infosec, Twitter, 4/7/2019 7:24:54 AM, 192873


FAQ | Problem?

infosec_2019-04-07_00-00-03.xlsx
infosec_2019-04-07_00-00-03.xlsx
From:
NodeXLExcelAutomator
Uploaded on:
April 07, 2019
Short Description:
infosec via NodeXL http://bit.ly/2UBapqi
@sectest9
@cybersecboardrm
@fisher85m
@thefuturist007
@hansesecure
@hexadecim8
@kim_crawley
@reach2ratan
@bentleyaudrey
@binitamshah

Top hashtags:
#infosec
#cybersecurity
#security
#cyberwarfare
#iot
#malware
#hacking
#bigdata

Description:
Description
The graph represents a network of 3,537 Twitter users whose tweets in the requested range contained "infosec", or who were replied to or mentioned in those tweets. The network was obtained from the NodeXL Graph Server on Sunday, 07 April 2019 at 07:01 UTC.

The requested start date was Sunday, 07 April 2019 at 00:01 UTC and the maximum number of days (going backward) was 14.

The maximum number of tweets collected was 5,000.

The tweets in the network were tweeted over the 1-day, 13-hour, 45-minute period from Friday, 05 April 2019 at 10:15 UTC to Sunday, 07 April 2019 at 00:00 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 3537
Unique Edges : 4558
Edges With Duplicates : 3116
Total Edges : 7674
Number of Edge Types : 3
Mentions : 4953
Tweet : 2475
Replies to : 246
Self-Loops : 2475
Reciprocated Vertex Pair Ratio : 0.0481000481000481
Reciprocated Edge Ratio : 0.0917852225791648
Connected Components : 800
Single-Vertex Connected Components : 430
Maximum Vertices in a Connected Component : 1903
Maximum Edges in a Connected Component : 5572
Maximum Geodesic Distance (Diameter) : 16
Average Geodesic Distance : 5.167005
Graph Density : 0.00034844955141318
Modularity : 0.541073
NodeXL Version : 1.0.1.410

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[44] https://www.scmagazine.com/home/security-news/damages-from-ransomware-attack-on-norsk-hydro-reach-as-high-as-40m/
[28] https://github.com/trimstray/the-book-of-secret-knowledge#tool-ssh
[24] https://twitter.com/Jhaddix/status/1113946875982307331
[17] https://www.zdnet.com/article/this-new-malware-is-scanning-the-internet-for-systems-info-on-valuable-targets/
[17] http://open-sez.me
[17] https://www.maria-johnsen.com/million-dollar-blog/cyber-security/the-benefits-of-hiring-a-professional-cyber-securityseo-expert
[16] https://www.zdnet.com/article/why-is-it-so-hard-for-us-to-pay-attention-to-cybersecurity/
[16] https://www.information-age.com/data-breaches-to-fuel-increase-in-global-infosec-spending-says-gartner-123474218/
[15] https://github.com/besimorhino/powercat
[13] https://unit42.paloaltonetworks.com/dns-tunneling-how-dns-can-be-abused-by-malicious-actors/

Top URLs in Tweet in G1:
[17] http://open-sez.me
[13] https://phishstats.info/
[6] http://www.sectechno.com/discover-custom-scripts-to-automate-pentesting/
[6] http://www.sectechno.com/whatweb-next-generation-web-scanner/
[5] https://www.webiron.com/bot_feed/bd7f678e9b87f3079d9fda5d9f6157c7
[4] http://www.databreaches.net/
[4] https://twitter.com/aneeshnair/status/1114023863539699713
[3] https://www.itpro.co.uk/security/33382/capita-warns-schools-to-stop-using-its-pupil-data-sharing-platform
[3] https://www.webiron.com/bot_feed/6cb558793d3d22ee449a26fa9c6d1c55
[3] http://www.amazon.com/

Top URLs in Tweet in G2:
[10] https://www.zdnet.com/article/why-phishing-emails-are-still-your-biggest-security-nightmare/
[8] https://www.itnews.com.au/news/millions-of-customers-data-accessed-in-second-toyota-hack-523134?utm_source=desktop&utm_medium=twitter&utm_campaign=share
[8] https://hakin9.org/crack-wpa-wpa2-wi-fi-routers-with-aircrack-ng-and-hashcat/
[7] https://www.forbes.com/sites/cognitiveworld/2019/04/05/how-privacy-laws-are-changing-to-protect-personal-information/
[6] https://drive.google.com/drive/folders/1CBcemFdorkAqJ-Sthsh67OVHgH4FQF05?usp=sharing
[5] https://www.helpnetsecurity.com/2019/04/05/whois-after-gdpr/
[4] https://neonsec.com/evabs/verify.php
[4] https://www.helpnetsecurity.com/2019/04/05/what-is-shadow-mining/
[4] https://thehackernews.com/2019/04/xiaomi-browser-vulnerability.html
[4] https://www.darkreading.com/threat-intelligence/phishing-campaign-targeting-verizon-mobile-users-/d/d-id/1334358

Top URLs in Tweet in G3:
[13] https://www.information-age.com/data-breaches-to-fuel-increase-in-global-infosec-spending-says-gartner-123474218/
[5] https://blog.appknox.com/top-cyberattacks-and-data-breaches-q4/?utm_content=88828827&utm_medium=social&utm_source=twitter&hss_channel=tw-2466013141
[5] https://www.hpe.com/us/en/insights/articles/5-cybersecurity-mistakes-companies-keep-making-1903.html#.XJqBYiUJqic.twitter
[4] https://blog.appknox.com/cybersecurity-statistics-2019/?utm_content=88829026&utm_medium=social&utm_source=twitter&hss_channel=tw-2466013141
[4] http://cyberhubengage.com/faces-hackers
[3] http://www.uscybersecurity.net/use-tor-safely/
[3] http://www.viruss.eu/wordpress/sql-injection-in-duplicate-page-wordpress-plugin/
[3] https://www.uscybersecurity.net/csmag/cybersecurity-workforce-development-a-regional-model-for-the-nation/
[3] http://www.mckinsey.com/insights/business_technology/finding_your_digital_sweet_spot
[2] http://www.viruss.eu/security-news/alleged-chief-of-romanian-atm-skimming-gang-arrested-in-mexico/

Top URLs in Tweet in G4:
[4] https://www.fireeye.com/blog/threat-research/2019/04/pick-six-intercepting-a-fin6-intrusion.html
[3] https://www.peerlyst.com/posts/all-about-machine-learning-malware-analysis-kimberly-crawley
[3] https://www.browserlondon.com/blog/2019/03/05/phishing-company-infosec/
[2] https://discord.gg/infosec
[2] https://www.proofpoint.com/us/resources/white-papers/ransomware-survival-guide
[2] https://www.peerlyst.com/posts/open-source-intelligence-osint-reconnaissance-ian-barwise-m-s-cissp-ceh-cnda?utm_source=twitter&utm_medium=Application_Share&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[1] https://twitter.com/i/web/status/1114220161555410944
[1] https://twitter.com/i/web/status/1114133091906392065
[1] https://twitter.com/i/web/status/1114179143661387776
[1] https://redteamsurvey.com

Top URLs in Tweet in G5:
[12] https://www.zdnet.com/article/why-is-it-so-hard-for-us-to-pay-attention-to-cybersecurity/
[10] https://www.techrepublic.com/article/why-insider-security-threats-are-on-the-rise-and-so-difficult-to-detect/
[7] https://www.zdnet.com/article/this-new-malware-is-scanning-the-internet-for-systems-info-on-valuable-targets/
[5] https://www.slashgear.com/malware-can-add-or-remove-cancerous-nodes-in-ct-scans-04572107/
[5] https://www.zdnet.com/article/researcher-publishes-google-chrome-exploit/
[5] https://www.zdnet.com/article/hacker-group-has-been-hijacking-dns-traffic-on-d-link-routers-for-three-months/
[4] https://www.csoonline.com/article/3384702/what-is-a-honeypot-a-trap-for-catching-hackers-in-the-act.html
[4] https://www.hipaajournal.com/study-reveals-health-information-the-least-likely-data-type-to-be-encrypted/?utm_medium=social&utm_source=twitter&utm_campaign=postfity&utm_content=postfityfb553
[3] https://boardtownblast.com/
[3] https://readwrite.com/2019/04/01/11-artificial-intelligence-trends-every-business-in-2019-must-know/

Top URLs in Tweet in G6:
[5] https://www.techrepublic.com/article/how-to-completely-and-securely-delete-files-in-windows/#ftag=RSS56d97e7
[5] http://www.viruss.eu/security-news/malware-that-can-inject-fake-cancerous-nodes-into-ct-scans-created-by-security-researchers/
[5] https://packetstormsecurity.com/news/view/30006/Pharma-Firm-Bayer-Hit-With-WINNTI-Malware.html
[5] https://businessinsights.bitdefender.com/identity-access-management-environments-grow-complexity
[4] http://www.viruss.eu/malware/bashlite-iot-malware-updated-with-mining-and-backdoor-commands-targets-wemo-devices/
[4] https://www.welivesecurity.com/videos/week-security-tony-anscombe-17-2/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+eset%2Fblog+%28ESET+Blog%3A+We+Live+Security%29
[4] http://www.viruss.eu/security/hackers-can-add-remove-cancer-from-ct-scans-researchers/
[4] http://www.viruss.eu/security/serious-security-gps-week-rollover-and-the-other-sort-of-zero-day/
[3] http://www.viruss.eu/security-news/alleged-chief-of-romanian-atm-skimming-gang-arrested-in-mexico/
[3] http://www.viruss.eu/security-news/this-prolific-phishing-gang-is-back-with-new-tactics-to-target-executives/

Top URLs in Tweet in G7:
[13] https://unit42.paloaltonetworks.com/dns-tunneling-how-dns-can-be-abused-by-malicious-actors/
[8] https://www.hackers-arise.com/networks-basics
[5] https://www.tripwire.com/state-of-security/security-awareness/rsa-2019-survey-geopolitical-issues/
[4] https://www.cybergrx.com/ponemon-third-party-cyber-risk-management-report/
[4] http://r.socialstudio.radian6.com/de6ab052-8ca9-459b-8646-87493ea9edc1
[3] https://www.scmagazine.com/home/security-news/data-breach/georgia-tech-stung-with-1-3-million-person-data-breach/
[3] https://www.farsightsecurity.com/txt-record/2019/03/25/burke-phishing/?utm_content=88799375&utm_medium=social&utm_source=twitter&hss_channel=tw-2572020625
[2] https://www.youtube.com/watch?v=B3TRC-0xCDQ&feature=youtu.be

[2] https://www.linkedin.com/pulse/when-comes-business-security-why-do-we-all-want-ourselves-roger-smith/?published=t
[2] https://www.cyberscoop.com/bayer-breached-china-wicked-panda/

Top URLs in Tweet in G8:
[15] https://github.com/besimorhino/powercat
[2] http://www.sixdub.net/?p=627
[1] https://twitter.com/i/web/status/1114254631713017858
[1] https://twitter.com/i/web/status/1112734099695902720
[1] https://twitter.com/i/web/status/1114497659199545345
[1] https://hakin9.org/how-to-perform-phishing-attack-with-2fa-bypass-by-valeriy-shevchenko/
[1] https://twitter.com/i/web/status/1114119693214912513
[1] https://www.youtube.com/watch?v=OoTx1cYC5u8&feature=youtu.be

[1] https://twitter.com/i/web/status/1114638908845895680
[1] https://twitter.com/i/web/status/1114106793762938880

Top URLs in Tweet in G9:
[11] https://thenextweb.com/security/2019/04/03/women-are-24-of-the-infosec-workforce-now-follow-some-of-them/
[2] https://www.wired.com/story/exactis-data-leak-fallout/
[1] https://twitter.com/i/web/status/1113056428300787713
[1] https://twitter.com/i/web/status/1114231209473773568
[1] https://twitter.com/i/web/status/1112446781483298817
[1] https://paper.li/kentonsmith/security-stuff?edition_id=ce8acb20-58b8-11e9-89aa-0cc47a0d1609
[1] https://paper.li/kentonsmith/security-stuff?edition_id=95ab42e0-57ef-11e9-89aa-0cc47a0d1609
[1] https://drive.google.com/drive/folders/1CBcemFdorkAqJ-Sthsh67OVHgH4FQF05?usp=sharing
[1] https://censys.io/
[1] https://www.shodan.io/

Top URLs in Tweet in G10:
[28] https://github.com/trimstray/the-book-of-secret-knowledge#tool-ssh
[6] https://sdmsoftware.com/group-policy-blog/security-related/sending-gpos-down-the-wrong-track-redirecting-the-gpt/
[5] https://github.com/franccesco/getaltname
[3] https://censys.io/
[3] https://www.shodan.io/
[3] https://viz.greynoise.io/table
[3] https://www.zoomeye.org/
[3] https://social.technet.microsoft.com/wiki/contents/articles/52251.manage-windows-defender-using-powershell.aspx
[2] https://www.verboon.info/2018/01/retrieving-windows-defender-atp-query-api-data-with-powershell/
[2] https://skanthak.homepage.t-online.de/SAFER.html

Top Domains
Top Domains in Tweet in Entire Graph:
[1405] twitter.com
[215] tobem.com
[195] paper.li
[122] zdnet.com
[110] feedburner.com
[71] viruss.eu
[62] scmagazine.com
[61] github.com
[50] sophos.com
[49] hakin9.org

Top Domains in Tweet in G1:
[404] twitter.com
[110] feedburner.com
[41] pastebeen.com
[29] paper.li
[22] webiron.com
[17] open-sez.me
[13] phishstats.info
[12] sectechno.com
[11] hakin9.org
[10] zdnet.com

Top Domains in Tweet in G2:
[262] twitter.com
[213] tobem.com
[35] hakin9.org
[21] zdnet.com
[19] helpnetsecurity.com
[19] sentinelone.com
[17] viruss.eu
[16] packetstormsecurity.com
[15] forbes.com
[11] pulsedive.com

Top Domains in Tweet in G3:
[121] twitter.com
[18] appknox.com
[16] viruss.eu
[13] uscybersecurity.net
[13] information-age.com
[10] zdnet.com
[5] jdsupra.com
[5] hpe.com
[4] sentinelone.com
[4] techrepublic.com

Top Domains in Tweet in G4:
[49] twitter.com
[5] peerlyst.com
[4] fireeye.com
[3] browserlondon.com
[2] discord.gg
[2] proofpoint.com
[2] zdnet.com
[2] thehackernews.com
[2] youtube.com
[1] redteamsurvey.com

Top Domains in Tweet in G5:
[48] zdnet.com
[46] twitter.com
[27] csoonline.com
[20] boardtownblast.com
[15] techrepublic.com
[7] slashgear.com
[7] darkreading.com
[4] infosecurity-magazine.com
[4] hispasec.com
[4] helpnetsecurity.com

Top Domains in Tweet in G6:
[62] twitter.com
[38] viruss.eu
[7] securityaffairs.co
[7] scoop.it
[6] techrepublic.com
[6] packetstormsecurity.com
[6] dy.si
[5] bitdefender.com
[4] welivesecurity.com
[4] krebsonsecurity.com

Top Domains in Tweet in G7:
[26] twitter.com
[15] linkedin.com
[13] paloaltonetworks.com
[10] hackers-arise.com
[10] linuxsecurity.expert
[7] darkreading.com
[6] threatpost.com
[5] scmagazine.com
[5] tripwire.com
[5] sentinelone.com

Top Domains in Tweet in G8:
[15] github.com
[6] twitter.com
[2] sixdub.net
[2] youtube.com
[1] hakin9.org
[1] medium.com

Top Domains in Tweet in G9:
[16] twitter.com
[11] thenextweb.com
[4] paper.li
[3] wired.com
[1] google.com
[1] censys.io
[1] shodan.io
[1] greynoise.io
[1] zoomeye.org
[1] techtarget.com

Top Domains in Tweet in G10:
[33] github.com
[16] twitter.com
[6] sdmsoftware.com
[4] microsoft.com
[3] radian6.com
[3] censys.io
[3] shodan.io
[3] greynoise.io
[3] zoomeye.org
[2] verboon.info

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[3412] infosec
[1699] cybersecurity
[552] security
[291] cyberwarfare
[273] iot
[196] malware
[175] hacking
[150] bigdata
[141] databreach
[139] privacy



Top Hashtags in Tweet in G1:
[525] infosec
[227] cybersecurity
[71] security
[26] databreach
[23] phishing
[21] hacking
[20] password
[20] cyber
[20] breach
[17] leak

Top Hashtags in Tweet in G2:
[784] infosec
[284] cybersecurity
[280] cyberwarfare
[84] security
[75] malware
[60] hacking
[38] ransomware
[37] analytics
[36] databreach
[34] hacker

Top Hashtags in Tweet in G3:
[329] infosec
[254] cybersecurity
[114] iot
[95] security
[89] bigdata
[70] analytics
[60] infographic
[55] tech
[51] databreach
[37] ai

Top Hashtags in Tweet in G4:
[86] infosec
[31] cybersecurity
[31] ff
[6] pentest
[6] redteam
[6] phishing
[6] blueteam
[6] security
[5] malware
[5] mitre

Top Hashtags in Tweet in G5:
[210] infosec
[168] cybersecurity
[40] security
[21] malware
[14] hacking
[13] cybercrime
[12] cybersec
[12] infographic
[10] cyberwar
[10] ai

Top Hashtags in Tweet in G6:
[159] infosec
[144] cybersecurity
[56] hacker
[53] security
[22] ciso
[17] cyber
[17] toussecnum
[13] tech
[12] malware
[10] databreach

Top Hashtags in Tweet in G7:
[144] infosec
[59] cybersecurity
[30] dfir
[23] security
[17] dns
[14] iot
[10] tools
[9] statistics
[8] networkbasics
[7] cybercrime

Top Hashtags in Tweet in G8:
[77] infosec
[68] redteam
[66] pentest
[7] cybersecurity
[4] zerodaysctf
[4] thinkdublin
[3] blueteam
[3] pentenst
[2] tr19
[1] hacking

Top Hashtags in Tweet in G9:
[16] infosec
[5] security
[5] cybersecurity
[2] botnet
[2] apcompsci
[1] infosecurity
[1] socmint
[1] data
[1] infographic
[1] hacker

Top Hashtags in Tweet in G10:
[39] infosec
[28] ssh
[28] openssh
[7] itsec
[6] datasecurity
[6] grouppolicy
[6] breach
[6] digitaltransformation
[5] pentsting
[4] security

Top Words
Top Words in Tweet in Entire Graph:
[2214] Words in Sentiment List#1: Positive
[2440] Words in Sentiment List#2: Negative
[7] Words in Sentiment List#3: Angry/Violent
[84963] Non-categorized Words
[89618] Total Words
[3415] #infosec
[1701] #cybersecurity
[585] security
[552] #security
[456] infosec

Top Words in Tweet in G1:
[525] #infosec
[227] #cybersecurity
[106] security
[73] infosec
[71] #security
[70] new
[55] passwords
[53] s
[48] data
[48] emails

Top Words in Tweet in G2:
[785] #infosec
[284] #cybersecurity
[280] #cyberwarfare
[133] security
[84] #security
[78] hacking
[75] #malware
[71] cyber
[60] data
[60] #hacking

Top Words in Tweet in G3:
[329] #infosec
[254] #cybersecurity
[123] fisher85m
[118] infographic
[114] #iot
[95] #security
[89] #bigdata
[70] #analytics
[60] #infographic
[55] #tech

Top Words in Tweet in G4:
[86] #infosec
[50] infosec
[41] appsecbloke
[35] ian_infosec
[34] notameadow
[31] #cybersecurity
[31] #ff
[30] whitehatscum
[30] jdelacruz_iot
[27] s

Top Words in Tweet in G5:
[210] #infosec
[168] #cybersecurity
[76] cybersecboardrm
[44] security
[40] #security
[35] data
[27] cybersecurity
[21] #malware
[20] malware
[19] new

Top Words in Tweet in G6:
[159] #infosec
[144] #cybersecurity
[56] #hacker
[53] #security
[52] reach2ratan
[33] gt
[31] security
[23] #cyber
[22] #ciso
[21] malware

Top Words in Tweet in G7:
[144] #infosec
[59] #cybersecurity
[30] #dfir
[23] #security
[19] three_cube
[17] #dns
[16] article
[16] tool
[15] big
[14] infosec

Top Words in Tweet in G8:
[77] #infosec
[68] #redteam
[66] #pentest
[64] hansesecure
[34] windows
[34] command
[34] line
[34] cheatsheet
[34] part
[34] 2

Top Words in Tweet in G9:
[47] infosec
[18] women
[16] #infosec
[15] hacks4pancakes
[11] twitter
[11] security
[11] out
[9] family
[9] rockstars
[9] m

Top Words in Tweet in G10:
[39] #infosec
[29] based
[29] trimstray
[28] ssh
[28] cheatsheet
[28] swift
[28] one
[28] liners
[28] binitamshah
[28] #ssh

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[723] #cybersecurity,#infosec
[292] #infosec,#cybersecurity
[285] #cyberwarfare,#infosec
[267] #infosec,#security
[118] #security,#infosec
[90] #cybersecurity,#hacker
[79] #hacker,#infosec
[79] #infosec,#pentest
[78] #infosec,#iot
[77] #databreach,#infosec

Top Word Pairs in Tweet in G1:
[69] #cybersecurity,#infosec
[64] #infosec,#cybersecurity
[41] emails,paste
[41] paste,id
[34] passwords,emails
[30] #security,#infosec
[21] #databreach,#infosec
[19] #cybersecurity,#databreach
[18] #infosec,#security
[18] default,passwords

Top Word Pairs in Tweet in G2:
[279] #cyberwarfare,#infosec
[81] #cybersecurity,#infosec
[58] #infosec,#cybersecurity
[51] #infosec,#security
[36] #infosec,#analytics
[32] cybertoolsbooks,#cyberwarfare
[31] #infosec,#hacking
[25] #security,#cybersecurity
[23] #hacking,#hackers
[23] #infosec,hacking

Top Word Pairs in Tweet in G3:
[74] #cybersecurity,#infosec
[46] infographic,#cybersecurity
[45] #infosec,#security
[36] #databreach,#infosec
[30] #iot,#cybersecurity
[29] #infosec,#bigdata
[25] #iiot,#cybersecurity
[25] #infosec,#mobilesecurity
[23] #cybersecurity,#bigdata
[23] #bigdata,#infosec

Top Word Pairs in Tweet in G4:
[24] whitehatscum,ravici
[24] ravici,appsecbloke
[23] appsecbloke,notameadow
[23] notameadow,jdelacruz_iot
[23] jdelacruz_iot,seanwrightsec
[18] evacide,hexadecim8
[18] j_opdenakker,uk_daniel_card
[18] fpieces,eric_conrad
[17] hexadecim8,fl3uryz
[17] ch33r10,k3r3n3

Top Word Pairs in Tweet in G5:
[111] #cybersecurity,#infosec
[18] #security,#infosec
[14] cybersecurity,#cybersecurity
[13] #infosec,#cybersecurity
[12] #security,#cybersecurity
[12] hard,pay
[12] pay,attention
[12] attention,cybersecurity
[11] #infosec,#security
[11] cybersecboardrm,hard

Top Word Pairs in Tweet in G6:
[48] #cybersecurity,#hacker
[45] #hacker,#infosec
[38] #cybersecurity,#infosec
[32] #infosec,#security
[17] #security,#infosec
[17] #infosec,#toussecnum
[16] #security,#cyber
[11] ct,scans
[11] #infosec,#cybersecurity
[10] #cyber,#tech

Top Word Pairs in Tweet in G7:
[29] #cybersecurity,#infosec
[22] #infosec,#cybersecurity
[22] #infosec,#dfir
[22] #infosec,#security
[13] perfect,article
[13] article,unit42_intel
[13] unit42_intel,explaining
[13] explaining,#dns
[13] #dns,tunneling
[13] tunneling,big

Top Word Pairs in Tweet in G8:
[66] #infosec,#pentest
[65] #pentest,#redteam
[34] windows,command
[34] command,line
[34] line,cheatsheet
[34] cheatsheet,part
[34] part,2
[34] 2,wmic
[34] wmic,bookmark
[34] bookmark,saved

Top Word Pairs in Tweet in G9:
[9] family,infosec
[9] infosec,rockstars
[9] rockstars,m
[9] m,eating
[9] eating,entire
[9] entire,brick
[9] brick,target
[9] target,cheese
[9] cheese,falling
[9] falling,asleep

Top Word Pairs in Tweet in G10:
[28] ssh,cheatsheet
[28] cheatsheet,swift
[28] swift,one
[28] one,liners
[28] liners,based
[28] based,binitamshah
[28] binitamshah,#ssh
[28] #ssh,#openssh
[27] trimstray,ssh
[27] #openssh,#cheatshe

Top Replied-To
Top Replied-To in Entire Graph:
@bentleyaudrey
@alyssam_infosec
@ian_infosec
@mzbat
@_th1nk3r
@infosec_jb
@akamai
@franksec42
@infosec_taylor
@bleepincomputer

Top Replied-To in G2:
@ostefano
@swarupnanda
@marcusjcarey
@689dncl

Top Replied-To in G3:
@infosec_taylor

Top Replied-To in G4:
@bentleyaudrey
@alyssam_infosec
@ian_infosec
@mzbat
@_th1nk3r
@markmorow
@franksec42
@j_opdenakker
@northwestsec
@nerdpyle

Top Replied-To in G5:
@weldpond
@reach2ratan

Top Replied-To in G6:
@akamai
@startup_canada

Top Replied-To in G7:
@phishalotamus

Top Replied-To in G9:
@hacks4pancakes
@scott_dayman
@troyhunt
@jasonsnitker
@thecjneuman
@swagitda_
@schneierblog

Top Mentioned
Top Mentioned in Entire Graph:
@fisher85m
@cybersecboardrm
@reach2ratan
@hansesecure
@thefuturist007
@bamitav
@ai__tech
@masergy
@norskhydroasa
@appsecbloke

Top Mentioned in G1:
@sourceils
@cybertense
@hertogjanr
@panther_modern
@cttsonline
@david_brogan

Top Mentioned in G2:
@bamitav
@cybertoolsbooks
@fernandohuamanx
@reach2ratan
@hakin9
@paula_piccard
@sentinelone
@forbes
@redteamruhacked
@atlseccon

Top Mentioned in G3:
@fisher85m
@uscybermag
@usnistgov
@reach2ratan
@malwarebytes
@appknox
@cybersecboardrm
@ingliguori
@bigdata_joe
@katharina_lamsa

Top Mentioned in G4:
@appsecbloke
@notameadow
@jdelacruz_iot
@whitehatscum
@ravici
@hexadecim8
@nerdpyle
@seanwrightsec
@j_opdenakker
@uk_daniel_card

Top Mentioned in G5:
@cybersecboardrm
@bamitav
@zdnet
@crowdstrike
@eccouncil
@boardtownblast
@cybersecadviser
@bsmuir
@infosecuritymag
@unaaldia

Top Mentioned in G6:
@reach2ratan
@technative
@symantec
@pauljknott
@cyberdian
@corix_jc
@akamai
@tomleightonakam
@transform_sec
@corixpartners

Top Mentioned in G7:
@three_cube
@naykisec
@unit42_intel
@kaynemcgladrey
@nottruppi
@smesecurity
@parabencorp
@cahill0701
@sentinelone
@find_evil

Top Mentioned in G8:
@hansesecure
@wardsolutions
@ibm
@wearetroopers
@certbund
@zerodaysctf
@youtube
@hakin9
@alra3ees
@rubyfu

Top Mentioned in G9:
@hacks4pancakes
@matthewhughes
@swagitda_
@keirstenbrager
@wired
@troyhunt
@is_vix
@nysecsec
@2uinc
@shelovestech

Top Mentioned in G10:
@trimstray
@binitamshah
@camcybersec
@microfocussec
@apund789
@grouppolicyguy
@sirru5h
@cyberedgegroup
@jpka
@valdesjo77

Top Tweeters
Top Tweeters in Entire Graph:
@arkangelscrap
@alljobsut
@sectest9
@robre62
@cyberdomain
@nosqldigest
@turtlewoman777
@cybertoolsbooks
@delta
@deejayiwan

Top Tweeters in G1:
@alljobsut
@cyberdomain
@webironbots
@villamizaritpro
@it_securitynews
@hotjobfinder
@mint_blancmanch
@knotsoraven
@clairvoyant_the
@bigdatabatman

Top Tweeters in G2:
@sectest9
@nosqldigest
@cybertoolsbooks
@deejayiwan
@gamergeeknews
@fhhknews
@cybertaters
@technowornever
@machinelearn_d
@forbes

Top Tweeters in G3:
@robre62
@chidambara09
@startupsbot
@lelkan
@agedchild003
@calcaware
@yamatho2
@grattongirl
@tendellshow
@santchiweb

Top Tweeters in G4:
@delta
@gvalan
@thegrugq
@rdsweb
@nerdpyle
@compuguy
@dave_cochran
@kristen_arnett
@kostuch
@carlosjg

Top Tweeters in G5:
@akwyz
@cnbc
@inc
@zdnet
@stanleyepstein
@pennipete
@juliebhunt
@mench90
@infination
@threatfeed

Top Tweeters in G6:
@arkangelscrap
@business
@bostonglobe
@startup_canada
@entrepreneur
@sandgripper
@nubiaredondo
@robpegoraro
@brainblendertec
@jade_a_consult

Top Tweeters in G7:
@pepsi7965
@weems
@ovidiug
@smesecurity
@chuq
@grumpybozo
@gentoobot
@wiomax_va
@digitalsphere33
@cyberdefence

Top Tweeters in G8:
@sandmaxprime
@securityblog
@mat_zilla
@seguridadyredes
@echeloni2p
@dsespitia
@wearetroopers
@gh0std4ncer
@youtube
@ankhbalam

Top Tweeters in G9:
@wired
@troyhunt
@hacks4pancakes
@doertedev
@sjalexander
@malwarejake
@carolonadvlaw
@cyberodb
@g_karayannis
@jasonsnitker

Top Tweeters in G10:
@jeanfrancis
@valdesjo77
@izanefg
@ibohn2
@kits_news
@dhulqairnayn
@binitamshah
@stevesaikatai
@microfocussec
@nabbedkeita


We use necessary cookies to make our site work. We’d like to set additional cookies to understand site usage, make site improvements and to remember your settings. We also use cookies set by other sites to help deliver content from their services.