technext24.com

Top Domains in Tweet in G9:
[19] twitter.com
[6] substack.com
[6] usalearning.gov
[4] github.com
[3] netacad.com
[3] t.me
[1] instagram.com
[1] hackthebox.com

Top Domains in Tweet in G10:
[13] thehackernews.com
[10] twitter.com
[3] darkreading.com
[3] bleepingcomputer.com
[3] hackingarticles.in
[2] dhs.gov
[2] paper.li
[2] securityboulevard.com
[2] github.com
[2] theregister.com

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[1886] cybersecurity
[618] infosec
[490] datascience
[414] python
[408] ai
[366] bigdata
[332] 100daysofcode
[299] linux
[277] machinelearning
[269] rstats



Top Hashtags in Tweet in G1:
[1] putthatinyourpipe
[1] recasttchalla
[1] fuckjohnridley
[1] twittersupport
[1] elonmusk
[1] freeswagz
[1] freedevo
[1] wheremystars
[1] freemarkaslive
[1] fixdehya

Top Hashtags in Tweet in G3:
[313] cybersecurity
[52] security
[46] infosec
[35] ai
[27] essays
[27] research
[27] thesis
[27] law
[27] datascience
[26] calculus

Top Hashtags in Tweet in G4:
[854] cybersecurity
[431] datascience
[360] python
[339] infosec
[319] bigdata
[309] ai
[298] 100daysofcode
[251] rstats
[250] linux
[239] iiot

Top Hashtags in Tweet in G5:
[1] cybersecurity
[1] infosec

Top Hashtags in Tweet in G6:
[154] cybersecurity
[122] infosec
[83] pentesting
[73] cybersecuritytips
[56] informationsecurity
[53] redteam
[41] oscp
[39] cissp
[33] cybersec
[26] linux

Top Hashtags in Tweet in G7:
[48] cybersecurity
[22] ai
[20] security
[17] infosec
[16] finserv
[15] marketing
[13] machinelearning
[12] chatgpt
[12] fintech
[12] insurtech

Top Hashtags in Tweet in G8:
[4] cybersecurity
[3] cybergirls
[1] epa
[1] water
[1] mdm
[1] infrastructure
[1] freespeech
[1] security

Top Hashtags in Tweet in G9:
[34] cybersecurity
[26] community
[24] infosec
[17] hacked
[13] tech
[10] cyberattack
[9] security
[8] hacking
[7] career
[4] awareness

Top Hashtags in Tweet in G10:
[22] cybersecurity
[20] cyber
[14] vulnerability
[13] malware
[12] awareness
[11] threatintell
[11] cti
[11] intelligence
[11] detect_and_response
[11] edr

Top Words
Top Words in Tweet in Entire Graph:
[1958] cybersecurity
[1885] #cybersecurity
[1335] security
[1301] account
[1199] cyber
[674] dm
[618] #infosec
[612] firm
[601] elections
[593] life

Top Words in Tweet in G1:
[932] account
[524] security
[522] cyber
[330] instagram
[328] dm
[324] send
[324] professional
[323] expert
[320] contact
[316] ig

Top Words in Tweet in G2:
[578] firm
[578] trans
[577] cybersecurity
[577] hired
[577] scattrbrainjane
[576] suicide
[575] sa
[575] life
[575] tw
[575] abuse

Top Words in Tweet in G3:
[312] #cybersecurity
[264] cybersecurity
[140] security
[138] cyber
[66] more
[52] #security
[46] #infosec
[40] national
[40] future
[37] help

Top Words in Tweet in G4:
[855] #cybersecurity
[432] #datascience
[360] #python
[339] #infosec
[320] #bigdata
[310] #ai
[298] #100daysofcode
[295] dm
[251] #rstats
[250] #linux

Top Words in Tweet in G5:
[594] elections
[315] cybersecurity
[298] dc_draino
[297] passed
[297] 2018
[297] created
[297] california
[297] code
[297] office
[297] educate

Top Words in Tweet in G6:
[153] #cybersecurity
[122] #infosec
[110] password
[104] hackinarticles
[104] cracking
[83] #pentesting
[73] #cybersecuritytips
[56] #informationsecurity
[53] #redteam
[52] best

Top Words in Tweet in G7:
[48] #cybersecurity
[23] enricomolinari
[22] #ai
[20] #security
[17] #infosec
[17] cybersecurity
[16] #finserv
[15] #marketing
[13] #machinelearning
[12] #python

Top Words in Tweet in G8:
[63] cybersecurity
[40] need
[28] journey
[24] cyber
[22] iamthecyberchef
[22] book
[20] start
[19] visibility
[18] playbook
[18] starters

Top Words in Tweet in G9:
[69] cybersecurity
[42] security
[39] securitytrybe
[37] cyber
[34] #cybersecurity
[26] #community
[24] #infosec
[23] 2023
[22] certifications
[21] free

Top Words in Tweet in G10:
[29] thehackersnews
[25] cybersecurity
[22] #cybersecurity
[20] #cyber
[18] using
[18] cyber
[18] learn
[15] girlscouts
[15] security
[14] knock

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[830] cyber,security
[598] cybersecurity,firm
[577] life,cybersecurity
[577] tw,suicide
[577] taken,life
[577] firm,hired
[576] apparently,taken
[576] sa,apparently
[576] trans,girl
[576] girl,sa

Top Word Pairs in Tweet in G1:
[522] cyber,security
[323] professional,cyber
[323] security,expert
[322] send,dm
[317] account,professional
[316] dm,ig
[313] simply,contact
[313] instagram,retrieve
[313] reactivate,account
[313] retrieve,reactivate

Top Word Pairs in Tweet in G2:
[577] firm,hired
[577] cybersecurity,firm
[575] sa,apparently
[575] scattrbrainjane,tw
[575] abuse,trans
[575] apparently,taken
[575] suicide,abuse
[575] trans,girl
[575] tw,suicide
[575] taken,life

Top Word Pairs in Tweet in G3:
[46] cyber,security
[27] #thesis,#law
[27] #law,finance
[27] #research,exams
[26] women,cybersecurity
[26] #calculus,chemistry
[25] #essays,#research
[24] cyber,threats
[23] authenticity,paves
[23] way,inclusive

Top Word Pairs in Tweet in G4:
[194] #datascience,#datascientists
[166] #cybersecurity,#bigdata
[152] #bigdata,#analytics
[147] #analytics,#ai
[143] #ai,#iiot
[138] #python,#coding
[136] #machinelearning,#datascience
[127] #ai,#ml
[127] #artificialintelligence,#ai
[125] #cybersecurity,#python

Top Word Pairs in Tweet in G5:
[297] passed,elections
[297] created,office
[297] elections,code
[297] code,10
[297] cybersecurity,2018
[297] california,passed
[297] office,elections
[297] elections,cybersecurity
[297] educate,voters
[297] 10,created

Top Word Pairs in Tweet in G6:
[104] password,cracking
[97] #infosec,#cybersecurity
[65] #cybersecurity,#cybersecuritytips
[56] #cybersecuritytips,#pentesting
[51] #redteam,#informationsecurity
[44] hackinarticles,best
[41] #pentesting,#oscp
[39] pic,day
[39] day,#infosec
[39] #oscp,#redteam

Top Word Pairs in Tweet in G7:
[15] #cybersecurity,#security
[13] #marketing,#finserv
[12] cybersecurity,firm
[9] #infosec,#cybersecurity
[7] #insurtech,#mobilepayments
[7] silicon,valley
[7] #finserv,#insurtech
[7] firm,kaspersky
[7] #ai,#ml
[7] bank,crack

Top Word Pairs in Tweet in G8:
[26] cybersecurity,journey
[18] cyber,starters
[18] start,cybersecurity
[18] playbook,cyber
[18] visibility,playbook
[17] help,started
[17] something,help
[17] need,gaming
[17] gaming,laptop
[17] don,need

Top Word Pairs in Tweet in G9:
[25] cyber,security
[16] #cybersecurity,#infosec
[13] one,highest
[13] security,one
[13] paying,fields
[13] demand,professionals
[13] highest,paying
[13] here's,excellent
[13] professionals,here's
[13] fields,strong

Top Word Pairs in Tweet in G10:
[12] #cyber,#awareness
[11] #threatintell,#cti
[11] #edr,#xdr
[11] #cyberthreatintelligence,#zeroday
[11] #cyberthreat,#cyberthreatintelligence
[11] #awareness,#threatintell
[11] #zeroday,#vulnerability
[11] #cti,#intelligence
[11] #xdr,#cyberthreat
[11] #detect_and_response,#edr

Top Replied-To
Top Replied-To in Entire Graph:
@naija_pr
@instagram
@treeismlegion
@itamivert
@shawnifee
@ha3ks
@cybersecjobsio
@twittersupport
@ownedbyjevonteh
@facebook

Top Replied-To in G1:
@treeismlegion
@itamivert
@twittersupport
@ownedbyjevonteh
@amazonhelp
@cultofmollyyy
@roblox
@validls
@hayden09319
@chime

Top Replied-To in G2:
@cederel
@noredtext

Top Replied-To in G3:
@hyasinc

Top Replied-To in G4:
@bornffamous
@melkshow
@cyberfeedio
@bleepincomputer
@ransom_diary
@jamesvgingerich
@thecybersechub
@elonmusk
@sevgistanbul
@greenlizard216

Top Replied-To in G5:
@dc_draino

Top Replied-To in G6:
@shubham_pen
@tails335
@r_i_c_k_y___
@malmoeb

Top Replied-To in G8:
@ndukakenechukwu

Top Replied-To in G9:
@simonholdorf
@bowtiedcyber

Top Mentioned
Top Mentioned in Entire Graph:
@scattrbrainjane
@dc_draino
@hackinarticles
@westart_factory
@alvaro_chirou
@securitytrybe
@hackwithnelson7
@saylor
@herayani79
@elonmusk

Top Mentioned in G1:
@akuadalotl
@twitter
@twittersupport
@tiktoksupport
@playstation
@yazaah213
@criminalsorg
@gammaxofficial
@elonmusk
@imthatgoathim

Top Mentioned in G2:
@scattrbrainjane
@xaiglass

Top Mentioned in G3:
@bestessayassig1
@accuratewriter_
@academicsaplus
@_homeworkhelp__
@the_beasthack
@ghnewsexpress
@grnorbit
@essaytutors14
@josephsteinberg

Top Mentioned in G4:
@westart_factory
@hackwithnelson7
@herayani79
@michealhacks7
@reach2ratan
@bornffamous
@elonmusk
@cyberiqs_
@bdanalyticsnews
@alvierid

Top Mentioned in G5:
@dc_draino
@dineshdsouza
@mtaibbi

Top Mentioned in G6:
@hackinarticles
@three_cube
@shubham_pen
@0xor0ne
@c4s73r
@technative
@savetonotion
@cturte
@alita53390030
@akamai_research

Top Mentioned in G7:
@enricomolinari
@paula_piccard
@cointelegraph
@visualcap
@eli_krumova
@rejolut
@cybersecboardrm
@lago72
@labordeolivier
@nicochan33

Top Mentioned in G8:
@iamthecyberchef
@thecyberapostle
@cyb_afriq
@ireteeh
@daycyberwox
@phantom7th
@cyberseceurope_
@udeji_blessing
@abee_john
@technextdotng

Top Mentioned in G9:
@securitytrybe
@bowtiedcyber
@simonholdorf
@wtravishubbard
@hack_git
@kalilinux
@hackthebox_eu
@darkv3nom101
@bowtiedadonis
@thesecopsgroup

Top Mentioned in G10:
@thehackersnews
@cisagov
@girlscouts
@nsagov
@cisajen
@hackinarticles
@malmoeb
@tsa
@allanfriedman
@3lectricpink

Top Tweeters
Top Tweeters in Entire Graph:
@amazonhelp
@xboxsupport
@teamyoutube
@souljahsingh
@afropages
@orgetorix
@united
@newsfilterio
@delta
@inspiteoftrump

Top Tweeters in G1:
@amazonhelp
@xboxsupport
@teamyoutube
@delta
@askplaystation
@askamex
@williamhill
@riotsupport
@snapchatsupport
@askebay

Top Tweeters in G2:
@mvbrat91
@jyanies
@tsukento
@alienhumanqueen
@larryshipper55
@jiminiyah
@lottiehyun
@lovelyflower52
@toastdotmp3
@gayswordfight

Top Tweeters in G3:
@afropages
@newsfilterio
@rvp
@webnowcompany
@ajblackston
@torontostar
@fincalcaterra
@stanleyepstein
@carlesdijous
@securitynewsbot

Top Tweeters in G4:
@rahul05ranjan
@ucloudify
@frcretweets
@andrewmorrisuk
@netsecu
@jamesvgingerich
@laveilletechno
@rbxretweetbot
@fullnam35087976
@yvettehenson

Top Tweeters in G5:
@souljahsingh
@caligirlleftie
@maegan_laporte
@tates5a
@wavetossed
@georgeeliseo
@drfessel
@_freelander
@blueyes9445
@dlw20161950

Top Tweeters in G6:
@savetonotion
@youranonriots
@thewarofnow
@ajem_mx
@technative
@01larryj
@marios_blocks
@domhalps
@definoobcrypto
@akawombat42

Top Tweeters in G7:
@evankirstel
@nicochan33
@caring_mobile
@fox5dc
@gvalan
@spirosmargaris
@mariuskarma
@ipfconline1
@ene3112
@tachouhoner

Top Tweeters in G8:
@gate_15_analyst
@atsen_
@michael_mickyt
@ireteeh
@infosecsherpa
@its_mikkyanu
@brymohardezhile
@ebuuuun
@negrosaitama
@_cyberchefone

Top Tweeters in G9:
@super_mario5
@dannyphuynh
@gregbe_on1
@bowtiedcyber
@_prabus
@changenigeriaa
@danofx1
@miguel54123418
@blobafied
@_thisisvictor

Top Tweeters in G10:
@adekleine
@usa_anne711
@rdsweb
@sflore83
@cozza_86
@thesiliconhill
@ur6dsoo9fmbeomy
@iknowshetwitent
@theregister
@mpplvt