infosec, Twitter, 1/13/2019 8:21:17 AM, 181751


FAQ | Problem?

infosec_2019-01-13_00-00-01.xlsx
infosec_2019-01-13_00-00-01.xlsx
From:
NodeXLExcelAutomator
Uploaded on:
January 13, 2019
Short Description:
infosec via NodeXL http://bit.ly/2TOJZgN
@sectest9
@kaynemcgladrey
@r0wdy_
@archonsec
@geoffbelknap
@fisher85m
@irawinkler
@ninjininji
@joshjaycomedy
@infosecsherpa

Top hashtags:
#infosec
#cybersecurity
#security
#iot
#bigdata
#statistics
#cyberwarfare
#blockchain

Description:
Description
The graph represents a network of 3,665 Twitter users whose tweets in the requested range contained "infosec", or who were replied to or mentioned in those tweets. The network was obtained from the NodeXL Graph Server on Sunday, 13 January 2019 at 08:01 UTC.

The requested start date was Sunday, 13 January 2019 at 01:01 UTC and the maximum number of days (going backward) was 14.

The maximum number of tweets collected was 5,000.

The tweets in the network were tweeted over the 1-day, 11-hour, 8-minute period from Friday, 11 January 2019 at 11:24 UTC to Saturday, 12 January 2019 at 22:32 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 3665
Unique Edges : 4085
Edges With Duplicates : 2462
Total Edges : 6547
Number of Edge Types : 3
Mentions : 4162
Tweet : 2210
Replies to : 175
Self-Loops : 2210
Reciprocated Vertex Pair Ratio : 0.0141371032275273
Reciprocated Edge Ratio : 0.0278800631246712
Connected Components : 800
Single-Vertex Connected Components : 455
Maximum Vertices in a Connected Component : 2043
Maximum Edges in a Connected Component : 4577
Maximum Geodesic Distance (Diameter) : 20
Average Geodesic Distance : 5.269565
Graph Density : 0.000283127900534383
Modularity : 0.580535
NodeXL Version : 1.0.1.407

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[155] https://www.cisco.com/c/dam/m/digital/elq-cmcglobal/witb/acr2018/acr2018final.pdf
[86] https://usa.kaspersky.com/about/press-releases/2018_kaspersky-lab-report-the-cost-of-a-data-breach-continues-to-grow-worldwide
[37] http://start.keeper.io/2018-ponemon-report
[35] https://go.usa.gov/xEbkx
[16] https://phishstats.info/
[15] http://open-sez.me
[14] https://www.maria-johnsen.com/million-dollar-blog/cyber-security/the-benefits-of-hiring-a-professional-cyber-securityseo-expert
[13] https://cyberstartupobservatory.com/
[12] https://paper.li/e-1539334818?edition_id=bce93970-1640-11e9-bc01-0cc47a0d15fd
[12] https://www.techrepublic.com/article/microsoft-office-is-more-dangerous-than-you-think-doc-deliver-45-of-all-malware/

Top URLs in Tweet in G1:
[11] https://paper.li/e-1539334818?edition_id=bce93970-1640-11e9-bc01-0cc47a0d15fd
[7] http://www.sectechno.com/encryption-analyzer-password-protected-file-scanner/
[4] https://securityaffairs.co/wordpress/79746/data-breach/reddit-locked-down-accounts.html
[4] https://www.alienvault.com/blogs/security-essentials/things-i-hearted-this-week-11th-jan-2019?utm_medium=Social&utm_source=Twitter&utm_content=Awareness
[3] https://stateofsecurity.com/?p=4931&utm_medium=social_link&utm_source=missinglettr&utm_campaign=incident-response-practice-a-must
[3] https://threatpost.com/pre-installed-android-app-impacts-millions-with-slew-of-malicious-activity/140800/
[3] https://securityaffairs.co/wordpress/?p=79757
[3] https://www.your.md/
[3] https://www.darkreading.com/
[2] https://helpmewithhipaa.com/are-hipaa-changes-coming-ep-185/?utm_campaign=are-hipaa-changes-coming-ep-185&utm_medium=social_link&utm_source=missinglettr

Top URLs in Tweet in G2:
[8] https://tech.economictimes.indiatimes.com/news/people/demand-for-cybersecurity-first-responders-rises-as-salaries-shoot-up/67487071?utm_content=bufferb7779&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
[7] https://www.studynotesandtheory.com/single-post/CISSP-Exam-Brain-Dumps
[6] https://www.thenewsminute.com/article/data-breach-amazon-india-exposes-financial-data-nearly-400k-sellers-94844
[5] https://github.com/tunz/js-vuln-db
[5] https://pbs.twimg.com/media/DweX4q_XcAEi1k7.jpg:large
[5] https://twitter.com/Fisher85M
[5] https://hacker247.co.uk/
[3] https://www.acast.com/cyber/thebase
[3] https://nodexlgraphgallery.org/Pages/Graph.aspx?graphID=138241
[3] http://CyberWarriors.Net

Top URLs in Tweet in G3:
[153] https://www.cisco.com/c/dam/m/digital/elq-cmcglobal/witb/acr2018/acr2018final.pdf
[84] https://usa.kaspersky.com/about/press-releases/2018_kaspersky-lab-report-the-cost-of-a-data-breach-continues-to-grow-worldwide
[36] http://start.keeper.io/2018-ponemon-report

Top URLs in Tweet in G4:
[6] https://twitter.com/wsbtv/status/1083812230108495874
[1] https://twitter.com/i/web/status/1083896219154436097
[1] https://twitter.com/i/web/status/1083804777564332034
[1] https://twitter.com/i/web/status/1083954213204287489
[1] https://twitter.com/i/web/status/1083806968115052545
[1] https://twitter.com/i/web/status/1083880397195292672
[1] https://twitter.com/i/web/status/1083869272869285888
[1] https://twitter.com/i/web/status/1083938684271919104
[1] https://twitter.com/i/web/status/1083843923603345408
[1] https://twitter.com/i/web/status/1084057981602414593

Top URLs in Tweet in G5:
[1] https://twitter.com/i/web/status/1083767787523207168
[1] https://twitter.com/i/web/status/1083767643520196608
[1] https://packetstormsecurity.com/files/151084/shieldcms22-sql.txt
[1] https://packetstormsecurity.com/news/view/29708/US-Government-Shutdown-Leaves-Websites-Insecure.html
[1] https://packetstormsecurity.com/files/151081/hodor-encrypter.tgz
[1] https://packetstormsecurity.com/news/view/29707/Senate-Investigates-Phone-Carriers-Selling-Location-Data.html
[1] https://packetstormsecurity.com/files/151079/USN-3853-1.txt
[1] https://twitter.com/i/web/status/1083956467735048192
[1] https://twitter.com/wsbtv/status/1083812230108495874
[1] https://twitter.com/i/web/status/1083751858227896321

Top URLs in Tweet in G6:
[7] https://securityintelligence.com/maturing-your-security-operations-center-with-the-art-and-science-of-threat-hunting/
[4] https://www.scoop.it/t/cybersecurity-leadership/p/4103660193/2018/11/28/cybersecurity-needs-women-here-s-why?utm_medium=social&utm_source=twitter
[3] https://www.beckershospitalreview.com/payer-issues/4-recent-health-plan-data-breaches.html
[3] https://www-engadget-com.cdn.ampproject.org/c/s/www.engadget.com/amp/2018/09/06/coffee-meets-bagel-data-breach/?utm_sq=fv3eogvww0&utm_source=twitter&utm_medium=social&utm_campaign=1davidclarke&utm_content=gdpr2
[3] https://www.womblebonddickinson.com/uk/insights/articles-and-briefings/university-taught-lesson-video-surveillance-staff?utm_sq=fnk6zq9p5y&utm_source=Twitter&utm_medium=social&utm_campaign=1DavidClarke&utm_content=GDPR
[3] https://threatvector.cylance.com/en_us/home/the-trouble-with-smart-city-security-assessments.html
[2] https://securityintelligence.com/is-it-time-for-enterprises-to-bid-farewell-to-byod/
[2] https://www.fireeye.com/blog/threat-research/2019/01/global-dns-hijacking-campaign-dns-record-manipulation-at-scale.html
[2] https://okt.to/inec80
[2] https://www.forbes.com/sites/forbestechcouncil/2019/01/02/cybersecurity-in-an-agile-world/#792777de1be9

Top URLs in Tweet in G7:
[5] https://www.csoonline.com/article/3331983/security/the-cybersecurity-skills-shortage-is-getting-worse.html
[4] http://www.myne-us.com/2013/09/testing-malware-scenarios-in-your.html
[4] https://www.scmagazine.com/home/security-news/hyatt-hotels-implements-bug-bounty-program/
[3] https://techcrunch.com/2019/01/05/dozen-iphone-apps-linked-to-golduck-malware/
[2] https://malware.news/t/emotet-malware-used-microsoft-office-xml-format-and-shape-object-to-execute-macro/26242
[2] http://quttera.com/website-scanner-statistics-last-day#threats_stats
[2] https://quttera.com/website-anti-malware-monitoring
[2] http://shelldorado.com/articles/ignorantsguide.html
[2] http://www.andlabs.org/html5.html
[2] https://reusablesec.blogspot.com/2018/03/creating-long-term-ssl-certificates.html

Top URLs in Tweet in G8:
[6] https://www.zdnet.com/article/malware-found-preinstalled-on-some-alcatel-smartphones/
[4] https://www.zdnet.com/article/new-tool-automates-phishing-attacks-that-bypass-2fa/
[4] https://www.zdnet.com/article/this-trojan-attack-adds-a-backdoor-to-your-windows-pc-to-steal-data/
[3] https://www.helpnetsecurity.com/2019/01/10/gdpr-compliance-tips/
[3] https://www.zdnet.com/article/iranian-hackers-suspected-in-worldwide-dns-hijacking-campaign/
[3] https://www.zdnet.com/article/government-shutdown-tls-certificates-not-renewed-many-websites-are-down/
[3] https://www.zdnet.com/article/neiman-marcus-agrees-to-1-5-million-data-breach-settlement/
[3] https://news4sanantonio.com/news/local/del-rio-attacked-by-ransomware-unclear-if-personal-data-compromised
[3] https://sites.ziftsolutions.com/cisco.ziftsolutions.com/8a873a6a52758fc701527c4c028e455a?cid=8a9982176839be2001683cd564b16af8&url=https%3A%2F%2Fthehackernews.com%2F2018%2F12%2Fmalware-twitter-meme.html
[2] https://www.csoonline.com/article/3331983/security/the-cybersecurity-skills-shortage-is-getting-worse.html

Top URLs in Tweet in G9:
[7] https://medium.com/@john.opdenakker/some-useful-appsec-learning-resources-de8a0b3c896f
[6] https://medium.com/@john.opdenakker/infosec-tip-of-the-day-google-alerts-e2a439469247
[5] https://www.peerlyst.com/posts/cyber-deception-wiki-guurhart?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[4] https://www.peerlyst.com/posts/top-posts-about-email-security-on-peerlyst-an-email-security-wiki-peerlyst?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[4] https://www.peerlyst.com/posts/uac-bypass-analysis-jym-cheong?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[4] https://www.peerlyst.com/posts/tailoring-infosec-communication-five-scenarios-claire-tills?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[3] https://www.peerlyst.com/posts/cyber-forensics-and-incident-response-study-plan-karl-m-1?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[2] https://www.peerlyst.com/posts/peertalk-tm-how-to-write-infosec-fiction-brent-hutfless?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[2] https://twitter.com/s33k2track0/status/1082693367501373442
[2] http://www.independent.co.uk/travel/news-and-advice/heathrow-secret-security-data-found-memory-stick-london-street-a8025516.html

Top URLs in Tweet in G10:
[16] https://phishstats.info/
[10] https://hakin9.org/crack-wpa-wpa2-wi-fi-routers-with-aircrack-ng-and-hashcat/
[8] https://www.hackers-arise.com/networks-basics
[7] https://www.hackers-arise.com/getting-started
[6] https://hakin9.org/new-playground-and-cheatsheet-for-learning-python/
[4] https://hakin9.org/4-reasons-why-we-need-cybersecurity-innovation/
[3] https://www.theinquirer.net/inquirer/news/3069078/kaspersky-researchers-reportedly-tipped-off-nsa-to-data-stealing-contractor
[3] https://www.forbes.com/sites/jasonevangelho/2018/12/12/microsoft-admits-normal-windows-10-users-are-testing-unstable-updates/#7a8a74204f6f
[3] https://www.hackers-arise.com/single-post/2016/06/24/Why-Hackers-Make-the-Best-InfoSec-Engineers
[3] https://www.hackers-arise.com/single-post/2016/05/23/Getting-Started-with-Kali-Linux

Top Domains
Top Domains in Tweet in Entire Graph:
[1555] twitter.com
[213] paper.li
[172] tobem.com
[155] cisco.com
[86] kaspersky.com
[77] zdnet.com
[53] sophos.com
[47] darkreading.com
[47] feedburner.com
[44] co.uk

Top Domains in Tweet in G1:
[476] twitter.com
[47] feedburner.com
[45] paper.li
[16] securityaffairs.co
[13] bankinfosecurity.com
[11] darkreading.com
[9] co.uk
[9] threatpost.com
[9] jdsupra.com
[9] nist.gov

Top Domains in Tweet in G2:
[246] twitter.com
[12] darkreading.com
[8] indiatimes.com
[8] co.uk
[7] studynotesandtheory.com
[7] thecybersecurityplace.com
[6] thenewsminute.com
[6] zdnet.com
[6] lnkd.in
[6] threatpost.com

Top Domains in Tweet in G3:
[153] cisco.com
[84] kaspersky.com
[36] keeper.io

Top Domains in Tweet in G4:
[67] twitter.com
[2] paper.li
[1] lumosur.com
[1] washingtonpost.com

Top Domains in Tweet in G5:
[8] twitter.com
[5] packetstormsecurity.com

Top Domains in Tweet in G6:
[60] twitter.com
[10] securityintelligence.com
[8] darkreading.com
[8] informationsecuritybuzz.com
[5] scoop.it
[5] cylance.com
[4] fireeye.com
[4] threatpost.com
[3] proofpoint.com
[3] beckershospitalreview.com

Top Domains in Tweet in G7:
[54] twitter.com
[24] scmagazine.com
[9] csoonline.com
[7] quttera.com
[7] infosecurity-magazine.com
[6] zdnet.com
[6] paper.li
[4] myne-us.com
[3] techcrunch.com
[3] sophos.com

Top Domains in Tweet in G8:
[51] twitter.com
[33] zdnet.com
[6] ziftsolutions.com
[4] darkreading.com
[4] co.uk
[3] helpnetsecurity.com
[3] csoonline.com
[3] thecyberwire.com
[3] news4sanantonio.com
[3] wsj.com

Top Domains in Tweet in G9:
[48] twitter.com
[24] peerlyst.com
[13] medium.com
[5] trueproxy.net
[2] co.uk
[1] indiatimes.com
[1] pcmag.com

Top Domains in Tweet in G10:
[40] twitter.com
[25] hakin9.org
[21] hackers-arise.com
[16] phishstats.info
[6] hackersonlineclub.com
[5] paper.li
[4] thehackernews.com
[3] theinquirer.net
[3] forbes.com
[2] ctvnews.ca

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[3208] infosec
[1910] cybersecurity
[560] security
[431] iot
[285] bigdata
[278] statistics
[249] cyberwarfare
[169] blockchain
[163] infographic
[150] hacking



Top Hashtags in Tweet in G1:
[332] infosec
[117] cybersecurity
[53] security
[31] hacking
[26] iot
[19] dataprivacy
[17] hack
[12] fintech
[12] blockchain
[12] info

Top Hashtags in Tweet in G2:
[736] infosec
[593] cybersecurity
[344] iot
[254] bigdata
[243] security
[140] infographic
[128] smartcity
[118] mobile
[113] ai
[94] blockchain

Top Hashtags in Tweet in G3:
[273] infosec
[273] cybersecurity
[273] statistics

Top Hashtags in Tweet in G4:
[28] infosec
[7] dfir
[6] pci
[5] opsec
[5] osint
[3] cybersecurity
[2] android
[2] spacex
[2] shmoocon
[2] phishing

Top Hashtags in Tweet in G5:
[5] infosec

Top Hashtags in Tweet in G6:
[177] infosec
[148] cybersecurity
[37] security
[26] cybercrime
[22] iot
[18] cyberattack
[15] cybersafety
[11] gdpr
[11] dfir
[9] google

Top Hashtags in Tweet in G7:
[124] infosec
[97] cybersecurity
[34] security
[16] cyber
[15] malware
[15] phishing
[12] privacy
[10] cybercrime
[10] cloudsecurity
[10] nist

Top Hashtags in Tweet in G8:
[96] infosec
[92] cybersecurity
[23] riskmanagement
[22] humor
[10] malware
[10] cwbriefing
[7] cwpodcast
[5] mobile
[5] security
[5] databreach

Top Hashtags in Tweet in G9:
[72] infosec
[12] cybersecurity
[8] ciso
[8] blueteam
[7] appsec
[6] security
[5] cyberdeception
[4] aws
[4] tipoftheday
[4] harden

Top Hashtags in Tweet in G10:
[115] infosec
[54] cybersecurity
[33] hacking
[17] hackers
[16] pentesting
[16] phishing
[13] security
[9] programming
[8] networkbasics
[7] linux

Top Words
Top Words in Tweet in Entire Graph:
[2213] Words in Sentiment List#1: Positive
[2161] Words in Sentiment List#2: Negative
[30] Words in Sentiment List#3: Angry/Violent
[79608] Non-categorized Words
[83993] Total Words
[3995] infosec
[2068] cybersecurity
[1023] security
[453] iot
[424] fisher85m

Top Words in Tweet in G1:
[416] infosec
[163] security
[144] cybersecurity
[75] data
[57] 2019
[53] new
[49] cyber
[49] latest
[41] hacking
[37] news

Top Words in Tweet in G2:
[746] infosec
[623] cybersecurity
[405] fisher85m
[360] infographic
[348] iot
[288] security
[254] bigdata
[128] smartcity
[118] mobile
[116] ai

Top Words in Tweet in G3:
[273] infosec
[273] cybersecurity
[273] statistics
[270] kaynemcgladrey

Top Words in Tweet in G4:
[249] infosec
[159] r0wdy_
[141] people
[128] very
[122] make
[122] want
[119] find
[118] hires
[118] true
[118] great

Top Words in Tweet in G5:
[198] infosec
[181] make
[180] non
[178] humans
[177] attention
[176] geoffbelknap
[176] stories
[176] blogs
[176] tweets
[176] weakness

Top Words in Tweet in G6:
[181] infosec
[171] cybersecurity
[59] security
[57] more
[51] archonsec
[28] 2019
[26] cybercrime
[25] 1
[22] iot
[20] 0

Top Words in Tweet in G7:
[126] infosec
[111] cybersecurity
[52] security
[46] masergy
[37] breaches
[30] csoonline
[24] malware
[21] cyber
[21] take
[21] 18

Top Words in Tweet in G8:
[96] infosec
[95] cybersecurity
[46] cybersecboardrm
[23] happy
[23] riskmanagement
[22] friday
[22] everyone
[22] awesome
[22] weekend
[22] humor

Top Words in Tweet in G9:
[89] infosec
[30] security
[21] here's
[18] j_opdenakker
[16] peerlyst
[13] series
[13] great
[12] up
[12] cybersecurity
[12] c

Top Words in Tweet in G10:
[120] infosec
[61] cybersecurity
[40] new
[38] hacking
[31] hackers
[23] hacker
[20] security
[20] hakin9
[19] three_cube
[18] phishing

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[848] cybersecurity,infosec
[518] infosec,cybersecurity
[279] cybersecurity,statistics
[275] kaynemcgladrey,infosec
[239] cyberwarfare,infosec
[186] non,infosec
[183] infosec,humans
[181] attention,non
[181] humans,stories
[181] stories,blogs

Top Word Pairs in Tweet in G1:
[40] cybersecurity,infosec
[28] infosec,cybersecurity
[24] security,infosec
[17] infosec,security
[14] government,shutdown
[14] latest,security
[14] hack,hacking
[13] data,breach
[13] cyber,security
[12] hacking,info

Top Word Pairs in Tweet in G2:
[257] cybersecurity,infosec
[142] infographic,cybersecurity
[84] infosec,education
[78] bigdata,infosec
[70] business,benefits
[70] benefits,5g
[69] cybersecurity,bigdata
[69] 5g,cybersecurity
[66] infosec,mobile
[64] mobile,wearables

Top Word Pairs in Tweet in G3:
[273] infosec,cybersecurity
[273] cybersecurity,statistics
[270] kaynemcgladrey,infosec

Top Word Pairs in Tweet in G4:
[117] find,very
[117] very,true
[117] true,infosec
[117] infosec,shortage
[117] shortage,people
[117] people,make
[117] make,great
[117] great,hires
[117] hires,want
[116] r0wdy_,find

Top Word Pairs in Tweet in G5:
[179] non,infosec
[177] infosec,humans
[176] attention,non
[176] humans,stories
[176] stories,blogs
[176] blogs,tweets
[176] tweets,weakness
[176] weakness,2fa
[176] 2fa,make
[176] make,decisions

Top Word Pairs in Tweet in G6:
[85] cybersecurity,infosec
[51] archonsec,cybersecurity
[25] security,infosec
[20] infosec,cybersecurity
[16] biggest,cybercrime
[16] cybercrime,threats
[16] threats,2019
[16] 2019,v
[16] v,technewsworld
[16] technewsworld,security

Top Word Pairs in Tweet in G7:
[54] cybersecurity,infosec
[19] csoonline,compiled
[19] compiled,list
[19] list,18
[19] 18,biggest
[19] biggest,significant
[19] significant,breaches
[19] breaches,21st
[19] 21st,century
[19] century,take

Top Word Pairs in Tweet in G8:
[75] cybersecurity,infosec
[23] infosec,riskmanagement
[22] happy,friday
[22] friday,everyone
[22] everyone,awesome
[22] awesome,weekend
[22] weekend,humor
[22] humor,cybersecurity
[21] cybersecboardrm,happy
[8] infosec,cybersecurity

Top Word Pairs in Tweet in G9:
[8] here's,one
[8] cybersecurity,infosec
[7] resources,up
[7] up,speed
[7] speed,learn
[7] learn,appsec
[6] here's,collection
[6] collection,good
[6] good,resources
[6] blogged,infosec

Top Word Pairs in Tweet in G10:
[25] cybersecurity,infosec
[24] infosec,hacking
[22] infosec,cybersecurity
[16] new,websites
[16] websites,hosting
[16] hosting,phishing
[16] phishing,new
[16] new,today
[14] hacking,hackers
[12] hackers,pentesting

Top Replied-To
Top Replied-To in Entire Graph:
@r0wdy_
@mischmerz
@she_secures
@bunnysay_ot
@chadloder
@infosec_samurai
@infosec_taylor
@swiftonsecurity
@hacks4pancakes
@ian_infosec

Top Replied-To in G2:
@she_secures
@triciakickssaas
@hacker247_
@swarupnanda
@notdan
@thugcrowd
@infosecsherpa
@iancoldwater
@ransomitpros

Top Replied-To in G4:
@r0wdy_
@mischmerz
@hacks4pancakes
@swiftonsecurity
@primed_mover
@andrewscully1
@notameadow
@secfarmer
@xphreckx
@ninjininji

Top Replied-To in G5:
@r0wdy_
@geoffbelknap

Top Replied-To in G6:
@she_secures

Top Replied-To in G7:
@securityblvd

Top Replied-To in G9:
@ian_infosec
@r0wdy_
@chrissistrunk
@rotate26chars
@kthom9988
@danlovejoy
@babblinggeek
@bentleyaudrey
@uk_daniel_card

Top Mentioned
Top Mentioned in Entire Graph:
@fisher85m
@kaynemcgladrey
@geoffbelknap
@r0wdy_
@cybersecboardrm
@archonsec
@ai__tech
@ravikikan
@jimharris
@masergy

Top Mentioned in G1:
@bamitav
@whatsgig
@gtpintado

Top Mentioned in G2:
@fisher85m
@ravikikan
@uscybermag
@cioamaro
@mikequindazzi
@softnet_search
@social_molly
@antgrasso
@hudson_chatbots
@edmuke

Top Mentioned in G3:
@kaynemcgladrey

Top Mentioned in G4:
@r0wdy_
@hacks4pancakes
@notameadow
@notdan
@maliciouslink
@mischmerz
@samg0ld
@eljefedsecurit
@ninjininji
@m0nster847

Top Mentioned in G5:
@geoffbelknap
@r0wdy_
@duosec
@eljefedsecurit
@maliciouslink
@iodboi

Top Mentioned in G6:
@archonsec
@technewsworld
@diioannid
@darkreading
@threatpost
@glasswallnews
@antgrasso
@nakedsecurity
@sansinstitute
@irawinkler

Top Mentioned in G7:
@masergy
@csoonline
@kishorcy
@securityblvd
@cioamaro
@rogeragrimes
@nuharbor
@quttera
@cnbc
@kevinmitnick

Top Mentioned in G8:
@cybersecboardrm
@zdnet
@wsj
@wired
@campuscodi
@maecgob
@protec_kenya
@nrockmartin
@darkreading

Top Mentioned in G9:
@j_opdenakker
@peerlyst
@malwarebytes
@clairetills
@investigatorchi
@sidragon1
@thedawidbalut
@mattiacampagnan
@erichkron
@ethicalhacker

Top Mentioned in G10:
@hakin9
@three_cube
@softwarnet
@e_kaspersky
@fuzzy23k
@infosecr2m
@hocupdate
@phishstats
@itguyonabike
@1worldidentity

Top Tweeters
Top Tweeters in Entire Graph:
@arkangelscrap
@sectest9
@robre62
@cyberdomain
@bridgittelesley
@applesupport
@cybertoolsbooks
@mementh
@evankirstel
@ottlegalrebels

Top Tweeters in G1:
@it_securitynews
@bootleggirl
@marenda
@gtpintado
@nishant_shastry
@kas_stoner
@cybertaters
@clairvoyant_the
@bigdatabatman
@hitoshikokumai

Top Tweeters in G2:
@arkangelscrap
@sectest9
@evankirstel
@beingexample
@chidambara09
@fintechna
@gmizrachi
@drofdem
@agedchild003
@biconnections

Top Tweeters in G3:
@kaynemcgladrey
@tklanjetaaagh4r
@noqlddjt5x6zf0o
@elaina77687742
@tijuana32700576
@paulene21357186
@lgpjxqu4gyyv3fq
@anthony23168875
@yuk16274080
@laine03482901

Top Tweeters in G4:
@mementh
@leocullen4
@dalus87
@morr_1980
@thefiretracker2
@rdsweb
@krypt3ia
@nite0wl
@andrewdwilliams
@viss

Top Tweeters in G5:
@tinuevel
@r_chirgwin
@creature124
@pharniel
@rawriter1
@fernand0
@oaktownpirate
@0x434a
@aglongo
@fardarter

Top Tweeters in G6:
@ottlegalrebels
@reuters
@livemint
@gvalan
@mjoehlerich
@forbes
@vievararosel
@nathealings
@zenmorin
@entrepreneur

Top Tweeters in G7:
@cnbc
@financialtimes
@grattongirl
@leonijhuis
@forbestech
@scmagazine
@gossithedog
@quttera
@cybersecupdate
@sec_headhunter

Top Tweeters in G8:
@kotaknaren
@data_nerd
@rt_com
@wsj
@shellykramer
@zdnet
@techcrunch
@wstrohmacher
@metropulseusa
@mench90

Top Tweeters in G9:
@robre62
@chasapple
@securityblog
@claushoumann
@pcmag
@tripwireinc
@infointuitive
@j0hnnyxm4s
@peerlyst
@b0bby_br00ks

Top Tweeters in G10:
@gamergeeknews
@youranonrise
@justjoeaz1
@__dotblake
@softwarnet
@2ndleprechaun
@hanen105
@akawombat42
@programminbuddy
@siliconbeachhub


We use necessary cookies to make our site work. We’d like to set additional cookies to understand site usage, make site improvements and to remember your settings. We also use cookies set by other sites to help deliver content from their services.