infosec, Twitter, 5/19/2019 7:26:58 AM, 197308


FAQ | Problem?

infosec_2019-05-19_00-00-01.xlsx
infosec_2019-05-19_00-00-01.xlsx
From:
NodeXLExcelAutomator
Uploaded on:
May 19, 2019
Short Description:
infosec via NodeXL http://bit.ly/2VQweU7
@sectest9
@brutelogic
@hansesecure
@securityxtv
@kim_crawley
@j_opdenakker
@vishne0
@infosecsherpa
@strike_ready
@ian_infosec

Top hashtags:
#infosec
#cybersecurity
#security
#cyberwarfare
#hacking
#iot
#blockchain
#malware

Description:
Description
The graph represents a network of 3,506 Twitter users whose tweets in the requested range contained "infosec", or who were replied to or mentioned in those tweets. The network was obtained from the NodeXL Graph Server on Sunday, 19 May 2019 at 07:01 UTC.

The requested start date was Sunday, 19 May 2019 at 00:01 UTC and the maximum number of days (going backward) was 14.

The maximum number of tweets collected was 5,000.

The tweets in the network were tweeted over the 1-day, 2-hour, 28-minute period from Friday, 17 May 2019 at 16:01 UTC to Saturday, 18 May 2019 at 18:30 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 3506
Unique Edges : 4593
Edges With Duplicates : 3842
Total Edges : 8435
Number of Edge Types : 3
Mentions : 5845
Tweet : 2268
Replies to : 322
Self-Loops : 2268
Reciprocated Vertex Pair Ratio : 0.0447422212128094
Reciprocated Edge Ratio : 0.0856521739130435
Connected Components : 646
Single-Vertex Connected Components : 359
Maximum Vertices in a Connected Component : 2176
Maximum Edges in a Connected Component : 6675
Maximum Geodesic Distance (Diameter) : 19
Average Geodesic Distance : 5.827195
Graph Density : 0.000374332812793719
Modularity : 0.516824
NodeXL Version : 1.0.1.412

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[39] https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/
[39] https://blog.nviso.be/2018/04/12/painless-cuckoo-sandbox-installation/
[28] https://homjxi0e.wordpress.com/2018/02/15/lateral-movement-using-internetexplorer-application-object-com/
[20] https://www.uscybersecurity.net/mom-and-pop-businesses/
[19] https://darknetdiaries.com/episode/25
[18] https://medium.com/@mazin.ahmed/search-engine-abuse-in-popular-social-networks-14509e8a0203
[18] https://phishstats.info/
[17] http://open-sez.me
[13] https://blog.appknox.com/cybersecurity-in-smart-cities/?utm_content=91969304&utm_medium=social&utm_source=twitter&hss_channel=tw-2466013141
[12] https://threatpost.com/ransomware-pay-or-not/144833/

Top URLs in Tweet in G1:
[19] https://darknetdiaries.com/episode/25
[18] https://phishstats.info/
[17] https://medium.com/@mazin.ahmed/search-engine-abuse-in-popular-social-networks-14509e8a0203
[16] https://www.uscybersecurity.net/mom-and-pop-businesses/
[12] https://blog.appknox.com/cybersecurity-in-smart-cities/?utm_content=91969304&utm_medium=social&utm_source=twitter&hss_channel=tw-2466013141
[7] https://www.statista.com/chart/18052/biometric-technology-opinion-poll/
[7] https://www.jadirectives.com/best-cyber-security-certifications-online/
[7] http://r.socialstudio.radian6.com/06eb087a-a129-42f0-8b68-73e76aedc5ab
[7] https://pulsedive.com/
[6] https://www.natlawreview.com/article/fbi-flash-ryuk-ransomware-continues-to-attack-us-businesses

Top URLs in Tweet in G2:
[17] http://open-sez.me
[5] https://securityaffairs.co/wordpress/85645/security/microsoft-attack-surface-analyzer.html
[4] http://www.sectechno.com/datadump-dump-segments-from-logical-device/
[4] https://twitter.com/aneeshnair/status/1129244155530678272
[4] https://www.forbes.com/sites/cognitiveworld/2019/05/06/public-private-partnerships-and-the-cybersecurity-challenge-of-protecting-critical-infrastructure/?twitter=@aneeshnair
[4] https://shareasale.com/r.cfm?b=1193750&u=1803184&m=59485&urllink=&afftrack=
[3] https://www.zdnet.com/article/wa-auditor-general-report-finds-state-entities-still-dont-get-infosec/#ftag=RSSbaffb68
[3] https://www.helpnetsecurity.com/2019/05/17/new-infosec-products-of-the-week-may-17-2019/
[3] https://pentestmag.com/online-privacy-is-a-myth/
[3] https://securityaffairs.co/wordpress/85733/hacking/teamviewer-2016-hack.html

Top URLs in Tweet in G3:
[6] https://johnopdenakker.com/twitter-we-had-the-bad-and-the-ugly-now-its-time-for-the-good/
[6] https://www.itprotoday.com/security/25-signs-data-exfiltration
[5] https://stackoverflow.blog/2019/05/16/security-update/
[4] https://www.tripwire.com/state-of-security/?p=53326#.XMw5D_X7HqU.twitter
[2] https://www.bleepingcomputer.com/news/security/teamviewer-confirms-undisclosed-breach-from-2016/
[2] https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/default.aspx
[2] https://www.peerlyst.com/posts/what-the-heck-is-going-on-with-john-mcafee-kimberly-crawley
[2] https://threatvector.cylance.com/en_us/home/game-of-thrones-and-media-piracy-through-the-years.html
[2] https://www.zdnet.com/article/the-security-ramifications-of-serverless-computing/#ftag=RSSbaffb68
[2] https://threatpost.com/easter-attack-apple-ios/143901/

Top URLs in Tweet in G4:
[7] https://it.toolbox.com/blogs/chiefmonkey/the-worlds-worst-penetration-test-report-by-scumbagpentester-012814
[2] https://solutionsreview.com/security-information-event-management/the-20-best-cybersecurity-books-for-enterprises-in-2019/
[2] https://www.cnbc.com/2019/05/08/binance-bitcoin-hack-over-40-million-of-cryptocurrency-stolen.html
[1] https://www.kickstarter.com/projects/curtbraz/m-is-for-malware
[1] https://twitter.com/i/web/status/1128805774879281153
[1] https://twitter.com/2nineA/status/1129793903429791744
[1] https://twitter.com/i/web/status/1129382271239229440
[1] https://paper.li/fzcorp/1321688582?edition_id=8be2b6e0-78dc-11e9-bff4-0cc47a0d164b
[1] https://paper.li/fzcorp/1321688582?edition_id=2152f230-7941-11e9-bff4-0cc47a0d164b

Top URLs in Tweet in G5:
[38] https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/
[33] https://blog.nviso.be/2018/04/12/painless-cuckoo-sandbox-installation/
[23] https://homjxi0e.wordpress.com/2018/02/15/lateral-movement-using-internetexplorer-application-object-com/
[9] https://jmpesp.me/dns-tunnelling-with-iodine/
[8] https://hakin9.org/sharpshell-the-worst-scripting-engine-of-all-time-by-ryan-cobb/
[5] https://bluescreenofjeff.com/2018-04-12-https-payload-and-c2-redirectors/
[4] https://hakin9.org/download/hakin9-open-botneting-with-browser-extensions/
[4] https://www.youtube.com/watch?v=cfYkn1LAPKY

[3] https://paper.li/MBenLakhoua#/
[3] https://securityonline.info/amass-subdomain-enumeration/

Top URLs in Tweet in G6:
[6] https://www.ai4business.it/sicurezza/verso-una-intelligent-cybersecurity-oltre-le-normative-e-il-gdpr/
[3] https://twitter.com/Vamegabyte/status/1129420169644716032
[3] https://hackersonlineclub.com/cryptography/
[3] https://www.imperva.com/blog/this-ddos-attack-unleashed-the-most-packets-per-second-ever-heres-why-thats-important/
[3] https://www.marmaladebox.com/education-and-awareness/brexit-decision-making/
[2] https://homjxi0e.wordpress.com/2018/02/15/lateral-movement-using-internetexplorer-application-object-com/
[2] https://blog.hackersonlineclub.com/2016/05/featherduster-automated-modular_23.html
[2] https://www.bleepingcomputer.com/news/security/hackers-accessed-stack-overflows-production-systems/
[2] https://www.youtube.com/watch?v=CJO34WF-uLs&feature=youtu.be&utm_content=bufferd5e67&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer

[2] https://it.slashdot.org/story/19/05/17/2115216/slack-patches-vulnerability-in-windows-client-that-could-be-used-to-hijack-files

Top URLs in Tweet in G7:
[10] http://www.reydes.com/d/?q=Curso_Wireshark
[5] http://www.reydes.com/d/?q=Curso_de_Metasploit_Framework
[4] https://www.i-programmer.info/news/150-training-a-education/12772-a-reverse-engineering-workshop-for-beginners.html
[3] https://link.medium.com/NzPQYuHKLW
[2] https://www.welivesecurity.com/2019/05/13/verizon-dbir-what-numbers-say/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+eset%2Fblog+%28ESET+Blog%3A+We+Live+Security%29
[2] https://aboutdfir.com/incident-responders-needed-in-toronto-canada/
[2] https://twitter.com/three_cube/status/1127750472578691072
[2] https://resources.infosecinstitute.com/women-in-cybersecurity-a-mini-whos-who/
[2] https://hakin9.org/what-is-cybercrime/
[2] https://hakin9.org/hacking-web-intelligence-open-source-intelligence-and-web-reconnaissance-concepts-and-techniques-metadata/

Top URLs in Tweet in G8:
[7] https://www.peerlyst.com/posts/putting-the-cissp-and-other-certifications-into-perspective-paco-hope?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[7] https://www.peerlyst.com/posts/uac-bypass-analysis-jym-cheong?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[3] https://www.peerlyst.com/posts/breaking-into-infosec-attitude-and-mindset-jack-baylor?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[3] https://www.peerlyst.com/posts/the-only-oscp-advice-you-will-need-ciobanu-cosmin-1?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[3] https://www.peerlyst.com/posts/tips-for-an-information-security-analyst-pentester-career-ep-21-security-walkthrough-mattia-campagnano-13-years-experience-akron-oh?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[2] https://www.peerlyst.com/posts/peertalk-tm-how-to-write-infosec-fiction-brent-hutfless?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[2] https://www.peerlyst.com/posts/peertalk-tm-what-should-c-suite-know-about-soar-solutions-peerlyst?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[2] https://www.peerlyst.com/posts/take-your-time-to-review-google-s-privacy-policy-it-s-worth-it-john-opdenakker?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[2] https://www.peerlyst.com/posts/tailoring-infosec-communication-five-scenarios-claire-tills?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[2] https://www.howtogeek.com/415018/only-new-cpus-can-truly-fix-zombieload-and-spectre/

Top URLs in Tweet in G9:
[4] https://packetstormsecurity.com/news/view/30160/Hacktivist-Attacks-Dropped-By-95-Since-2015.html
[3] https://packetstormsecurity.com/news/view/30162/Magecart-POS-Malware-Found-On-Forbes-Subscription-Page.html
[2] https://packetstormsecurity.com/news/view/30163/Everything-You-Need-To-Know-About-GDPR.html
[2] http://www.viruss.eu/security/slack-flaw-allows-hackers-to-steal-manipulate-downloads-3/
[2] http://feedproxy.google.com/~r/eset/blog/~3/o6v6y_EHrJU/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+eset%2Fblog+%28ESET+Blog%3A+We+Live+Security%29
[2] https://twitter.com/CyberSecurityES/status/1114145209728872449
[1] https://www.imperva.com/blog/this-ddos-attack-unleashed-the-most-packets-per-second-ever-heres-why-thats-important/
[1] https://www.technative.io/ten-commandments-for-cyber-resilience-strategy/
[1] https://twitter.com/i/web/status/1129500775233785862
[1] https://hackercombat.com/what-is-network-data-loss-prevention/

Top URLs in Tweet in G10:
[3] https://electronicintifada.net/content/watch-film-israel-lobby-didnt-want-you-see/25876
[3] https://www.helpnetsecurity.com/2019/05/17/new-infosec-products-of-the-week-may-17-2019/
[2] https://www.youtube.com/watch?v=j1cIm2C1DWo

[2] https://electronicintifada.net/blogs/ali-abunimah/facebook-bans-major-fake-news-operation-run-israel
[2] https://www.youtube.com/watch?v=WJlXMZy06rM&feature=youtu.be

[2] http://inthesetimes.com/article/21891/rashida-tlaib-under-hate-attack-beloved-in-detroit-district
[2] https://www.helpnetsecurity.com/2019/05/16/cybersecurity-risks-utilities-industry/
[2] https://www.helpnetsecurity.com/2019/05/16/ciso-do-over/
[1] https://twitter.com/jpeterburger/status/1129656580516057088
[1] https://pages.checkpoint.com/infosec-2019-london.html

Top Domains
Top Domains in Tweet in Entire Graph:
[1135] twitter.com
[240] tobem.com
[156] paper.li
[80] feedburner.com
[52] zdnet.com
[45] securityaffairs.co
[43] peerlyst.com
[39] absolomb.com
[39] nviso.be
[39] medium.com

Top Domains in Tweet in G1:
[324] twitter.com
[237] tobem.com
[27] scmagazine.com
[25] appknox.com
[20] zdnet.com
[19] canadiansecuritymag.com
[19] statista.com
[19] darknetdiaries.com
[19] pulsedive.com
[19] webiron.com

Top Domains in Tweet in G2:
[314] twitter.com
[39] pastebeen.com
[28] securityaffairs.co
[25] paper.li
[19] darkreading.com
[17] open-sez.me
[12] shareasale.com
[10] jdsupra.com
[8] threatpost.com
[8] pentestmag.com

Top Domains in Tweet in G3:
[52] twitter.com
[6] medium.com
[6] johnopdenakker.com
[6] tripwire.com
[6] itprotoday.com
[5] stackoverflow.blog
[3] threatpost.com
[3] faveeo.com
[2] bleepingcomputer.com
[2] ultimatewindowssecurity.com

Top Domains in Tweet in G4:
[7] toolbox.com
[3] twitter.com
[2] solutionsreview.com
[2] paper.li
[2] cnbc.com
[1] kickstarter.com

Top Domains in Tweet in G5:
[38] absolomb.com
[33] nviso.be
[26] hakin9.org
[23] wordpress.com
[18] twitter.com
[17] securityonline.info
[9] jmpesp.me
[8] quttera.com
[7] paper.li
[5] bluescreenofjeff.com

Top Domains in Tweet in G6:
[32] twitter.com
[8] paper.li
[6] hackersonlineclub.com
[6] ai4business.it
[4] youtube.com
[3] bleepingcomputer.com
[3] imperva.com
[3] lnkd.in
[3] marmaladebox.com
[2] wordpress.com

Top Domains in Tweet in G7:
[77] feedburner.com
[21] twitter.com
[15] reydes.com
[7] hakin9.org
[6] amazon.com
[4] i-programmer.info
[3] medium.com
[3] itsecuritycareer.com
[2] welivesecurity.com
[2] aboutdfir.com

Top Domains in Tweet in G8:
[38] peerlyst.com
[21] twitter.com
[2] howtogeek.com
[2] microsoft.com
[2] shareblue.com
[2] theglobeandmail.com
[2] hipaajournal.com
[2] reason.com
[2] technologyreview.com
[2] threatpost.com

Top Domains in Tweet in G9:
[27] twitter.com
[9] packetstormsecurity.com
[6] viruss.eu
[5] google.com
[4] techrepublic.com
[2] paper.li
[2] ehackingnews.com
[1] imperva.com
[1] technative.io
[1] hackercombat.com

Top Domains in Tweet in G10:
[8] youtube.com
[7] twitter.com
[7] helpnetsecurity.com
[5] electronicintifada.net
[3] infosecurityeurope.com
[2] inthesetimes.com
[2] f5.com
[1] checkpoint.com
[1] marketingenvy.com
[1] pcmag.com

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[2809] infosec
[1385] cybersecurity
[532] security
[315] cyberwarfare
[220] hacking
[162] iot
[160] blockchain
[154] malware
[148] pentest
[133] redteam



Top Hashtags in Tweet in G1:
[1016] infosec
[610] cybersecurity
[305] cyberwarfare
[299] security
[134] blockchain
[116] iot
[110] hacking
[104] malware
[88] infographic
[82] tech

Top Hashtags in Tweet in G2:
[327] infosec
[166] cybersecurity
[56] security
[32] databreach
[26] hacking
[23] breach
[22] it
[20] ciso
[19] privacy
[19] technology

Top Hashtags in Tweet in G3:
[122] infosec
[59] cybersecurity
[20] ff
[8] hacking
[7] security
[6] twitter
[6] gameofthrones
[6] ginfosec
[4] hacktheplanet
[4] hacker

Top Hashtags in Tweet in G4:
[13] cybersecurity
[12] infosec
[7] pentest
[7] pentesting
[4] security
[2] dfir
[1] redteam
[1] infosec2k
[1] it
[1] investigation

Top Hashtags in Tweet in G5:
[230] infosec
[112] redteam
[111] pentest
[34] blueteam
[27] hacking
[27] hackers
[23] pwntest
[21] opensource
[17] security
[16] pentesting

Top Hashtags in Tweet in G6:
[96] infosec
[37] cybersecurity
[12] security
[11] ctf
[11] hacking
[10] rce
[10] digitaltransformation
[9] seguridadinformatica
[8] automotive
[8] healthcare

Top Hashtags in Tweet in G7:
[156] infosec
[49] cybersecurity
[21] dfir
[14] infographics
[13] security
[9] hacking
[9] honeypot
[9] dionaea
[9] zeroday
[9] modis

Top Hashtags in Tweet in G8:
[51] infosec
[11] cybersecurity
[10] securityplus
[8] infoseccareer
[8] ransomware
[7] cissp
[7] certifications
[7] ebook
[7] uacbypass
[7] uac

Top Hashtags in Tweet in G9:
[77] cybersecurity
[62] infosec
[21] aviation
[16] cyberattack
[16] cyberresilience
[15] captechu
[15] degree
[15] hacker
[14] security
[8] cyber

Top Hashtags in Tweet in G10:
[25] infosec
[9] cybersecurity
[4] cloudsecurity
[4] ciso
[4] it
[3] cybersec
[2] bip
[2] bop
[2] israelmachine
[2] bds

Top Words
Top Words in Tweet in Entire Graph:
[2508] Words in Sentiment List#1: Positive
[2361] Words in Sentiment List#2: Negative
[9] Words in Sentiment List#3: Angry/Violent
[87503] Non-categorized Words
[92372] Total Words
[2809] #infosec
[1384] #cybersecurity
[639] security
[636] infosec
[532] #security

Top Words in Tweet in G1:
[1016] #infosec
[610] #cybersecurity
[305] #cyberwarfare
[299] #security
[187] security
[134] #blockchain
[116] #iot
[110] #hacking
[104] #malware
[98] new

Top Words in Tweet in G2:
[327] #infosec
[166] #cybersecurity
[82] infosec
[71] security
[56] #security
[56] passwords
[44] emails
[44] dump
[39] t
[39] data

Top Words in Tweet in G3:
[122] #infosec
[97] ian_infosec
[72] infosecsherpa
[72] whitehatscum
[69] j_opdenakker
[68] bentleyaudrey
[64] blackroomsec
[61] joshjaycomedy
[59] #cybersecurity
[55] kim_crawley

Top Words in Tweet in G4:
[190] infosec
[187] brutelogic
[185] landscape
[185] changing
[13] #cybersecurity
[12] #infosec
[9] world's
[8] community
[7] shellaffect
[7] great

Top Words in Tweet in G5:
[230] #infosec
[137] hansesecure
[113] #pentest
[112] #redteam
[67] domain
[60] using
[48] windows
[42] security
[39] infosec
[38] privilege

Top Words in Tweet in G6:
[96] #infosec
[37] #cybersecurity
[20] s
[18] security
[14] awesome
[13] looks
[13] hack
[12] #security
[11] nice
[11] here

Top Words in Tweet in G7:
[156] #infosec
[48] #cybersecurity
[25] security
[23] more
[21] #dfir
[19] s
[18] beginners
[18] three_cube
[18] hackers
[17] make

Top Words in Tweet in G8:
[51] #infosec
[38] security
[19] infosec
[15] peerlyst
[14] mattiacampagnan
[14] post
[12] wrote
[12] new
[12] taking
[11] know

Top Words in Tweet in G9:
[77] #cybersecurity
[62] #infosec
[40] cybersecurity
[23] need
[23] know
[22] critical
[21] #aviation
[21] airbus
[21] securing
[21] business

Top Words in Tweet in G10:
[25] #infosec
[16] security
[15] europe
[14] lobby
[11] israel
[11] one
[9] 4
[9] #cybersecurity
[8] 2019
[7] world

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[421] #cybersecurity,#infosec
[299] #cyberwarfare,#infosec
[230] #infosec,#cybersecurity
[193] infosec,landscape
[193] landscape,changing
[192] brutelogic,infosec
[170] #security,#infosec
[149] #infosec,#security
[93] #infosec,#pentest
[92] #pentest,#redteam

Top Word Pairs in Tweet in G1:
[292] #cyberwarfare,#infosec
[124] #cybersecurity,#infosec
[104] #infosec,#cybersecurity
[100] #security,#infosec
[92] #blockchain,#security
[81] #cybersecurity,#blockchain
[71] #infosec,#bitcoin
[61] #infosec,#security
[55] #bitcoin,#cryptocurrency
[54] #cryptocurrency,#hacking

Top Word Pairs in Tweet in G2:
[61] #cybersecurity,#infosec
[39] emails,paste
[39] paste,id
[36] passwords,emails
[23] #infosec,#cybersecurity
[22] #security,#infosec
[18] https,t
[18] t,co
[17] #databreach,#infosec
[17] #cybersecurity,#databreach

Top Word Pairs in Tweet in G3:
[43] kim_crawley,laurenmaille
[41] laurenmaille,infosecsherpa
[41] blenster,blackroomsec
[41] no53lf,cyberarms
[40] whitehatscum,j_opdenakker
[39] seanwrightsec,z3rotrust
[39] z3rotrust,blenster
[34] blackroomsec,no53lf
[30] ravici,ian_infosec
[29] threat,intel

Top Word Pairs in Tweet in G4:
[185] infosec,landscape
[185] landscape,changing
[184] brutelogic,infosec
[7] great,example
[7] example,world's
[7] world's,worst
[7] worst,penetration
[7] penetration,test
[7] test,report
[7] report,#pentest

Top Word Pairs in Tweet in G5:
[88] #infosec,#pentest
[88] #pentest,#redteam
[38] windows,privilege
[38] privilege,escalation
[38] escalation,guide
[38] guide,#infosec
[37] hansesecure,windows
[33] painless,cuckoo
[33] cuckoo,sandbox
[33] sandbox,installation

Top Word Pairs in Tweet in G6:
[19] #infosec,#cybersecurity
[10] 404,page
[10] page,#rce
[10] #rce,report
[10] report,summary
[10] summary,looks
[10] looks,kind
[10] kind,walkthrough
[10] walkthrough,hack
[10] hack,box

Top Word Pairs in Tweet in G7:
[23] #cybersecurity,#infosec
[18] beginners,#infosec
[16] curso,virtual
[14] make,things
[14] things,more
[14] more,convenient
[14] convenient,help
[14] help,beginners
[14] #infosec,decided
[14] decided,regroup

Top Word Pairs in Tweet in G8:
[10] considering,taking
[10] taking,security
[10] security,certification
[10] certification,post
[10] post,mattiacampagnan
[10] mattiacampagnan,help
[10] help,#securityplus
[9] #securityplus,#infosec
[9] security,engineering
[7] putting,#cissp

Top Word Pairs in Tweet in G9:
[27] #cybersecurity,#infosec
[21] #infosec,#aviation
[21] airbus,cybersecurity
[21] cybersecurity,securing
[21] securing,critical
[21] critical,business
[21] business,need
[15] #aviation,#captechu
[15] #captechu,#degree
[15] #degree,airbus

Top Word Pairs in Tweet in G10:
[11] israel,lobby
[6] check,point
[6] point,team
[6] team,excited
[6] excited,one
[6] one,largest
[6] largest,conferences
[6] conferences,security
[6] security,europe
[6] europe,#infosec

Top Replied-To
Top Replied-To in Entire Graph:
@ian_infosec
@rotate26chars
@nerdpyle
@bentleyaudrey
@tyrejim
@alyssam_infosec
@pyrotek3
@fakcancer
@chadloder
@hack_ftw

Top Replied-To in G1:
@adanielhill
@akamai
@owasp
@gianinaskarlett
@microsoft

Top Replied-To in G3:
@rotate26chars
@ian_infosec
@nerdpyle
@bentleyaudrey
@tyrejim
@fakcancer
@lockdownurlife
@localhostdemon
@ravici
@jfslowik

Top Replied-To in G4:
@brutelogic
@infosec_drama

Top Replied-To in G6:
@thenextweb
@msftsecurity
@kitploit
@marigalloway

Top Replied-To in G8:
@jack_daniel
@trycatchhcf
@belevgevgeny
@joepettit2
@realdonaldtrump

Top Replied-To in G10:
@bpschut

Top Mentioned
Top Mentioned in Entire Graph:
@brutelogic
@hansesecure
@ian_infosec
@adanielhill
@infosecsherpa
@j_opdenakker
@whitehatscum
@blackroomsec
@bentleyaudrey
@joshjaycomedy

Top Mentioned in G1:
@adanielhill
@ps1cohacker
@jinibabd
@statistacharts
@fisher85m
@appknox
@cybertoolsbooks
@kimberl87759219
@ronald_vanloon
@mikequindazzi

Top Mentioned in G2:
@markquinn_vo
@all7labs
@zxer197
@hotdealsalert
@_th1nk3r
@staargray
@fatuxcade
@bwc_security
@stefanluckhaus
@briskinfosec

Top Mentioned in G3:
@ian_infosec
@whitehatscum
@infosecsherpa
@j_opdenakker
@blackroomsec
@joshjaycomedy
@bentleyaudrey
@kim_crawley
@ravici
@z3rotrust

Top Mentioned in G4:
@brutelogic
@shellaffect
@curtbraz
@htcia
@2ninea
@infosecsherpa
@d4n_tweets
@attcyber
@jasonbeland
@hakin9

Top Mentioned in G5:
@hansesecure
@rogue_kdc
@hakin9
@the_yellow_fall
@danielgallagher
@secjuice
@tinolle
@cybertoolsbooks
@bantu_tech
@jasonfossen

Top Mentioned in G6:
@hackthebox_eu
@_bl4de
@techradar
@hansesecure
@ai4business_it
@domenicoraguseo
@ahm3d_h3sham
@opengarages
@z3r0id
@shayshik

Top Mentioned in G7:
@three_cube
@guillaume_lpl
@alonso_reydes
@hakin9
@modisrecrutefr
@it_securitynews
@eccouncil
@dfirtraining
@aboutdfir
@dreamchaser_nfl

Top Mentioned in G8:
@peerlyst
@mattiacampagnan
@thedawidbalut
@rossjanderson
@limorelbaz
@belevgevgeny
@ahevia
@2wiredsecurity
@claushoumann
@j_opdenakker

Top Mentioned in G9:
@stephanenappo
@topcybernews
@reach2ratan
@thomas_harrer
@airbusc
@lepidesw
@wef
@frronconi
@cy
@heinzvhoenen

Top Mentioned in G10:
@infosecurity
@twitter
@checkpointsw
@youtube
@jack
@nwo_infosec
@f5security
@cygnacom
@helpnetsecurity
@bpschut

Top Tweeters
Top Tweeters in Entire Graph:
@arkangelscrap
@sectest9
@nosqldigest
@cybertoolsbooks
@webironbots
@evankirstel
@justiceoutcry
@techl0g
@gamergeeknews
@ericdemarylebon

Top Tweeters in G1:
@sectest9
@nosqldigest
@cybertoolsbooks
@webironbots
@evankirstel
@ericdemarylebon
@startupsbot
@chidambara09
@calcaware
@llacigart

Top Tweeters in G2:
@justiceoutcry
@villamizaritpro
@getajobusa
@superfabis
@buddahfan
@clairvoyant_the
@mrsyiswhy
@darrensproat
@thesoulfulemu
@emahmoudsoliman

Top Tweeters in G3:
@boingboing
@thewaywithanoa
@ceektechnology
@nerdpyle
@hackerfantastic
@divinetechygirl
@rtehrani
@pvynckier
@google
@hacks4pancakes

Top Tweeters in G4:
@crazythakare
@gu174r3d
@purrcival1
@tfujiwara86
@browndr
@sjalexander
@deepxp
@kensenjiha
@d34df0ol
@keny_show

Top Tweeters in G5:
@aaroncuddeback
@538355
@securityblog
@compuguy
@vandman777
@zerodaylab
@m3sm4r
@cyniclib
@secureslinger
@quttera

Top Tweeters in G6:
@medicalquack
@thenextweb
@ezralevant
@thinksnews
@jax_masters
@cleardiff
@techradar
@monkeysandmore
@jmacc
@h4z3dic

Top Tweeters in G7:
@it_securitynews
@kmontenegro
@morochosve
@jeandoobs
@securityaffairs
@sec_cyber
@pepsi7965
@youranonriots
@my_truth_today
@securitytoday

Top Tweeters in G8:
@kas_stoner
@buzzfeednews
@stevesilberman
@acoyne
@jack_daniel
@claushoumann
@geeknik
@shareblue
@reason
@propublica

Top Tweeters in G9:
@ideagov
@spirosmargaris
@wef
@nowthisnews
@craignewmark
@topcybernews
@pierrepinna
@mvollmer1
@technative
@reach2ratan

Top Tweeters in G10:
@roxann_minerals
@renanetjes
@albertspijkers
@pcmag
@bpschut
@theimeu
@nwo_infosec
@okogam
@helpnetsecurity
@hc4lifeab


We use necessary cookies to make our site work. We’d like to set additional cookies to understand site usage, make site improvements and to remember your settings. We also use cookies set by other sites to help deliver content from their services.