NodeXL Graph Gallery: Interactive Graph


Donate to the Social Media Research Foundation's NodeXL development fund

(Cyber Security) OR Cybersecurity_2023-03-13_23-30-00.xlsx (experimental version)
NOTE: This version of the graph is not available with the browser you are using. A more recent version of the browser is required.
Zoom in Zoom out Reset the graph
Go to the graph's main page

From:
NodeXLExcelAutomator
Uploaded on:
March 14, 2023
Short Description:
(Cyber Security) OR Cybersecurity via NodeXL https://bit.ly/3l7OzKq
@jamesauto10
@elonmusk
@beefyspace
@dc_draino
@hackinarticles
@monhoo_39
@jayeshmthakur
@vanessafreejan6
@spreadingjoy615
@alvierid

Top hashtags:
#cybersecurity
#infosec
#datascience
#python
#ai

Description:
Description
The graph represents a network of 4,928 Twitter users whose recent tweets contained "(Cyber Security) OR Cybersecurity", or who were replied to, mentioned, retweeted or quoted in those tweets, taken from a data set limited to a maximum of 5,000 tweets, tweeted between 3/26/2006 12:00:00 AM and 3/13/2023 5:00:35 PM. The network was obtained from Twitter on Tuesday, 14 March 2023 at 06:36 UTC.

The tweets in the network were tweeted over the 2861-day, 10-hour, 14-minute period from Wednesday, 13 May 2015 at 13:45 UTC to Tuesday, 14 March 2023 at 00:00 UTC.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, an edge for each "retweet" relationship in a tweet, an edge for each "quote" relationship in a tweet, an edge for each "mention in retweet" relationship in a tweet, an edge for each "mention in reply-to" relationship in a tweet, an edge for each "mention in quote" relationship in a tweet, an edge for each "mention in quote reply-to" relationship in a tweet, and a self-loop edge for each tweet that is not from above.

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 4928
Unique Edges : 2753
Edges With Duplicates : 7968
Total Edges : 10721
Number of Edge Types : 9
Retweet : 2724
MentionsInRetweet : 3154
MentionsInQuote : 70
Quote : 542
Mentions : 849
Replies to : 520
MentionsInReplyTo : 1024
Tweet : 1837
MentionsInQuoteReply : 1
Self-Loops : 2152
Reciprocated Vertex Pair Ratio : 0.015704584040747
Reciprocated Edge Ratio : 0.0309235269536147
Connected Components : 942
Single-Vertex Connected Components : 478
Maximum Vertices in a Connected Component : 2344
Maximum Edges in a Connected Component : 6361
Maximum Geodesic Distance (Diameter) : 20
Average Geodesic Distance : 6.784469
Graph Density : 0.000197114890386658
Modularity : 0.466391
NodeXL Version : 1.0.1.510
Data Import : The graph represents a network of 4,928 Twitter users whose recent tweets contained "(Cyber Security) OR Cybersecurity", or who were replied to, mentioned, retweeted or quoted in those tweets, taken from a data set limited to a maximum of 5,000 tweets, tweeted between 3/26/2006 12:00:00 AM and 3/13/2023 5:00:35 PM. The network was obtained from Twitter on Tuesday, 14 March 2023 at 06:36 UTC.

The tweets in the network were tweeted over the 2861-day, 10-hour, 14-minute period from Wednesday, 13 May 2015 at 13:45 UTC to Tuesday, 14 March 2023 at 00:00 UTC.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, an edge for each "retweet" relationship in a tweet, an edge for each "quote" relationship in a tweet, an edge for each "mention in retweet" relationship in a tweet, an edge for each "mention in reply-to" relationship in a tweet, an edge for each "mention in quote" relationship in a tweet, an edge for each "mention in quote reply-to" relationship in a tweet, and a self-loop edge for each tweet that is not from above.

Layout Algorithm : The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.
Graph Source : TwitterSearch2
Graph Term : (Cyber Security) OR Cybersecurity
Groups : The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.
Edge Color : Edge Weight
Edge Width : Edge Weight
Edge Alpha : Edge Weight
Vertex Radius : Betweenness Centrality

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[199] https://www.instagram.com/web_cyber1/
[16] https://federalnewsnetwork.com/cybersecurity/2023/03/congress-members-warned-of-significant-health-data-breach/
[15] https://www.darkreading.com/risk/svb-meltdown-cybersec-startups-access-capital
[12] https://www.hackingarticles.in/password-crackingvnc/
[12] https://www.hackingarticles.in/password-crackingssh/
[8] https://github.com/Ignitetechnologies/Mindmap/tree/main/Mitre%20Attack
[8] https://www.darkreading.com/application-security/north-korean-hackers-targeting-security-researchers
[7] https://twinybots.ch/
[7] https://www.hackingarticles.in/lateral-movement-pass-the-ticket-attack/
[6] https://www.hackingarticles.in/understanding-the-csrf-vulnerability-a-beginners-guide/

Top URLs in Tweet in G1:
[199] https://www.instagram.com/web_cyber1/
[3] https://twitter.com/DharakshanS/status/1635426990994890753/photo/1
[2] https://twitter.com/bjorkswag/status/1635422050675474432
[2] https://twitter.com/jmseank/status/1635419564065579008
[2] https://twitter.com/mjlink19/status/1635422555610787841
[2] https://twitter.com/realVileHQ/status/1635408951956348931
[2] https://twitter.com/AmazingWomen6/status/1635424240337039360
[2] https://twitter.com/stonedshego/status/1635418880159125506
[1] https://twitter.com/Towelie07/status/1635380006473064460
[1] https://twitter.com/encorekimano/status/1635386784908709888

Top URLs in Tweet in G3:
[10] https://www.darkreading.com/risk/svb-meltdown-cybersec-startups-access-capital
[7] https://twinybots.ch/
[5] https://www.darkreading.com/application-security/north-korean-hackers-targeting-security-researchers
[5] https://blogs.cisco.com/security/authenticity-paves-the-way-to-an-inclusive-future-at-women-in-cybersecurity-conference?utm_medium=feed&utm_source=feedpress.me&utm_campaign=Feed%3A+CiscoBlogs
[4] https://www.entrepreneur.com/science-technology/how-phishing-is-threatening-the-cybersecurity-landscape/446772?utm_source=dlvr.it&utm_medium=twitter
[4] https://discord.com/invite/7gZuXn4tvz
[4] https://twitter.com/vivarodigital/status/1635400868915716098/photo/1
[3] https://www.lakelandtoday.ca/beyond-local/mps-want-annual-national-security-reports-aid-for-businesses-to-thwart-cyber-threats-6693176
[2] https://thehill.com/opinion/cybersecurity/3897447-cyber-regulations-can-make-our-nation-safer/
[2] https://www.dell.com/en-us/dt/services/managed-services/managed-workplace-services/managed-detection-response.htm#pdf-overlay=//www.delltechnologies.com/asset/en-us/services/managed-services/briefs-summaries/mdr-infographic.pdf

Top URLs in Tweet in G4:
[3] https://www.helpnetsecurity.com/2022/10/04/mandatory-password-expiration-helping-or-hurting-password-security/
[3] https://usbestsoft.com/product/buy-verified-paypal-accounts/
[3] https://usbestsoft.com/product/buy-verified-cash-app-accounts/
[3] https://www.youtube.com/watch?v=WQaiClLdvSI&feature=youtu.be

[3] https://twitter.com/NahamSec/status/1635317546344751114/photo/1
[2] https://www.bleepingcomputer.com/news/security/fortinet-new-fortios-bug-used-as-zero-day-to-attack-govt-networks/
[2] https://www.pcmatic.com/blog/international-deliveries-in-limbo-how-royal-mail-could-have-avoided-ransomware-attack/
[2] https://www.accesspointconsulting.com/briefing/march-8-2023
[2] https://github.com/Ignitetechnologies/Mindmap/tree/main/Mitre%20Attack
[2] https://www.redbubble.com/i/t-shirt/Black-hat-hacker-with-hoodie-by-zomgwtfbekjam/142129670.1YYVU?asc=u

Top URLs in Tweet in G6:
[11] https://www.hackingarticles.in/password-crackingvnc/
[11] https://www.hackingarticles.in/password-crackingssh/
[6] https://www.hackingarticles.in/lateral-movement-pass-the-ticket-attack/
[6] https://www.hackingarticles.in/understanding-the-csrf-vulnerability-a-beginners-guide/
[4] https://github.com/Ignitetechnologies/Mindmap/tree/main/Mitre%20Attack
[1] https://www.amazon.com/Getting-Started-Becoming-Master-Hacker/dp/1711729299?crid=2Q2GQ529DA27H&keywords=getting+started+becoming+a+master+hacker&qid=1671634223&sprefix=getting+started,aps,196&sr=8-1&linkCode=sl1&tag=hackerarise-20&linkId=5919579e1fd659c648b46b72277eab91&language=en_US&ref_=as_li_ss_tl
[1] https://www.hackers-arise.com/post/basics-of-xoring
[1] https://www.lanner-america.com/blog/waf-vs-ips-whats-difference/
[1] https://technative.io/cybersecurity-risk-management-how-and-where-to-focus/
[1] https://technative.io/why-cyber-security-is-now-a-board-level-leadership-imperative/

Top URLs in Tweet in G7:
[1] https://cointelegraph.com/explained/how-blockchain-technology-revolutionizes-digital-ownership?utm_content=buffer9ebde&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
[1] https://twitter.com/globaliqx/status/1635396322470637568/photo/1
[1] https://twitter.com/Eli_Krumova/status/1631626397918560256/photo/1
[1] https://twitter.com/davebart/status/1630063297650376704
[1] https://twitter.com/Eli_Krumova/status/1589336299689095170/photo/1
[1] https://twitter.com/Eli_Krumova/status/1600130577784414208/photo/1
[1] https://twitter.com/NETSCOUT/status/1635385247184371720/photo/1
[1] https://twitter.com/Lago72/status/1635398831150882818/photo/1
[1] https://editorialia.com/2022/09/25/publications-r0identifier_035d2ee6677504e68a7eb8820884a335-sequence-feature-extraction-for-malware-family-analysis-via-graph-neural-network/

Top URLs in Tweet in G8:
[1] https://content.govdelivery.com/accounts/USEPAOGWDW/bulletins/34e711e/
[1] https://twitter.com/andyjabbour/status/1634320087309078529

Top URLs in Tweet in G9:
[1] https://twitter.com/staritzen/status/1635341311908913152
[1] https://github.com/MFMokbel/Crawlector
[1] https://fedvte.usalearning.gov/publiccourses/cyberessentials/index.htm?track=trackingon
[1] https://fedvte.usalearning.gov/publiccourses/IMR_cloud/index01.htm?track=trackingon
[1] https://twitter.com/SecurityTrybe/status/1635220794233229314/photo/1

Top URLs in Tweet in G10:
[3] https://twitter.com/malmoeb/status/1635165539097264128/photo/1
[2] https://github.com/Ignitetechnologies/Mindmap/tree/main/Mitre%20Attack
[1] https://paper.li/metaflows/1313536088?edition_id=33a5d380-c1f4-11ed-9537-fa163e6ccaff
[1] https://www.hackingarticles.in/password-crackingvnc/
[1] https://www.hackingarticles.in/password-crackingssh/
[1] https://www.hackingarticles.in/lateral-movement-pass-the-ticket-attack/
[1] https://www.theregister.com/2023/03/13/cisa_joins_forces_with_women/?utm_source=twitter&utm_medium=twitter&utm_campaign=auto&utm_content=article
[1] https://twitter.com/cisajen/status/1635311535232004096
[1] https://thehackernews.com/2023/03/international-law-enforcement-takes.html

Top Domains
Top Domains in Tweet in Entire Graph:
[1813] twitter.com
[209] instagram.com
[106] hackingarticles.in
[72] darkreading.com
[57] paper.li
[57] youtube.com
[49] github.com
[41] cyberiqs.com
[35] google.com
[32] virustotal.com

Top Domains in Tweet in G1:
[562] twitter.com
[199] instagram.com
[1] snowdin.town
[1] linkedin.com
[1] youtube.com
[1] msn.com

Top Domains in Tweet in G2:
[2] twitter.com

Top Domains in Tweet in G3:
[269] twitter.com
[33] darkreading.com
[26] cisco.com
[21] google.com
[17] youtube.com
[14] linkedin.com
[13] entrepreneur.com
[9] thehackernews.com
[8] twinybots.ch
[8] jdsupra.com

Top Domains in Tweet in G4:
[379] twitter.com
[41] cyberiqs.com
[32] virustotal.com
[32] urlscan.io
[19] bleepingcomputer.com
[17] atomspam.com
[12] youtube.com
[11] medium.com
[11] helpnetsecurity.com
[8] usbestsoft.com

Top Domains in Tweet in G5:
[5] twitter.com
[1] paper.li

Top Domains in Tweet in G6:
[99] hackingarticles.in
[73] twitter.com
[29] github.com
[18] hackers-arise.com
[5] technative.io
[4] paper.li
[3] cellstream.com
[3] white-hat-hacker.com
[3] github.io
[3] kitploit.com

Top Domains in Tweet in G7:
[30] twitter.com
[7] cointelegraph.com
[4] kitploit.com
[3] microsoft.com
[3] veille-cyber.com
[3] thehill.com
[2] helpnetsecurity.com
[2] businesstechweekly.com
[2] csoonline.com
[2] darkreading.com

Top Domains in Tweet in G8:
[6] twitter.com
[2] hackingarticles.in
[2] selar.co
[2] govdelivery.com
[1] donorbox.org
[1] technext24.com

Top Domains in Tweet in G9:
[19] twitter.com
[6] substack.com
[6] usalearning.gov
[4] github.com
[3] netacad.com
[3] t.me
[1] instagram.com
[1] hackthebox.com

Top Domains in Tweet in G10:
[13] thehackernews.com
[10] twitter.com
[3] darkreading.com
[3] bleepingcomputer.com
[3] hackingarticles.in
[2] dhs.gov
[2] paper.li
[2] securityboulevard.com
[2] github.com
[2] theregister.com

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[1886] cybersecurity
[618] infosec
[490] datascience
[414] python
[408] ai
[366] bigdata
[332] 100daysofcode
[299] linux
[277] machinelearning
[269] rstats



Top Hashtags in Tweet in G1:
[1] putthatinyourpipe
[1] recasttchalla
[1] fuckjohnridley
[1] twittersupport
[1] elonmusk
[1] freeswagz
[1] freedevo
[1] wheremystars
[1] freemarkaslive
[1] fixdehya

Top Hashtags in Tweet in G3:
[313] cybersecurity
[52] security
[46] infosec
[35] ai
[27] essays
[27] research
[27] thesis
[27] law
[27] datascience
[26] calculus

Top Hashtags in Tweet in G4:
[854] cybersecurity
[431] datascience
[360] python
[339] infosec
[319] bigdata
[309] ai
[298] 100daysofcode
[251] rstats
[250] linux
[239] iiot

Top Hashtags in Tweet in G5:
[1] cybersecurity
[1] infosec

Top Hashtags in Tweet in G6:
[154] cybersecurity
[122] infosec
[83] pentesting
[73] cybersecuritytips
[56] informationsecurity
[53] redteam
[41] oscp
[39] cissp
[33] cybersec
[26] linux

Top Hashtags in Tweet in G7:
[48] cybersecurity
[22] ai
[20] security
[17] infosec
[16] finserv
[15] marketing
[13] machinelearning
[12] chatgpt
[12] fintech
[12] insurtech

Top Hashtags in Tweet in G8:
[4] cybersecurity
[3] cybergirls
[1] epa
[1] water
[1] mdm
[1] infrastructure
[1] freespeech
[1] security

Top Hashtags in Tweet in G9:
[34] cybersecurity
[26] community
[24] infosec
[17] hacked
[13] tech
[10] cyberattack
[9] security
[8] hacking
[7] career
[4] awareness

Top Hashtags in Tweet in G10:
[22] cybersecurity
[20] cyber
[14] vulnerability
[13] malware
[12] awareness
[11] threatintell
[11] cti
[11] intelligence
[11] detect_and_response
[11] edr

Top Words
Top Words in Tweet in Entire Graph:
[1958] cybersecurity
[1885] #cybersecurity
[1335] security
[1301] account
[1199] cyber
[674] dm
[618] #infosec
[612] firm
[601] elections
[593] life

Top Words in Tweet in G1:
[932] account
[524] security
[522] cyber
[330] instagram
[328] dm
[324] send
[324] professional
[323] expert
[320] contact
[316] ig

Top Words in Tweet in G2:
[578] firm
[578] trans
[577] cybersecurity
[577] hired
[577] scattrbrainjane
[576] suicide
[575] sa
[575] life
[575] tw
[575] abuse

Top Words in Tweet in G3:
[312] #cybersecurity
[264] cybersecurity
[140] security
[138] cyber
[66] more
[52] #security
[46] #infosec
[40] national
[40] future
[37] help

Top Words in Tweet in G4:
[855] #cybersecurity
[432] #datascience
[360] #python
[339] #infosec
[320] #bigdata
[310] #ai
[298] #100daysofcode
[295] dm
[251] #rstats
[250] #linux

Top Words in Tweet in G5:
[594] elections
[315] cybersecurity
[298] dc_draino
[297] passed
[297] 2018
[297] created
[297] california
[297] code
[297] office
[297] educate

Top Words in Tweet in G6:
[153] #cybersecurity
[122] #infosec
[110] password
[104] hackinarticles
[104] cracking
[83] #pentesting
[73] #cybersecuritytips
[56] #informationsecurity
[53] #redteam
[52] best

Top Words in Tweet in G7:
[48] #cybersecurity
[23] enricomolinari
[22] #ai
[20] #security
[17] #infosec
[17] cybersecurity
[16] #finserv
[15] #marketing
[13] #machinelearning
[12] #python

Top Words in Tweet in G8:
[63] cybersecurity
[40] need
[28] journey
[24] cyber
[22] iamthecyberchef
[22] book
[20] start
[19] visibility
[18] playbook
[18] starters

Top Words in Tweet in G9:
[69] cybersecurity
[42] security
[39] securitytrybe
[37] cyber
[34] #cybersecurity
[26] #community
[24] #infosec
[23] 2023
[22] certifications
[21] free

Top Words in Tweet in G10:
[29] thehackersnews
[25] cybersecurity
[22] #cybersecurity
[20] #cyber
[18] using
[18] cyber
[18] learn
[15] girlscouts
[15] security
[14] knock

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[830] cyber,security
[598] cybersecurity,firm
[577] life,cybersecurity
[577] tw,suicide
[577] taken,life
[577] firm,hired
[576] apparently,taken
[576] sa,apparently
[576] trans,girl
[576] girl,sa

Top Word Pairs in Tweet in G1:
[522] cyber,security
[323] professional,cyber
[323] security,expert
[322] send,dm
[317] account,professional
[316] dm,ig
[313] simply,contact
[313] instagram,retrieve
[313] reactivate,account
[313] retrieve,reactivate

Top Word Pairs in Tweet in G2:
[577] firm,hired
[577] cybersecurity,firm
[575] sa,apparently
[575] scattrbrainjane,tw
[575] abuse,trans
[575] apparently,taken
[575] suicide,abuse
[575] trans,girl
[575] tw,suicide
[575] taken,life

Top Word Pairs in Tweet in G3:
[46] cyber,security
[27] #thesis,#law
[27] #law,finance
[27] #research,exams
[26] women,cybersecurity
[26] #calculus,chemistry
[25] #essays,#research
[24] cyber,threats
[23] authenticity,paves
[23] way,inclusive

Top Word Pairs in Tweet in G4:
[194] #datascience,#datascientists
[166] #cybersecurity,#bigdata
[152] #bigdata,#analytics
[147] #analytics,#ai
[143] #ai,#iiot
[138] #python,#coding
[136] #machinelearning,#datascience
[127] #ai,#ml
[127] #artificialintelligence,#ai
[125] #cybersecurity,#python

Top Word Pairs in Tweet in G5:
[297] passed,elections
[297] created,office
[297] elections,code
[297] code,10
[297] cybersecurity,2018
[297] california,passed
[297] office,elections
[297] elections,cybersecurity
[297] educate,voters
[297] 10,created

Top Word Pairs in Tweet in G6:
[104] password,cracking
[97] #infosec,#cybersecurity
[65] #cybersecurity,#cybersecuritytips
[56] #cybersecuritytips,#pentesting
[51] #redteam,#informationsecurity
[44] hackinarticles,best
[41] #pentesting,#oscp
[39] pic,day
[39] day,#infosec
[39] #oscp,#redteam

Top Word Pairs in Tweet in G7:
[15] #cybersecurity,#security
[13] #marketing,#finserv
[12] cybersecurity,firm
[9] #infosec,#cybersecurity
[7] #insurtech,#mobilepayments
[7] silicon,valley
[7] #finserv,#insurtech
[7] firm,kaspersky
[7] #ai,#ml
[7] bank,crack

Top Word Pairs in Tweet in G8:
[26] cybersecurity,journey
[18] cyber,starters
[18] start,cybersecurity
[18] playbook,cyber
[18] visibility,playbook
[17] help,started
[17] something,help
[17] need,gaming
[17] gaming,laptop
[17] don,need

Top Word Pairs in Tweet in G9:
[25] cyber,security
[16] #cybersecurity,#infosec
[13] one,highest
[13] security,one
[13] paying,fields
[13] demand,professionals
[13] highest,paying
[13] here's,excellent
[13] professionals,here's
[13] fields,strong

Top Word Pairs in Tweet in G10:
[12] #cyber,#awareness
[11] #threatintell,#cti
[11] #edr,#xdr
[11] #cyberthreatintelligence,#zeroday
[11] #cyberthreat,#cyberthreatintelligence
[11] #awareness,#threatintell
[11] #zeroday,#vulnerability
[11] #cti,#intelligence
[11] #xdr,#cyberthreat
[11] #detect_and_response,#edr

Top Replied-To
Top Replied-To in Entire Graph:
@naija_pr
@instagram
@treeismlegion
@itamivert
@shawnifee
@ha3ks
@cybersecjobsio
@twittersupport
@ownedbyjevonteh
@facebook

Top Replied-To in G1:
@treeismlegion
@itamivert
@twittersupport
@ownedbyjevonteh
@amazonhelp
@cultofmollyyy
@roblox
@validls
@hayden09319
@chime

Top Replied-To in G2:
@cederel
@noredtext

Top Replied-To in G3:
@hyasinc

Top Replied-To in G4:
@bornffamous
@melkshow
@cyberfeedio
@bleepincomputer
@ransom_diary
@jamesvgingerich
@thecybersechub
@elonmusk
@sevgistanbul
@greenlizard216

Top Replied-To in G5:
@dc_draino

Top Replied-To in G6:
@shubham_pen
@tails335
@r_i_c_k_y___
@malmoeb

Top Replied-To in G8:
@ndukakenechukwu

Top Replied-To in G9:
@simonholdorf
@bowtiedcyber

Top Mentioned
Top Mentioned in Entire Graph:
@scattrbrainjane
@dc_draino
@hackinarticles
@westart_factory
@alvaro_chirou
@securitytrybe
@hackwithnelson7
@saylor
@herayani79
@elonmusk

Top Mentioned in G1:
@akuadalotl
@twitter
@twittersupport
@tiktoksupport
@playstation
@yazaah213
@criminalsorg
@gammaxofficial
@elonmusk
@imthatgoathim

Top Mentioned in G2:
@scattrbrainjane
@xaiglass

Top Mentioned in G3:
@bestessayassig1
@accuratewriter_
@academicsaplus
@_homeworkhelp__
@the_beasthack
@ghnewsexpress
@grnorbit
@essaytutors14
@josephsteinberg

Top Mentioned in G4:
@westart_factory
@hackwithnelson7
@herayani79
@michealhacks7
@reach2ratan
@bornffamous
@elonmusk
@cyberiqs_
@bdanalyticsnews
@alvierid

Top Mentioned in G5:
@dc_draino
@dineshdsouza
@mtaibbi

Top Mentioned in G6:
@hackinarticles
@three_cube
@shubham_pen
@0xor0ne
@c4s73r
@technative
@savetonotion
@cturte
@alita53390030
@akamai_research

Top Mentioned in G7:
@enricomolinari
@paula_piccard
@cointelegraph
@visualcap
@eli_krumova
@rejolut
@cybersecboardrm
@lago72
@labordeolivier
@nicochan33

Top Mentioned in G8:
@iamthecyberchef
@thecyberapostle
@cyb_afriq
@ireteeh
@daycyberwox
@phantom7th
@cyberseceurope_
@udeji_blessing
@abee_john
@technextdotng

Top Mentioned in G9:
@securitytrybe
@bowtiedcyber
@simonholdorf
@wtravishubbard
@hack_git
@kalilinux
@hackthebox_eu
@darkv3nom101
@bowtiedadonis
@thesecopsgroup

Top Mentioned in G10:
@thehackersnews
@cisagov
@girlscouts
@nsagov
@cisajen
@hackinarticles
@malmoeb
@tsa
@allanfriedman
@3lectricpink

Top Tweeters
Top Tweeters in Entire Graph:
@amazonhelp
@xboxsupport
@teamyoutube
@souljahsingh
@afropages
@orgetorix
@united
@newsfilterio
@delta
@inspiteoftrump

Top Tweeters in G1:
@amazonhelp
@xboxsupport
@teamyoutube
@delta
@askplaystation
@askamex
@williamhill
@riotsupport
@snapchatsupport
@askebay

Top Tweeters in G2:
@mvbrat91
@jyanies
@tsukento
@alienhumanqueen
@larryshipper55
@jiminiyah
@lottiehyun
@lovelyflower52
@toastdotmp3
@gayswordfight

Top Tweeters in G3:
@afropages
@newsfilterio
@rvp
@webnowcompany
@ajblackston
@torontostar
@fincalcaterra
@stanleyepstein
@carlesdijous
@securitynewsbot

Top Tweeters in G4:
@rahul05ranjan
@ucloudify
@frcretweets
@andrewmorrisuk
@netsecu
@jamesvgingerich
@laveilletechno
@rbxretweetbot
@fullnam35087976
@yvettehenson

Top Tweeters in G5:
@souljahsingh
@caligirlleftie
@maegan_laporte
@tates5a
@wavetossed
@georgeeliseo
@drfessel
@_freelander
@blueyes9445
@dlw20161950

Top Tweeters in G6:
@savetonotion
@youranonriots
@thewarofnow
@ajem_mx
@technative
@01larryj
@marios_blocks
@domhalps
@definoobcrypto
@akawombat42

Top Tweeters in G7:
@evankirstel
@nicochan33
@caring_mobile
@fox5dc
@gvalan
@spirosmargaris
@mariuskarma
@ipfconline1
@ene3112
@tachouhoner

Top Tweeters in G8:
@gate_15_analyst
@atsen_
@michael_mickyt
@ireteeh
@infosecsherpa
@its_mikkyanu
@brymohardezhile
@ebuuuun
@negrosaitama
@_cyberchefone

Top Tweeters in G9:
@super_mario5
@dannyphuynh
@gregbe_on1
@bowtiedcyber
@_prabus
@changenigeriaa
@danofx1
@miguel54123418
@blobafied
@_thisisvictor

Top Tweeters in G10:
@adekleine
@usa_anne711
@rdsweb
@sflore83
@cozza_86
@thesiliconhill
@ur6dsoo9fmbeomy
@iknowshetwitent
@theregister
@mpplvt


We use necessary cookies to make our site work. We’d like to set additional cookies to understand site usage, make site improvements and to remember your settings. We also use cookies set by other sites to help deliver content from their services.