#ransomware, Twitter, 10/21/2020 10:02:33 AM, 238389


FAQ | Problem?

#ransomware Twitter NodeXL SNA Map and Report for Wednesday, 21 October 2020 at 07:27 UTC
#ransomware Twitter NodeXL SNA Map and Report for Wednesday, 21 October 2020 at 07:27 UTC
From:
SMRFoundation
Uploaded on:
October 21, 2020
Short Description:
#ransomware via NodeXL https://bit.ly/2Hj04dW
@cybersecurityn8
@sectest9
@cybersec_feeds
@maltrakn
@identidadrobada
@thehackersnews
@cioamaro
@threatpost
@antoniosanzalc
@microsoftrtweet

Top hashtags:
#ransomware
#cybersecurity
#infosec
#malware
#cyberattack

Description:
Description
The graph represents a network of 6,017 Twitter users whose recent tweets contained "#ransomware", or who were replied to or mentioned in those tweets, taken from a data set limited to a maximum of 18,000 tweets. The network was obtained from Twitter on Wednesday, 21 October 2020 at 09:14 UTC.

The tweets in the network were tweeted over the 8-day, 3-hour, 38-minute period from Tuesday, 13 October 2020 at 03:45 UTC to Wednesday, 21 October 2020 at 07:24 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 6017
Unique Edges : 12883
Edges With Duplicates : 13824
Total Edges : 26707
Number of Edge Types : 5
Retweet : 11304
Tweet : 3779
MentionsInRetweet : 8754
Mentions : 2546
Replies to : 324
Self-Loops : 3966
Reciprocated Vertex Pair Ratio : 0.0264990053992612
Reciprocated Edge Ratio : 0.0516298705792788
Connected Components : 922
Single-Vertex Connected Components : 724
Maximum Vertices in a Connected Component : 4748
Maximum Edges in a Connected Component : 25243
Maximum Geodesic Distance (Diameter) : 10
Average Geodesic Distance : 3.719843
Graph Density : 0.000399162700363155
Modularity : 0.394728
NodeXL Version : 1.0.1.441
Data Import : The graph represents a network of 6,017 Twitter users whose recent tweets contained "#ransomware", or who were replied to or mentioned in those tweets, taken from a data set limited to a maximum of 18,000 tweets. The network was obtained from Twitter on Wednesday, 21 October 2020 at 09:14 UTC.

The tweets in the network were tweeted over the 8-day, 3-hour, 38-minute period from Tuesday, 13 October 2020 at 03:45 UTC to Wednesday, 21 October 2020 at 07:24 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

Layout Algorithm : The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.
Graph Source : TwitterSearch
Graph Term : #ransomware
Groups : The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.
Edge Color : Edge Weight
Edge Width : Edge Weight
Edge Alpha : Edge Weight
Vertex Radius : In-Degree

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[207] https://thehackernews.com/2020/10/fin11-hackers-spotted-using-new.html
[182] https://twinybots.ch/
[178] https://www.keepnetlabs.com/phishing-statistics-you-need-to-know-to-protect-your-organization/
[100] https://www.keepnetlabs.com/resources/weekly-cybersecurity-newsletter-no-139/
[84] https://threatpost.com/ransomware-network-access-cyberattack/159998/
[77] https://thedfirreport.com/2020/10/18/ryuk-in-5-hours/
[70] https://www.zdnet.com/article/ransomware-once-youve-been-hit-your-business-is-never-the-same-again/
[66] https://www.zdnet.com/article/ransomware-is-growing-here-are-four-ways-attackers-are-getting-into-your-systems/
[66] https://github.com/Neo23x0/Raccine#deploy-configuration-via-gpo
[65] https://thehackernews.com/2020/10/android-ransomware-lock.html

Top URLs in Tweet in G1:
[150] https://twinybots.ch/
[85] https://thehackernews.com/2020/10/fin11-hackers-spotted-using-new.html
[60] https://www.keepnetlabs.com/phishing-statistics-you-need-to-know-to-protect-your-organization/
[45] https://cisa.gov/publication/cyber-essentials-toolkits
[44] https://www.keepnetlabs.com/resources/weekly-cybersecurity-newsletter-no-139/
[43] https://threatpost.com/ransomware-network-access-cyberattack/159998/
[42] https://www.zdnet.com/article/ransomware-once-youve-been-hit-your-business-is-never-the-same-again/
[40] https://www.zdnet.com/article/ransomware-is-growing-here-are-four-ways-attackers-are-getting-into-your-systems/
[36] https://www.zdnet.com/article/this-major-criminal-hacking-group-just-switched-to-ransomware-attacks/
[34] http://www.passwordcoach.com/isolated-browsing-the-only-guaranteed-protection-against-ransomware-and-webborne-malware

Top URLs in Tweet in G2:
[10] https://twinybots.ch/
[7] https://thehackernews.com/2020/10/fin11-hackers-spotted-using-new.html
[6] https://www.iot-now.com/2020/10/12/105355-iot-specialist-software-ag-hit-by-23mn-ransomware-attack-accessing-staff-data/
[5] https://threatpost.com/ransomware-network-access-cyberattack/159998/
[5] https://www.bleepingcomputer.com/news/security/crytek-hit-by-egregor-ransomware-ubisoft-data-leaked/
[4] https://www.secplicity.org/2020/10/05/zerologon/
[4] https://www.bbc.co.uk/news/business-53769728
[4] https://www.forbes.com/sites/forbestechcouncil/2020/03/03/three-important-information-security-predictions-for-2020/#33009b803269
[4] https://www.zdnet.com/article/ransomware-is-growing-here-are-four-ways-attackers-are-getting-into-your-systems/
[4] https://threatpost.com/carnival-corp-ransomware-attack-cruise/160134/

Top URLs in Tweet in G3:
[111] https://www.keepnetlabs.com/phishing-statistics-you-need-to-know-to-protect-your-organization/
[40] https://www.keepnetlabs.com/resources/weekly-cybersecurity-newsletter-no-139/
[28] https://www.cisecurity.org/blog/why-consider-a-career-in-cybersecurity/
[26] https://www.forbes.com/sites/forbestechcouncil/2020/10/13/ransomware-in-2020-four-things-you-can-do/
[26] https://www.wired.com/story/ddos-extortion-hacking-fancy-bear-lazarus-group/
[26] https://www.keepnetlabs.com/the-biggest-data-breaches-in-the-first-half-of-2020/
[25] https://thehackernews.com/2020/10/fin11-hackers-spotted-using-new.html
[24] https://threatpost.com/software-ag-data-clop-ransomware/160042/
[24] https://www.keepnetlabs.com/anti-phishing-solution-threat-simulation-2/
[22] https://www.keepnetlabs.com/cyber-safety-rules-phishing-training/

Top URLs in Tweet in G4:
[60] https://github.com/Neo23x0/Raccine#deploy-configuration-via-gpo
[31] https://github.com/k-vitali/Malware-Misc-RE/blob/master/2020-10-15-ragnarok-ransomware-config.vk.raw
[23] https://www.advanced-intel.com/post/front-door-into-bazarbackdoor-stealthy-cybercrime-weapon
[23] https://www.virustotal.com/gui/file/8f3e348f82ac6bf97d85cfbadb61b3c489c3f9b3921769abbdb9df779d26ac4d/
[21] https://thedfirreport.com/2020/10/18/ryuk-in-5-hours/
[17] https://securityaffairs.co/wordpress/109471/security/g7-concern-ransomware-attacks.html
[13] https://github.com/manyfacedllama/amsi-tracer
[11] https://www.difesaesicurezza.com/cyber/cybercrime-i-dati-di-luxottica-pubblicati-sul-darkweb-dal-gruppo-nefilim/
[11] https://www.bleepingcomputer.com/news/security/crytek-hit-by-egregor-ransomware-ubisoft-data-leaked/
[9] https://twitter.com/TheDFIRReport/status/1317976355271856133

Top URLs in Tweet in G5:
[58] http://r.socialstudio.radian6.com/c8b66e7d-5b11-4660-9b6a-5d8e7053d561
[50] http://r.socialstudio.radian6.com/21844a55-daf1-4e94-9193-67170e33133f
[46] http://r.socialstudio.radian6.com/b59f748c-0c8b-4c5c-8c39-f4068e3cd425
[20] https://metallic.io/blog/bridging-the-gap-keeping-ransomware-attackers-at-bay
[14] https://www.keepnetlabs.com/resources/weekly-cybersecurity-newsletter-no-139/
[8] https://www.zdnet.com/article/ransomware-is-growing-here-are-four-ways-attackers-are-getting-into-your-systems/
[8] https://www.keepnetlabs.com/phishing-protection-4-phishing-protection-tool/
[8] https://www.keepnetlabs.com/cyber-safety-rules-phishing-training/
[8] http://r.socialstudio.radian6.com/71a78329-5373-4bac-84f7-f2b39d5f260f
[7] http://www.network-midlands.co.uk/avoid-ransomware-attacks-10-tips/

Top URLs in Tweet in G6:
[45] https://www.cybermalveillance.gouv.fr/tous-nos-contenus/fiches-reflexes/rancongiciels-ransomwares
[33] https://www.nolimitsecu.fr/ransomware-retour-d-experience-sur-une-compromission/
[27] https://www.wavestone.com?wavestone_i18n=global_en&path=%2Finsight%2Fcyberattack-france-situation-on-the-ground%2F&keepbanner=1
[25] https://www.zataz.com/le-ransomware-darkside-fait-des-dons-aux-oeuvres-caritatives/
[11] https://www.lemagit.fr/actualites/252490609/Ransomware-Egregor-revendique-le-vol-du-code-source-de-Watch-Dogs-Legion
[10] https://twitter.com/les_assises/status/1316349132810915841
[9] https://www.zdnet.com/article/ransomware-operators-buy-network-access-from-the-underground-to-speed-up-infection/?ftag=COS-05-10aaa0g&taid=5f855785eb88060001841b51&utm_campaign=trueAnthem%3A+Trending+Content&utm_medium=trueAnthem&utm_source=twitter
[9] https://www.kaspersky.com/blog/wastedlocker-garmin-incident/36626/?utm_source=twitter&utm_medium=social&utm_campaign=uk_kdaily_db0077&utm_content=sm-post&utm_term=uk_twitter_organic_3l8fbrzfwp00u77
[8] https://techmonitor.ai/cybersecurity/ransomware-sanctions-treasury
[7] https://www.lemagit.fr/actualites/252490416/Ransomware-Cl0p-refait-parler-de-lui-en-frappant-Software-AG

Top URLs in Tweet in G7:
[79] https://thehackernews.com/2020/10/fin11-hackers-spotted-using-new.html
[25] https://thehackernews.com/2020/10/android-ransomware-lock.html
[13] https://www.entrepreneur.com/article/286467?utm_source=upper-link.com
[7] https://www.hackread.com/cyber-security-firms-dismantle-trickbot-ransomware-botnet/
[7] https://coruzant.com/security/covid-19-the-driver-behind-ransomware-attacks-in-2020/
[6] https://krebsonsecurity.com/2020/10/microsoft-uses-copyright-law-to-disrupt-trickbot-botnet/
[5] https://www.ediworld.mx/webinar-thales-03-09-20/
[5] https://incyberdefense.com/daily-brief/microsoft-attempts-takedown-of-global-criminal-botnet/
[5] https://blogs.microsoft.com/on-the-issues/2020/10/12/trickbot-ransomware-cyberthreat-us-elections/
[4] https://www.awerty.net/blog/blindar-empresa-virus-malware/

Top URLs in Tweet in G8:
[16] https://thedfirreport.com/2020/10/18/ryuk-in-5-hours/
[15] https://www.abc.es/tecnologia/redes/abci-visto-directivos-llorando-literalmente-haber-perdido-archivos-ciberataque-202010160136_noticia.html
[8] https://www.businessinsider.es/intermediar-ciberdelincuentes-nuevo-controvertido-negocio-736765
[8] https://empresas.blogthinkbig.com/pagar-cuando-infectas-ransomware-demasiados-grises/
[7] https://www.pwc.co.uk/issues/cyber-security-services/insights/responding-to-growing-human-operated-ransomware-attacks-threat.html
[6] https://elpais.com/tecnologia/2020-10-12/la-desactivacion-de-un-celebre-malware-aspira-a-reducir-los-ataques-de-ransomware-globales.html?outputType=amp&ssm=TW_CM_TEC&utm_source=Twitter&__twitter_impression=true
[5] https://twitter.com/smoothimpact/status/1316353367153745921
[5] https://www.abc.es/tecnologia/redes/abci-visto-directivos-llorando-literalmente-haber-perdido-archivos-ciberataque-202010160136_noticia_amp.html?__twitter_impression=true
[5] https://blog.underc0de.org/microsoft-advierte-sobre-una-nueva-variedad-de-ransomware-movil/
[4] https://www.redeszone.net/noticias/seguridad/errores-seguridad-empresas-ransomware/

Top URLs in Tweet in G9:
[27] https://twitter.com/identidadrobada/status/1315995635141705730
[3] https://latam.kaspersky.com/blog/wastedlocker-garmin-incident/19791/?utm_source=facebook&utm_medium=social&utm_campaign=mx_blogposts_hd0137&utm_content=sm-post&utm_term=mx_facebook_organic_os137ja2rigvy7f
[2] https://latam.kaspersky.com/blog/lazarus-vhd-ransomware/19773/?utm_source=facebook&utm_medium=social&utm_campaign=mx_blogposts_hd0137&utm_content=sm-post&utm_term=mx_facebook_organic_6q7pvcr137j2vl1
[2] https://www.prensariotila.com/30761-Kaspersky-5000-ataques-de-ransomware-diarios.note.aspx
[2] https://www.prensariotila.com/30648-SonicWall-nuevas-soluciones-de-seguridad-para-el-teletrabajo-.note.aspx
[2] https://noransom.kaspersky.com/br/
[2] https://www.trendmicro.com/vinfo/us/security/research-and-analysis/threat-reports/roundup/securing-the-pandemic-disrupted-workplace-trend-micro-2020-midyear-cybersecurity-report?utm_source=trendmicroresearch&utm_medium=smk&utm_campaign=0820_1H2020
[1] https://www.consumotic.mx/tecnologia/mexico-segundo-lugar-en-ataques-ransomware-en-al/
[1] https://www.keepnetlabs.com/anti-phishing-solution-threat-simulation-2/
[1] https://www.prensariotila.com/30735-Y-si-no-pago-el-Ransomware.note.aspx

Top URLs in Tweet in G10:
[15] https://drive.google.com/file/d/1MI8Z2tBhmqQ5X8Wf_ozv3dVjz5sJOs-3/view?usp=sharing
[11] https://twitter.com/PixelettetechUK/status/1317507367060242435
[8] https://www.cnet.com/news/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election/
[7] https://cynation.com/double-extortion-ransomware-is-taking-organisations-by-surprise/
[5] https://dataconnectors.com/
[4] https://www.cisomag.com/
[4] https://www.helpnetsecurity.com/2020/10/06/cybersecurity-practices-are-becoming-more-formal/?utm_content=bufferf9763&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
[4] https://www.forbes.com.mx/el-secuestro-de-datos-afectara-a-una-empresa-cada-11-segundos-a-partir-de-2021/
[4] https://www.zdnet.com/article/ransomware-is-growing-here-are-four-ways-attackers-are-getting-into-your-systems/
[3] https://www.helpnetsecurity.com/2020/10/15/web-application-security-efforts/?utm_content=buffer913f3&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer

Top Domains
Top Domains in Tweet in Entire Graph:
[611] zdnet.com
[589] twitter.com
[589] keepnetlabs.com
[481] threatpost.com
[447] linkedin.com
[319] thehackernews.com
[262] bleepingcomputer.com
[254] radian6.com
[243] infosecurity-magazine.com
[213] securityaffairs.co

Top Domains in Tweet in G1:
[343] zdnet.com
[279] linkedin.com
[253] twitter.com
[225] keepnetlabs.com
[201] threatpost.com
[166] bleepingcomputer.com
[150] twinybots.ch
[147] thehackernews.com
[144] csoonline.com
[129] darkreading.com

Top Domains in Tweet in G2:
[60] linkedin.com
[60] fortinet.com
[37] purestorage.com
[28] zdnet.com
[27] twitter.com
[19] bleepingcomputer.com
[18] co.uk
[14] youtube.com
[12] commvault.com
[11] threatpost.com

Top Domains in Tweet in G3:
[306] keepnetlabs.com
[167] threatpost.com
[128] zdnet.com
[92] infosecurity-magazine.com
[76] forbes.com
[74] twitter.com
[65] techrepublic.com
[54] securityaffairs.co
[42] helpnetsecurity.com
[39] thehackernews.com

Top Domains in Tweet in G4:
[123] github.com
[67] virustotal.com
[40] securityaffairs.co
[29] twitter.com
[25] thedfirreport.com
[24] threatpost.com
[23] advanced-intel.com
[21] blogspot.com
[19] bleepingcomputer.com
[17] pastebin.com

Top Domains in Tweet in G5:
[176] radian6.com
[77] purestorage.com
[47] keepnetlabs.com
[43] zdnet.com
[34] commvault.com
[32] metallic.io
[23] twitter.com
[16] soundcloud.com
[16] rubrik.com
[15] linkedin.com

Top Domains in Tweet in G6:
[45] gouv.fr
[33] nolimitsecu.fr
[32] lemagit.fr
[28] zataz.com
[27] wavestone.com
[27] twitter.com
[25] kaspersky.com
[20] zdnet.com
[11] techmonitor.ai
[6] youtube.com

Top Domains in Tweet in G7:
[106] thehackernews.com
[28] threatpost.com
[15] ehcgroup.io
[15] entrepreneur.com
[12] twitter.com
[11] co.uk
[10] microsoft.com
[9] indiatimes.com
[8] pcnova.es
[7] infosecurity-magazine.com

Top Domains in Tweet in G8:
[20] abc.es
[16] thedfirreport.com
[14] twitter.com
[11] blogthinkbig.com
[10] co.uk
[8] businessinsider.es
[6] securitymagazine.com
[6] elpais.com
[5] microsoft.com
[5] underc0de.org

Top Domains in Tweet in G9:
[27] twitter.com
[7] kaspersky.com
[5] prensariotila.com
[2] trendmicro.com
[1] consumotic.mx
[1] keepnetlabs.com
[1] bleepingcomputer.com
[1] thehackernews.com

Top Domains in Tweet in G10:
[15] google.com
[13] twitter.com
[11] voicestorm.com
[10] helpnetsecurity.com
[9] zdnet.com
[8] cnet.com
[8] linkedin.com
[8] youtube.com
[7] cynation.com
[5] dataconnectors.com

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[15366] ransomware
[7969] cybersecurity
[4294] infosec
[3299] malware
[2416] cyberattack
[1986] cybercrime
[1982] phishing
[1981] hacking
[1658] tech
[1601] technology



Top Hashtags in Tweet in G1:
[6730] ransomware
[4176] cybersecurity
[1983] malware
[1921] infosec
[1094] cyberattack
[979] cybercrime
[940] phishing
[819] hacking
[706] security
[620] hackers

Top Hashtags in Tweet in G2:
[858] ransomware
[136] cybersecurity
[57] fortiguardlabs
[36] infosec
[36] security
[34] malware
[33] becybersmart
[32] phishing
[30] cyberattack
[28] cybercrime

Top Hashtags in Tweet in G3:
[2785] ransomware
[2238] cybersecurity
[1682] infosec
[891] cyberattack
[788] tech
[778] hacking
[752] cybercrime
[720] technology
[688] hackers
[659] malware

Top Hashtags in Tweet in G4:
[703] ransomware
[86] cybersecurity
[72] malware
[69] infosec
[61] emotet
[54] ryuk
[53] hacking
[48] cobaltstrike
[36] securityaffairs
[35] nefilim

Top Hashtags in Tweet in G5:
[782] ransomware
[257] cybersecurity
[100] backup
[79] security
[76] dataprotection
[75] infosec
[73] gdpr
[73] data
[70] cloud
[65] technology

Top Hashtags in Tweet in G6:
[325] ransomware
[88] cybermois
[48] cybersecurity
[47] rançongiciel
[45] rançon
[45] ecsm
[45] chantage
[45] piratage
[41] cybersécurité
[34] cybersecurite

Top Hashtags in Tweet in G7:
[406] ransomware
[203] cybersecurity
[185] microsoft
[125] infosec
[112] malware
[59] android
[39] cybercrime
[39] security
[37] ciberseguridad
[34] trickbot

Top Hashtags in Tweet in G8:
[252] ransomware
[46] ciberseguridad
[21] internet
[16] tecnología
[15] cybersecurity
[13] trickbot
[8] data
[8] malware
[7] botnet
[7] infosec

Top Hashtags in Tweet in G9:
[221] ransomware
[45] klsec
[5] infosec
[5] security
[5] network
[4] cybersecurity
[4] malware
[4] phishing
[4] tech
[4] technology

Top Hashtags in Tweet in G10:
[394] ransomware
[280] cybersecurity
[261] infosec
[250] cyberattack
[250] malware
[243] phishing
[235] cyberwarning
[231] threat
[224] tech
[218] hacking

Top Words
Top Words in Tweet in Entire Graph:
[16694] #ransomware
[9170] #cybersecurity
[5092] #infosec
[4162] #malware
[3408] ransomware
[2863] #cyberattack
[2698] #hacking
[2637] #phishing
[2615] #cybercrime
[2145] #tech

Top Words in Tweet in G1:
[7527] #ransomware
[4895] #cybersecurity
[2531] #malware
[2350] #infosec
[1735] ransomware
[1376] #cyberattack
[1330] #cybercrime
[1277] #phishing
[1185] #hacking
[1058] #security

Top Words in Tweet in G2:
[858] #ransomware
[183] ransomware
[153] attacks
[136] #cybersecurity
[110] attack
[77] data
[76] more
[71] using
[70] files
[68] learn

Top Words in Tweet in G3:
[3167] #ransomware
[2621] #cybersecurity
[2009] #infosec
[1058] #hacking
[1034] #cyberattack
[1009] #tech
[974] #cybercrime
[922] #malware
[911] #technology
[829] #phishing

Top Words in Tweet in G4:
[712] #ransomware
[225] 10
[103] sample
[103] gt
[100] txt
[100] extension
[97] ransomware
[96] files
[91] config
[86] #cybersecurity

Top Words in Tweet in G5:
[793] #ransomware
[297] #cybersecurity
[197] attacks
[181] attack
[149] more
[142] data
[115] #security
[109] #gdpr
[102] help
[100] #backup

Top Words in Tweet in G6:
[351] #ransomware
[88] #cybermois
[68] attaque
[65] face
[58] cyber
[56] faire
[54] crises
[49] victime
[49] œuvres
[49] caritatives

Top Words in Tweet in G7:
[422] #ransomware
[208] #cybersecurity
[194] #microsoft
[128] #infosec
[121] attacks
[119] #malware
[100] read
[96] details
[84] fin11
[82] hackers

Top Words in Tweet in G8:
[254] #ransomware
[76] tienes
[75] bien
[62] tú
[60] sabes
[60] dentro
[60] grupo
[60] progresar
[60] pq
[60] bastionado

Top Words in Tweet in G9:
[221] #ransomware
[146] video
[123] ransomware
[123] cómo
[121] interpol
[120] archivos
[120] ver
[119] seguramente
[119] escuchaste
[119] leíste

Top Words in Tweet in G10:
[420] #ransomware
[299] #cybersecurity
[271] #infosec
[271] #malware
[266] #cyberattack
[262] #phishing
[251] #cyberwarning
[247] #threat
[245] #tech
[238] #spyware

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[1740] #malware,#ransomware
[1406] #infosec,#cybersecurity
[1098] #cybersecurity,#cyberattack
[943] #cyberwarning,#phishing
[927] #ransomware,#cyberwarning
[920] #ransomware,attacks
[907] #cyberattack,#hacking
[904] #tech,#technology
[881] #phishing,#spyware
[871] #hacking,#privacy

Top Word Pairs in Tweet in G1:
[966] #malware,#ransomware
[555] #infosec,#cybersecurity
[425] #cybersecurity,#cyberattack
[392] #ransomware,#cybersecurity
[367] #ransomware,attacks
[362] #cybersecurity,#infosec
[351] #cybersecurity,#ransomware
[345] #security,#cybersecurity
[335] #cyberattack,#hacking
[335] #ransomware,#cyberwarning

Top Word Pairs in Tweet in G2:
[103] #ransomware,attacks
[58] weeks,ago
[57] eking,variant
[57] variant,phobos
[56] ago,#fortiguardlabs
[56] #fortiguardlabs,captured
[56] captured,#ransomware
[56] #ransomware,sample
[56] sample,ms
[56] ms,word

Top Word Pairs in Tweet in G3:
[442] #infosec,#cyberthreats
[432] #malware,#ransomware
[425] #infosec,#cybersecurity
[421] #hackers,#darkweb
[421] #darkweb,#databreaches
[421] #databreaches,#cybercrime
[421] #cybercrime,#cybersec
[421] #cybersec,#threatintel
[416] #threatintel,#dataprivacy
[416] #dataprivacy,#cyberintelligence

Top Word Pairs in Tweet in G4:
[60] raccine,10
[60] 10,simple
[60] simple,#ransomware
[60] #ransomware,#emotet
[60] #emotet,protection
[60] protection,support
[60] support,config
[60] config,gpo
[60] gpo,johnlatwc
[60] johnlatwc,adml

Top Word Pairs in Tweet in G5:
[140] #ransomware,attack
[105] #ransomware,attacks
[68] against,#ransomware
[61] backup,data
[59] 14,seconds
[58] attack,14
[58] seconds,cybercriminals
[58] cybercriminals,aggressively
[58] aggressively,targeting
[58] targeting,backup

Top Word Pairs in Tweet in G6:
[49] œuvres,caritatives
[47] faire,face
[45] #cybermois,votre
[45] votre,ordinateur
[45] ordinateur,soudainement
[45] soudainement,bloqué
[45] bloqué,demande
[45] demande,payer
[45] payer,#rançon
[45] #rançon,récupérer

Top Word Pairs in Tweet in G7:
[106] #ransomware,attacks
[103] #infosec,#cybersecurity
[93] read,details
[93] details,#infosec
[82] #cybersecurity,#malware
[79] widespread,#ransomware
[78] fin11,hackers
[78] hackers,spotted
[78] spotted,using
[77] watch,fin11

Top Word Pairs in Tweet in G8:
[60] tú,sabes
[60] sabes,tienes
[60] tienes,dentro
[60] dentro,grupo
[60] grupo,#ransomware
[60] #ransomware,progresar
[60] progresar,pq
[60] pq,bastionado
[57] bastionado,bien
[57] bien,están

Top Word Pairs in Tweet in G9:
[119] seguramente,escuchaste
[119] escuchaste,leíste
[119] leíste,algo
[119] algo,ransomware
[119] ransomware,secuestro
[119] secuestro,archivos
[119] archivos,fines
[119] fines,extorsivos
[119] extorsivos,nunca
[119] nunca,viste

Top Word Pairs in Tweet in G10:
[257] #malware,#ransomware
[255] #infosec,#cybersecurity
[251] #cybersecurity,#cyberattack
[247] #ransomware,#cyberwarning
[245] #cyberwarning,#phishing
[234] #phishing,#spyware
[224] #tech,#technology
[223] #hacking,#privacy
[222] #cyberattack,#hacking
[220] #spyware,#tech

Top Replied-To
Top Replied-To in Entire Graph:
@ezat_dayeh
@rab1928
@dez_blanchfield
@microsoft
@globalcyberalln
@computerweekly
@kaspersky
@malwrhunterteam
@attacksolutions
@luxottica

Top Replied-To in G1:
@rab1928
@globalcyberalln
@computerweekly
@microsoft
@ezat_dayeh
@thehackersnews
@sophos
@kaspersky
@searchsecurity
@attacksolutions

Top Replied-To in G3:
@dez_blanchfield
@attacksolutions
@computerweekly
@tripwireinc
@ezat_dayeh
@iotforall
@drjdrooghaag
@ncsventures
@archonsec
@passwordcoach

Top Replied-To in G4:
@luxottica
@malwrhunterteam
@mrtlgu
@guelfoweb
@siri_urz
@kangxiaopao
@mariaramosuk
@mandiant
@malwarepatrol
@hatching_io

Top Replied-To in G5:
@ezat_dayeh
@dez_blanchfield
@ubisoft
@laninfotech
@nytimes
@rubrikinc
@google
@softwareag
@garmin
@keolisboston

Top Replied-To in G6:
@ahcybsec
@globalcyberalln

Top Replied-To in G8:
@microsoft
@lawwait
@javiercao
@espinosavelarde
@vgv_ti
@dannyallan5
@softwareag

Top Replied-To in G10:
@lumutech

Top Mentioned
Top Mentioned in Entire Graph:
@ingliguori
@antgrasso
@pvynckier
@aghiathchbib
@robmay70
@zdnet
@digitalcloudgal
@avrohomg
@mclynd
@archonsec

Top Mentioned in G1:
@ingliguori
@zdnet
@csoonline
@cioamaro
@dynamicciso
@antgrasso
@cisagov
@searchsecurity
@pvynckier
@aghiathchbib

Top Mentioned in G2:
@techzinebe
@h3xi0t
@larlegal
@koddosnet
@consultoresxp

Top Mentioned in G3:
@ingliguori
@antgrasso
@aghiathchbib
@pvynckier
@robmay70
@digitalcloudgal
@avrohomg
@mclynd
@shirastweet
@archonsec

Top Mentioned in G4:
@johnlatwc
@lordofthepies4
@malwrhunterteam
@bleepincomputer
@amigo_a_
@demonslay335
@lawrenceabrams
@fbussoletti
@inteladvanced
@arturodicorinto

Top Mentioned in G5:
@zdnet
@metallic_io
@commvault
@purestorage
@azure
@andriven
@purerludeman
@archanatweets
@mnair1
@securityhit

Top Mentioned in G6:
@les_assises
@edgtslfcbngq6sk
@nicochan33
@wavestone_
@rldi_lamy
@georgewillems1
@bviseeon
@siddharthks
@baski_la
@shicooks

Top Mentioned in G7:
@thehackersnews
@mayumiflores7
@hackread
@threatpost
@ledgerops
@vectra_ai
@sofiaszm
@cyberedgegroup
@securitynewsbot
@arstechnica

Top Mentioned in G8:
@microsoft
@lawwait
@abc_tecnologia
@ssantosv
@veeam
@biespana
@android
@rickvanover
@smoothimpact
@xataka

Top Mentioned in G9:
@kasperskylatino
@spontiroli
@arabsanet
@kaspersky
@sonicwall
@sonicwalllatam
@enfasys
@cioamaro
@licenciasonline
@bleepincomputer

Top Mentioned in G10:
@cioamaro
@forbes_mexico
@ionut_ilascu
@bleepincomputer
@ondrejkrehel
@techrepublic
@lumutech
@thecyberwire
@inc42
@ciasecure

Top Tweeters
Top Tweeters in Entire Graph:
@sectest9
@sirajs0l
@threadreaderapp
@sahelhkj
@robre62
@chidambara09
@cybersec_feeds
@jondknight
@bitcoinagile
@evankirstel

Top Tweeters in G1:
@sectest9
@sirajs0l
@cybersec_feeds
@bitcoinagile
@evankirstel
@iam__network
@femtech_
@schestowitz
@thehill
@evanderburg

Top Tweeters in G2:
@blodico
@bewickwren
@jmgrande
@crypto__mak
@pcdue
@thedarkpixel
@hebergementwebs
@jandrusk
@onmanorama
@idtheftscout

Top Tweeters in G3:
@rvp
@swissbusiness
@santchiweb
@fintechna
@calcaware
@v_shakthi
@amazingchevvolt
@andrewmorrisuk
@agedchild003
@ssxman2

Top Tweeters in G4:
@20minutes
@rf_jenkins
@youranonriots
@snowdarkz
@chahali
@giuliog
@securityaffairs
@rejectionking
@andre3verzaal
@reseterant

Top Tweeters in G5:
@chidambara09
@lelkan
@nytimes
@wtop
@debraruh
@zdnet
@spirosmargaris
@dez_blanchfield
@mattliptak
@altbot4

Top Tweeters in G6:
@billnigh
@le_parisien
@huwsayer
@thegrugq
@playmogeek
@rldi_lamy
@lesguer_lionel
@silentseawolf
@metropulseusa
@mdrechsler

Top Tweeters in G7:
@joshollegien
@barbiewithatude
@ryushiahnam
@livemint
@cnn
@carlesdijous
@agsb_bilbao
@pdeppisch
@dpl_news
@idrobinhood

Top Tweeters in G8:
@threadreaderapp
@cnet
@la_ser
@trabajareuropa
@pagilchrist
@xataka
@luisg16
@avalos_morer
@tfujiwara86
@infogon

Top Tweeters in G9:
@aramh4ck
@lady_fabi
@margaritavela
@peterkrasno
@argielau
@alb3rtochoa
@estebanlib
@monoarania
@payitoweb
@goomez

Top Tweeters in G10:
@sudeepkhatri
@codernotesbot
@xaelbot
@codedailybot
@codegnuts
@nlognbot
@vesperuk
@merckxcycling
@ml_tweet_bot
@forbes_mexico


Tags:

We use necessary cookies to make our site work. We’d like to set additional cookies to understand site usage, make site improvements and to remember your settings. We also use cookies set by other sites to help deliver content from their services.