infosec, Twitter, 2/17/2019 8:22:20 AM, 186999


FAQ | Problem?

infosec_2019-02-17_00-00-03.xlsx
infosec_2019-02-17_00-00-03.xlsx
From:
NodeXLExcelAutomator
Uploaded on:
February 17, 2019
Short Description:
infosec via NodeXL http://bit.ly/2DRvu5A
@sectest9
@nerdpyle
@dreamchaser_nfl
@fisher85m
@loosesecurity
@antoinette0x53
@uscert_gov
@fpieces
@cybersecboardrm
@hacks4pancakes

Top hashtags:
#infosec
#cybersecurity
#security
#iot
#cyberwarfare
#bigdata
#infographic
#ai

Description:
Description
The graph represents a network of 3,579 Twitter users whose tweets in the requested range contained "infosec", or who were replied to or mentioned in those tweets. The network was obtained from the NodeXL Graph Server on Sunday, 17 February 2019 at 08:01 UTC.

The requested start date was Sunday, 17 February 2019 at 01:01 UTC and the maximum number of days (going backward) was 14.

The maximum number of tweets collected was 5,000.

The tweets in the network were tweeted over the 1-day, 12-hour, 18-minute period from Friday, 15 February 2019 at 12:42 UTC to Sunday, 17 February 2019 at 01:01 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 3579
Unique Edges : 4272
Edges With Duplicates : 2470
Total Edges : 6742
Number of Edge Types : 3
Mentions : 4107
Replies to : 205
Tweet : 2430
Self-Loops : 2430
Reciprocated Vertex Pair Ratio : 0.0138381201044386
Reciprocated Edge Ratio : 0.0272984805562709
Connected Components : 820
Single-Vertex Connected Components : 472
Maximum Vertices in a Connected Component : 1965
Maximum Edges in a Connected Component : 4652
Maximum Geodesic Distance (Diameter) : 16
Average Geodesic Distance : 5.652651
Graph Density : 0.00030322524520794
Modularity : 0.573859
NodeXL Version : 1.0.1.408

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[69] https://go.usa.gov/xEP4d
[21] https://www.forbes.com/sites/moorinsights/2019/02/15/three-things-to-know-about-cybersecurity-in-2019/#63aa698550f0
[18] https://www.hackread.com/what-is-ransomware-and-how-to-prevent-it/
[17] https://phishstats.info/
[17] http://open-sez.me
[14] https://www.techrepublic.com/article/5-blockchain-terms-business-leaders-need-to-know/
[14] https://twitter.com/Antoinette0x53/status/1095843206724575232
[13] https://medium.com/threat-intel/cyber-fails-48d80253f26c
[11] https://ai.lnpservices.com/email-service-provider-vfemail-suffers-email-hack
[10] https://threatpost.com/sneaky-phishing-scam-facebook/141869/

Top URLs in Tweet in G1:
[17] http://open-sez.me
[5] https://threatpost.com/data-breach-equifax-credential-dumps/141925/
[5] http://www.sectechno.com/xsstrike-most-advanced-xss-detection-suite/
[4] https://www.schneier.com/blog/archives/2019/02/friday_squid_bl_663.html
[4] https://www.cybergigs.io/
[3] https://threatpost.com/sneaky-phishing-scam-facebook/141869/
[3] https://www.zdnet.com/article/five-emerging-cybersecurity-threats-you-should-take-very-seriously-in-2019/
[2] https://www.welivesecurity.com/2019/02/14/attack-email-provider-wipes-almost-two-decades-data/?utm_source=Twitter
[2] https://techcrunch.com/2019/02/14/happy-valentines-day-your-dating-app-account-was-hacked-says-coffee-meets-bagel/
[2] https://stateofsecurity.com/?p=4955&utm_medium=social_link&utm_source=missinglettr&utm_campaign=how-to-respond-bec-series-5

Top URLs in Tweet in G2:
[17] https://phishstats.info/
[8] https://hardenbit.com/googlebot-is-a-kind-of-ddos-attack/
[7] https://www.jadirectives.com/best-cyber-security-certifications-online/
[7] https://www.redteamsecure.com/web-application-penetration-testing/?utm_content=buffer624fe&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
[7] http://info.aravo.com/white-paper-cybersecurity-and-vendor-risk-the-third-party-risk-challenge-is-here-now?utm_content=85177711&utm_medium=social&utm_source=twitter&hss_channel=tw-31273094
[6] https://nakedsecurity.sophos.com/2019/02/15/apple-fighting-pirate-app-developers-will-insist-on-2fa-for-coders/
[6] https://www.uscybersecurity.net/healthcare/
[5] https://threatpost.com/sneaky-phishing-scam-facebook/141869/
[5] https://krebsonsecurity.com/2019/02/more-alleged-sim-swappers-face-justice/
[5] https://securityboulevard.com/2019/02/lacking-medical-device-security-puts-everyone-at-risk/?utm_campaign=February%202019%20content%20curation&utm_content=84708405&utm_medium=social&utm_source=twitter&hss_channel=tw-768135263478509568

Top URLs in Tweet in G3:
[2] https://motherboard.vice.com/en_us/article/a3b3dg/big-telecom-sold-customer-gps-data-911-calls
[2] https://threatpost.com/critical-okcupid-flaw-exposes-daters-to-app-takeovers/141794/
[2] https://nakedsecurity.sophos.com/2019/02/14/google-paid-out-3-4m-in-bug-bounties-last-year/
[1] https://twitter.com/i/web/status/1096597052270698497
[1] https://twitter.com/i/web/status/1096591805435400192
[1] https://twitter.com/i/web/status/1096839491787124736
[1] https://twitter.com/i/web/status/1096151937379053568
[1] https://twitter.com/i/web/status/1096175864885202944
[1] https://thehackernews.com/2019/02/data-breach-website.html
[1] https://twitter.com/j_opdenakker/status/1095623021514145793

Top URLs in Tweet in G4:
[10] https://www.techrepublic.com/article/5-blockchain-terms-business-leaders-need-to-know/
[4] https://www.zdnet.com/article/ransomware-warning-that-romantic-message-may-hide-a-nasty-surprise/
[3] https://www.csoonline.com/article/3341317/data-breach/data-breaches-exposed-5-billion-records-in-2018.html
[3] https://www.zdnet.com/article/the-hacking-strategies-that-will-dominate-in-2019/
[3] https://www.cso.com.au/article/657811/targeted-ransomware-everything-need-know/
[3] https://www.itproportal.com/news/only-a-thirds-of-businesses-think-they-can-protect-themselves-from-data-breaches/
[3] https://www.ca.com/content/dam/ca/us/files/ebook/insider-threat-report.pdf
[2] https://www.csoonline.com/article/3341319/security/ibm-sets-forth-with-a-strong-cybersecurity-message.html
[2] https://www.csoonline.com/article/3339565/authentication/what-is-biometrics-and-why-collecting-biometric-data-is-risky.html
[2] https://www.zdnet.com/article/iot-botnet-used-in-youtube-ad-fraud-scheme/

Top URLs in Tweet in G5:
[1] https://twitter.com/i/web/status/1095843206724575232

Top URLs in Tweet in G6:
[59] https://go.usa.gov/xEP4d
[9] https://medium.com/threat-intel/cyber-fails-48d80253f26c
[3] https://go.usa.gov/xEUn5
[2] https://rips.tech/joomla
[2] https://thehackernews.com/2019/02/data-breach-website.html
[1] https://twitter.com/i/web/status/1096393693270065152
[1] https://twitter.com/i/web/status/1096740981507002369
[1] https://twitter.com/i/web/status/1096861684306718720
[1] https://twitter.com/i/web/status/1096825165516820480
[1] https://twitter.com/i/web/status/1096901191995318272

Top URLs in Tweet in G7:
[3] https://www.linkedin.com/pulse/hacking-youtube-fun-profit-alexandru-coltuneac/
[2] http://www.sectechno.com/pwndsh-post-exploitation-framework/
[1] http://victim.com
[1] https://twitter.com/i/web/status/1094615936223625216
[1] https://twitter.com/i/web/status/1096530902929326080
[1] https://twitter.com/i/web/status/1096704685594030080
[1] http://www.sectechno.com/xsstrike-most-advanced-xss-detection-suite/

Top URLs in Tweet in G8:
[2] https://www.theregister.co.uk/2019/02/14/password_length/
[1] https://twitter.com/i/web/status/1096467184228884480
[1] https://twitter.com/i/web/status/1096495750177943552
[1] https://twitter.com/i/web/status/1096496261102952448
[1] https://twitter.com/i/web/status/1096512952432115712
[1] https://twitter.com/i/web/status/1096542324136374272
[1] https://www.zdnet.com/article/five-emerging-cybersecurity-threats-you-should-take-very-seriously-in-2019/
[1] https://threatpost.com/dns-spoofing-attacks/141880/
[1] https://www.wired.com/story/database-leak-details-chinas-oppressive-tracking-of-muslims-security-roundup/
[1] https://twitter.com/i/web/status/1096573863209635841

Top URLs in Tweet in G9:
[12] https://www.hackread.com/what-is-ransomware-and-how-to-prevent-it/
[5] https://hackerstrip.exposure.co/
[4] http://www.pentesteracademy.com/course?id=3
[2] http://www.pentesteracademy.com/course?id=1
[2] https://er.educause.edu/blogs/2019/2/top-higher-ed-it-policy-issues-2019
[2] https://www.youtube.com/watch?v=l3O89N0ZgII

[1] https://hakin9.org/why-every-business-needs-enterprise-backup-software/
[1] https://twitter.com/i/web/status/1096457946781880321
[1] https://twitter.com/i/web/status/1096397528499712001
[1] https://twitter.com/i/web/status/1092825638027833345

Top URLs in Tweet in G10:
[9] https://sysdream.com/news/lab/2019-02-15-chashell-a-reverse-shell-over-dns/
[8] https://thenextweb.com/artificial-intelligence/2019/02/13/thispersondoesnotexist-com-is-face-generating-ai-at-its-creepiest/
[4] https://www.wired.com/story/xiaomi-scooter-hack/
[3] https://outpost24.com/blog/X-forwarded-for-SQL-injection
[2] http://www.tobem.com/cyberwar/the-watchers-the-rise-of-americas-surveillance-state/
[2] http://www.tobem.com/cyberwar/data-reverse-engineering-slaying-the-legacy-dragon/
[2] http://www.tobem.com/cyberwar/cyber-law-in-argentina/
[2] https://www.tobem.com/cyberwar/handling-bad-inside-a-cyber-era-private-investigation-firm/
[2] https://delapcyber.com/cyber-security-news/
[2] http://www.tobem.com/cyberwar/network-analysis-using-wireshark-cookbook/

Top Domains
Top Domains in Tweet in Entire Graph:
[1671] twitter.com
[237] paper.li
[204] tobem.com
[106] feedburner.com
[73] usa.gov
[72] zdnet.com
[56] sophos.com
[47] threatpost.com
[43] techrepublic.com
[40] darkreading.com

Top Domains in Tweet in G1:
[458] twitter.com
[46] paper.li
[17] open-sez.me
[15] packetstormsecurity.com
[14] darkreading.com
[12] threatpost.com
[9] zdnet.com
[8] google.com
[7] lnkd.in
[6] csoonline.com

Top Domains in Tweet in G2:
[408] twitter.com
[18] techrepublic.com
[17] phishstats.info
[14] infosecurity-magazine.com
[13] csoonline.com
[12] zdnet.com
[12] threatpost.com
[12] hardenbit.com
[11] sophos.com
[10] securityaffairs.co

Top Domains in Tweet in G3:
[50] twitter.com
[5] sophos.com
[5] github.com
[2] paper.li
[2] vice.com
[2] threatpost.com
[1] thehackernews.com
[1] tindrasgrove.com
[1] medium.com
[1] darkreading.com

Top Domains in Tweet in G4:
[38] twitter.com
[24] zdnet.com
[20] techrepublic.com
[10] darkreading.com
[8] csoonline.com
[6] infosecurity-magazine.com
[6] paper.li
[6] com.br
[3] krebsonsecurity.com
[3] securityboulevard.com

Top Domains in Tweet in G5:
[1] twitter.com

Top Domains in Tweet in G6:
[62] usa.gov
[12] twitter.com
[10] medium.com
[4] paper.li
[2] rips.tech
[2] thehackernews.com
[1] welivesecurity.com
[1] darknetdiaries.com
[1] meetup.com

Top Domains in Tweet in G7:
[3] twitter.com
[3] sectechno.com
[3] linkedin.com
[1] victim.com

Top Domains in Tweet in G8:
[23] twitter.com
[2] co.uk
[1] zdnet.com
[1] threatpost.com
[1] wired.com
[1] usa.gov

Top Domains in Tweet in G9:
[15] twitter.com
[12] hackread.com
[7] pentesteracademy.com
[5] exposure.co
[3] paper.li
[2] educause.edu
[2] youtube.com
[1] hakin9.org
[1] tobem.com
[1] jadirectives.com

Top Domains in Tweet in G10:
[199] tobem.com
[90] twitter.com
[9] sysdream.com
[8] thenextweb.com
[5] soundcloud.com
[5] wired.com
[4] risky.biz
[3] twit.tv
[3] outpost24.com
[3] helpnetsecurity.com

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[3310] infosec
[1842] cybersecurity
[504] security
[425] iot
[297] cyberwarfare
[290] bigdata
[220] infographic
[194] ai
[155] iiot
[138] cyber



Top Hashtags in Tweet in G1:
[358] infosec
[211] cybersecurity
[57] follow
[55] security
[51] rt
[19] binary
[17] password
[17] opsec
[16] iot
[16] cmcp

Top Hashtags in Tweet in G2:
[926] infosec
[807] cybersecurity
[346] iot
[274] security
[262] bigdata
[199] infographic
[146] ai
[142] iiot
[92] analytics
[83] ransomware

Top Hashtags in Tweet in G3:
[68] infosec
[11] cybersecurity
[10] infosecjobs
[8] ff
[3] infosecurity
[3] blacktechtwitter
[3] cyber
[3] whitehat
[2] icsinc
[1] databreach

Top Hashtags in Tweet in G4:
[176] infosec
[150] cybersecurity
[26] nginx
[26] cheatsheet
[19] security
[13] hardening
[13] checklist
[12] ransomware
[10] hackers
[7] hack

Top Hashtags in Tweet in G6:
[84] infosec
[77] cybersecurity
[62] nccic
[62] cyber
[3] hacking
[2] fridayfact
[2] joomla
[2] appsec
[2] k12
[2] nj

Top Hashtags in Tweet in G7:
[84] infosec
[78] bugbounty
[75] bugbountytip
[72] bugbountytips
[72] cybersecurity
[3] infosecurity
[3] xss
[3] remotework
[3] remotejobs
[3] remote

Top Hashtags in Tweet in G8:
[14] infosec
[9] cybersecurity
[5] hackers
[5] developers
[5] sysadmins
[1] mcafee2020
[1] presidentmcafee
[1] threat
[1] dns
[1] wireshark

Top Hashtags in Tweet in G9:
[77] infosec
[18] security
[16] cybersecurity
[12] ransomware
[12] malware
[8] owaspseasides
[7] seasides
[5] myinfosecstory
[5] comics
[4] cyberwarfare

Top Hashtags in Tweet in G10:
[371] infosec
[286] cyberwarfare
[27] cybersecurity
[18] onair
[11] bsidesmelb19
[11] security
[11] ciso
[9] pentest
[9] redteam
[8] artificialintelligence

Top Words
Top Words in Tweet in Entire Graph:
[1910] Words in Sentiment List#1: Positive
[2455] Words in Sentiment List#2: Negative
[30] Words in Sentiment List#3: Angry/Violent
[83311] Non-categorized Words
[87676] Total Words
[4198] infosec
[1974] cybersecurity
[1142] security
[447] iot
[427] cyber

Top Words in Tweet in G1:
[443] infosec
[237] cybersecurity
[132] security
[64] follow
[47] cyber
[45] data
[40] latest
[35] new
[30] more
[30] out

Top Words in Tweet in G2:
[929] infosec
[843] cybersecurity
[373] infographic
[366] security
[355] iot
[286] fisher85m
[262] bigdata
[153] ai
[151] need
[146] know

Top Words in Tweet in G3:
[324] infosec
[171] job
[169] nerdpyle
[164] looking
[141] tell
[140] reply
[140] retweet
[139] actively
[139] dev
[139] whatever

Top Words in Tweet in G4:
[183] infosec
[157] cybersecurity
[46] security
[35] cybersecboardrm
[34] more
[29] ransomware
[26] nginx
[26] cheatsheet
[26] hardening
[26] checklist

Top Words in Tweet in G5:
[108] know
[108] women
[108] infosec
[108] talk
[108] safety
[108] concerns
[108] hotels
[108] during
[108] security
[108] conferences

Top Words in Tweet in G6:
[95] infosec
[80] cyber
[77] cybersecurity
[63] security
[62] releases
[62] nccic
[60] uscert_gov
[59] vmware
[59] updates
[11] 5

Top Words in Tweet in G7:
[94] infosec
[78] bugbounty
[75] bugbountytip
[73] redirect
[72] loosesecurity
[72] bugbountytips
[72] cybersecurity
[72] open
[72] bypass
[69] methods

Top Words in Tweet in G8:
[83] infosec
[22] fix
[22] theregister
[21] rejected
[21] register
[21] movie
[21] ideas
[21] basic
[21] instinct
[21] rockstar

Top Words in Tweet in G9:
[93] infosec
[20] security
[19] owaspseasides
[17] pppp
[17] shahnafisa
[16] cybersecurity
[16] express
[15] during
[14] abroahsan
[13] reybango

Top Words in Tweet in G10:
[381] infosec
[286] cyberwarfare
[80] security
[63] cyber
[42] hacking
[36] cybersecurity
[35] guide
[28] cybertoolsbooks
[24] computer
[20] digital

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[767] cybersecurity,infosec
[404] infosec,cybersecurity
[294] cyberwarfare,infosec
[173] need,know
[156] job,infosec
[152] infographic,cybersecurity
[148] looking,job
[146] actively,looking
[146] infosec,dev
[146] dev,whatever

Top Word Pairs in Tweet in G1:
[115] cybersecurity,infosec
[51] follow,cybersecurity
[33] infosec,cybersecurity
[21] security,infosec
[17] 1000's,default
[17] default,passwords
[17] passwords,fb
[17] fb,defaultpasswords
[17] defaultpasswords,password
[17] password,infosec

Top Word Pairs in Tweet in G2:
[245] cybersecurity,infosec
[139] need,know
[135] infographic,cybersecurity
[126] iiot,cybersecurity
[113] cybersecurity,bigdata
[107] 12,facts
[107] facts,need
[107] know,iot
[106] bigdata,infosec
[104] iot,usage

Top Word Pairs in Tweet in G3:
[148] job,infosec
[141] looking,job
[139] actively,looking
[139] infosec,dev
[139] dev,whatever
[139] whatever,today
[139] today,reply
[139] reply,retweet
[139] retweet,tell
[138] nerdpyle,actively

Top Word Pairs in Tweet in G4:
[110] cybersecurity,infosec
[28] infosec,cybersecurity
[26] hardening,checklist
[20] archonsec,cybersecurity
[16] need,know
[13] nginx,cheatsheet
[13] cheatsheet,printable
[13] printable,high
[13] high,res
[13] res,hardening

Top Word Pairs in Tweet in G5:
[108] know,women
[108] women,infosec
[108] infosec,talk
[108] talk,safety
[108] safety,concerns
[108] concerns,hotels
[108] hotels,during
[108] during,security
[108] security,conferences
[108] conferences,people

Top Word Pairs in Tweet in G6:
[72] cybersecurity,infosec
[62] releases,security
[62] nccic,cyber
[62] cyber,cybersecurity
[59] vmware,releases
[59] security,updates
[59] updates,nccic
[58] uscert_gov,vmware
[9] cyber,fails
[9] fails,5

Top Word Pairs in Tweet in G7:
[75] bugbounty,bugbountytip
[72] loosesecurity,bugbounty
[72] bugbountytip,bugbountytips
[72] bugbountytips,infosec
[72] infosec,cybersecurity
[72] open,redirect
[69] cybersecurity,open
[69] redirect,bypass
[69] bypass,methods
[69] methods,redirecting

Top Word Pairs in Tweet in G8:
[21] rejected,register
[21] register,movie
[21] movie,ideas
[21] ideas,basic
[21] basic,instinct
[21] instinct,infosec
[21] infosec,rockstar
[21] rockstar,murdered
[21] murdered,trying
[21] trying,fix

Top Word Pairs in Tweet in G9:
[17] infosec,pppp
[12] ransomware,prevent
[12] prevent,read
[12] read,more
[12] more,security
[12] security,malware
[12] malware,infosec
[12] infosec,cybersecurity
[12] pppp,adi
[12] adi,shahnafisa

Top Word Pairs in Tweet in G10:
[286] cyberwarfare,infosec
[28] cybertoolsbooks,cyberwarfare
[26] infosec,cyber
[17] infosec,hacking
[13] cybersecurity,infosec
[13] penetration,testing
[12] infosec,cybersecurity
[11] cyber,security
[9] security,infosec
[9] chashell,go

Top Replied-To
Top Replied-To in Entire Graph:
@nerdpyle
@kimmaida
@is_vix
@ian_infosec
@lewisb42
@lindydonna
@ravici
@aoighost
@wolfniya
@notameadow

Top Replied-To in G1:
@threatconnect
@bsidesnash

Top Replied-To in G2:
@blakemoorhouse

Top Replied-To in G3:
@nerdpyle
@aoighost
@wolfniya
@find_evil
@pcapdata
@infosec_pom
@r0wdy_
@gadievron
@infosecwelcome
@hacks4pancakes

Top Replied-To in G4:
@chrissanders88

Top Replied-To in G6:
@phillipwylie
@qw5kcmv3
@allan_infosec
@pj47596176
@phortitiude1906
@x0rz

Top Replied-To in G8:
@0xffff0800
@bing_chris
@malwarejake
@uid_

Top Replied-To in G10:
@wimzkl
@kim_crawley
@cog1tar3

Top Mentioned
Top Mentioned in Entire Graph:
@fisher85m
@nerdpyle
@antoinette0x53
@loosesecurity
@uscert_gov
@cioamaro
@cybersecboardrm
@mikequindazzi
@cybertoolsbooks
@antgrasso

Top Mentioned in G1:
@kludgesystems
@threatconnect
@jmbasile
@xlproelearning
@cylanceinc

Top Mentioned in G2:
@fisher85m
@cioamaro
@mikequindazzi
@antgrasso
@reach2ratan
@harry_robots
@claire_harris82
@smedian_network
@softnet_search
@paula_piccard

Top Mentioned in G3:
@nerdpyle
@pcapdata
@infosecwelcome
@pedantic_hacker
@j_opdenakker
@infosec_pom
@hacks4pancakes
@franksec42
@pjf166
@humbledum1

Top Mentioned in G4:
@cybersecboardrm
@binitamshah
@archonsec
@csoonline
@trimstray
@zdnet
@evanfrancen
@hacks4pancakes
@nrockmartin
@mardy9m

Top Mentioned in G5:
@antoinette0x53

Top Mentioned in G6:
@uscert_gov
@threatintel
@qw5kcmv3
@infosec_hoppers
@allan_infosec
@deb_infosec
@archistry
@infosec_ash
@infoseccomm
@x0rz

Top Mentioned in G7:
@loosesecurity
@h1_kenan
@anshuman_bh
@dekeeu
@victim
@nerdpyle
@arabsec

Top Mentioned in G8:
@theregister
@malwarejake
@jeremiahg
@malwaretechblog
@meddevsecgirl
@techcrunch
@h0tdish
@dorochichan
@swagitda_
@officialmcafee

Top Mentioned in G9:
@shahnafisa
@abroahsan
@reybango
@ethicalhacker
@owaspseasides
@hackread
@aajizdhamrah
@4w4r44
@0ddhawk
@bugcrowd

Top Mentioned in G10:
@cybertoolsbooks
@sysdream
@_w0bb1t_
@wired
@triciakickssaas
@peter_tonoli
@ibmsecurity
@eli_krumova
@ox_it
@hwingo

Top Tweeters
Top Tweeters in Entire Graph:
@jornalistavitor
@arkangelscrap
@sectest9
@jurylady5
@cyberdomain
@comcastcares
@cybertoolsbooks
@webironbots
@prosyria1
@evankirstel

Top Tweeters in G1:
@cyberdomain
@rvp
@villamizaritpro
@infopronetwork
@knotsoraven
@clairvoyant_the
@bigdatabatman
@mrsyiswhy
@hitoshikokumai
@transportjobsus

Top Tweeters in G2:
@arkangelscrap
@sectest9
@chidambara09
@fintechna
@agedchild003
@nishant_shastry
@mjoehlerich
@vivmilano
@7wdata
@yamatho2

Top Tweeters in G3:
@binkytoes
@rejectionking
@getwired
@nite0wl
@edbott
@hettivong
@weems
@k8tdidtoo
@avonan
@sql_handle

Top Tweeters in G4:
@jornalistavitor
@alizardx
@gvalan
@cbcnews
@zdnet
@wfsbnews
@maperez324
@wordfinga
@vishne0
@reutersindia

Top Tweeters in G5:
@prosyria1
@briangrnotabot
@wolfxe_
@annel5694
@perverta_flack
@litapi1
@bonobochick
@j_blockbuster
@muses220
@zahirali

Top Tweeters in G6:
@strategicpolicy
@rxk14007
@hackerslist
@starbucks
@justafandavid
@linuxmil
@ulvbjerkan
@phortitiude1906
@antoniodivine
@iamnotai

Top Tweeters in G7:
@arabsec
@offethhacker
@massimozanchi
@thb_stx
@0x6d616e69
@xorlla
@wezmaster
@shiberiatora
@schniggie
@_bl4de

Top Tweeters in G8:
@rcastle06
@techcrunch
@youranonrise
@theregister
@zuthadeus
@purrcival1
@gaelicwizard
@philmonkey
@c4i
@drtao

Top Tweeters in G9:
@sherryjones
@securitytube
@anwarabbasippp
@munwar_h_kaleri
@s0urc3c0d3err0r
@reybango
@imabhirajk
@hameedchohan6
@__whipp__
@chrisatwork

Top Tweeters in G10:
@cybertoolsbooks
@calcaware
@fhhknews
@andrewmorrisuk
@terzima
@securitycast
@wired
@metrotrains
@smartecocity
@elcavalos


We use necessary cookies to make our site work. We’d like to set additional cookies to understand site usage, make site improvements and to remember your settings. We also use cookies set by other sites to help deliver content from their services.