(Cyber Security) OR Cybersecurity, Twitter, 1/17/2023 7:41:13 AM, 288264


FAQ | Problem?

(Cyber Security) OR Cybersecurity_2023-01-16_23-30-00.xlsx
(Cyber Security) OR Cybersecurity_2023-01-16_23-30-00.xlsx
From:
NodeXLExcelAutomator
Uploaded on:
January 17, 2023
Short Description:
(Cyber Security) OR Cybersecurity via NodeXL https://bit.ly/3XmqQnt
@eli_krumova
@felixjo34588135
@elonmusk
@sectest9
@cybersecurityn8
@georgeicebek90
@twitter
@bowtiedcyber
@ucloudify
@benihacks

Top hashtags:
#cybersecurity
#infosec
#security
#100daysofcode
#ai

Description:
Description
The graph represents a network of 4,662 Twitter users whose recent tweets contained "(Cyber Security) OR Cybersecurity", or who were replied to, mentioned, retweeted or quoted in those tweets, taken from a data set limited to a maximum of 5,000 tweets, tweeted between 3/26/2006 12:00:00 AM and 1/16/2023 5:00:34 PM. The network was obtained from Twitter on Tuesday, 17 January 2023 at 07:36 UTC.

The tweets in the network were tweeted over the 3234-day, 16-hour, 28-minute period from Monday, 10 March 2014 at 08:31 UTC to Tuesday, 17 January 2023 at 01:00 UTC.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, an edge for each "retweet" relationship in a tweet, an edge for each "quote" relationship in a tweet, an edge for each "mention in retweet" relationship in a tweet, an edge for each "mention in reply-to" relationship in a tweet, an edge for each "mention in quote" relationship in a tweet, an edge for each "mention in quote reply-to" relationship in a tweet, and a self-loop edge for each tweet that is not from above.

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 4662
Unique Edges : 3441
Edges With Duplicates : 7546
Total Edges : 10987
Number of Edge Types : 8
Mentions : 1296
Retweet : 2317
MentionsInRetweet : 2917
Replies to : 665
MentionsInReplyTo : 1154
Tweet : 1988
Quote : 523
MentionsInQuote : 127
Self-Loops : 2427
Reciprocated Vertex Pair Ratio : 0.015245158632056
Reciprocated Edge Ratio : 0.0300324675324675
Connected Components : 1019
Single-Vertex Connected Components : 552
Maximum Vertices in a Connected Component : 2601
Maximum Edges in a Connected Component : 7994
Maximum Geodesic Distance (Diameter) : 17
Average Geodesic Distance : 6.402902
Graph Density : 0.00022678761146901
Modularity : 0.465329
NodeXL Version : 1.0.1.508
Data Import : The graph represents a network of 4,662 Twitter users whose recent tweets contained "(Cyber Security) OR Cybersecurity", or who were replied to, mentioned, retweeted or quoted in those tweets, taken from a data set limited to a maximum of 5,000 tweets, tweeted between 3/26/2006 12:00:00 AM and 1/16/2023 5:00:34 PM. The network was obtained from Twitter on Tuesday, 17 January 2023 at 07:36 UTC.

The tweets in the network were tweeted over the 3234-day, 16-hour, 28-minute period from Monday, 10 March 2014 at 08:31 UTC to Tuesday, 17 January 2023 at 01:00 UTC.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, an edge for each "retweet" relationship in a tweet, an edge for each "quote" relationship in a tweet, an edge for each "mention in retweet" relationship in a tweet, an edge for each "mention in reply-to" relationship in a tweet, an edge for each "mention in quote" relationship in a tweet, an edge for each "mention in quote reply-to" relationship in a tweet, and a self-loop edge for each tweet that is not from above.

Layout Algorithm : The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.
Graph Source : TwitterSearch2
Graph Term : (Cyber Security) OR Cybersecurity
Groups : The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.
Edge Color : Edge Weight
Edge Width : Edge Weight
Edge Alpha : Edge Weight
Vertex Radius : Betweenness Centrality

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[205] http://agram.com/cyber_recovery
[76] https://www.microsoft.com/security/blog/2021/12/08/new-research-shows-iot-and-ot-innovation-is-critical-to-business-but-comes-with-significant-risks/
[36] https://customers.microsoft.com/en-us/story/1412070689447388491-lhoist-manufacturing-defender-for-iot-security
[31] https://www.cyberark.com/resources/threat-research-blog/fantastic-rootkits-and-where-to-find-them-part-1
[31] https://instagram.com/josh_hack001/?igshid=YmMyMTA2M2Y=
[30] http://cyberiqs.com/latestnews
[21] https://skynettools.com/shells-a-script-for-generating-common-revshells-fast-easy/
[19] https://twinybots.ch/
[18] https://www.nusurtech.ca/2022/11/CyberSecurity.html?m=1
[18] https://www.nusurtech.ca/2022/11/CyberSecurity2.html

Top URLs in Tweet in G1:
[21] https://customers.microsoft.com/en-us/story/1412070689447388491-lhoist-manufacturing-defender-for-iot-security
[12] https://www.dailymail.co.uk/sciencetech/article-11641209/Cybersecurity-expert-reveals-warning-signs-hacked-webcam-smartphone.html
[6] https://www.forbes.com/sites/stewartroom/2023/01/16/europe-beefs-up-cybersecurity-law-trumping-the-uk/
[6] https://twinybots.ch/
[6] https://www.electricbrain.com.au/pages/analytics/realtime-graphs-of-stuff.php
[4] https://twitter.com/botdmtktwo/status/1591115908189417472/photo/1
[4] https://twitter.com/livreurdeweed5/status/1615077860103913490/photo/1
[4] https://twitter.com/livreurdeweed5/status/1615077930945904640/photo/1
[4] https://twitter.com/livreurdeweed5/status/1615077892089585670/photo/1
[4] https://www.bizjournals.com/kansascity/news/2022/10/01/why-your-business-could-be-denied-cybersecurity.html

Top URLs in Tweet in G2:
[30] http://cyberiqs.com/latestnews
[11] https://blogs.jpcert.or.jp/en/2023/01/cloud_malware_analysis.html
[8] https://twitter.com/CyberJamie/status/1615060566011220008/photo/1
[8] https://www.cio.com/article/419288/2-innovations-that-can-tip-the-balance-in-cybersecurity.html
[8] https://www.hackread.com/starting-cybersecurity-business/?utm_content=bufferada2c&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
[8] https://atomspam.com/
[8] https://infosec-jobs.com/job/22243-soc-analyst-l2/
[8] https://getpvaaccount.com/buy-edu-emails/
[7] https://www.infosecurity-magazine.com/news/russian-hackers-to-bypass-chatgpt/
[7] https://www.bleepingcomputer.com/news/security/vice-society-ransomware-leaks-university-of-duisburg-essen-s-data/

Top URLs in Tweet in G3:
[4] https://twitter.com/XxCL0UDxX1990/status/1615118009747574784/photo/1
[3] https://twitter.com/Summeryasia/status/1615086618993623040/photo/1
[2] https://twitter.com/JimmysaysYeah/status/1615113854937186310
[1] https://hitmarker.net/jobs/discord-security-software-engineer-intern-1812030
[1] https://hitmarker.net/jobs/discord-data-engineering-intern-1811981
[1] https://twitter.com/defiancemediatv/status/1612528256132997135/video/1
[1] https://twitter.com/izzyzorc19/status/1615121602190114817/photo/1
[1] https://twitter.com/CintrixKing/status/1615093886652751884/photo/1
[1] https://twitter.com/Foxeeeejeongin/status/1615111939125805056/photo/1
[1] https://twitter.com/Razerflash1/status/1615108608815165440/photo/1

Top URLs in Tweet in G4:
[205] http://agram.com/cyber_recovery
[3] https://twitter.com/itscassiecass/status/1615139896494022657/photo/1
[3] https://instagram.com/apexxrecoverytech
[3] https://instagram.com/jeffscott_hack
[2] https://twitter.com/nikoincognito/status/1614484207635517442
[2] https://twitter.com/teezyitainteazy/status/1567230943668350976
[2] https://twitter.com/TheSocialsScene/status/1612112235035492353/photo/1
[2] https://twitter.com/simonpeter0812/status/1614528987711127553/photo/1
[2] https://instagram.com/charlottehack1111/?igshid=YmMyMTA2M2Y=
[2] https://twitter.com/AlSultan_Meriam/status/1615110031237844994/photo/1

Top URLs in Tweet in G5:
[4] https://twitter.com/BaycNyc/status/1615063741569327104/photo/1
[2] https://twitter.com/White_Jae/status/1591215565469020160/photo/1
[2] https://twitter.com/White_Jae/status/1591211658680340480/photo/1
[1] https://twitter.com/thefirehood/status/1615147891097575425/photo/1
[1] https://twitter.com/Idonthavename06/status/1615146305491447808/photo/1
[1] https://twitter.com/gracelover712/status/1615149643540664321
[1] https://twitter.com/SamZanto/status/1614995093936803845
[1] https://twitter.com/jmrhyme1/status/1615143514685460481
[1] https://twitter.com/tallandfatt/status/1615147280658739200
[1] https://twitter.com/xtrosage/status/1615146827460005892

Top URLs in Tweet in G6:
[7] https://bowtiedcyber.substack.com
[5] https://bowtiedraptor.substack.com/p/start-here
[5] https://bowtiedraptor.substack.com/p/cybersecurity-and-data-science-converge
[2] https://tryhackme.com/why-subscribe
[1] https://tryhackme.com/room/pentestingfundamentals
[1] https://twitter.com/danielmakelley/status/1614240956559024132
[1] https://www.credly.com/badges/3a8870ef-3212-4b61-8148-dc1e47453ce6/twitter?t=roky8k
[1] https://startups.co.uk/startups-100/2023/hack-the-box/
[1] https://twitter.com/CyberOutlook/status/1613972248360259586
[1] https://www.cyberoutlook.org/post/top-cybersecurity-podcasts-to-keep-up-with-security-news-and-trends

Top URLs in Tweet in G7:
[31] https://instagram.com/josh_hack001/?igshid=YmMyMTA2M2Y=
[15] https://instagram.com/reid_cyber_security/
[3] https://www.progathers.com/regulation/
[2] http://ds3-bandwidth.com
[2] https://www.nccgroup.com/us/insights/?utm_source=IIoTWorldSocialMedia
[2] https://twitter.com/Lattey999/status/1613232341497040897
[2] https://twitter.com/ShinStar_WT/status/1614722706829905920/photo/1
[1] https://www.linkedin.com/posts/cisco_cybersecurity-risks-activity-7019151352245186560-qNPc?utm_source=share&utm_medium=member_ios
[1] https://www.marklynd.com/5-reasons-zero-trust/
[1] https://twitter.com/mclynd/status/1613636363110256665/photo/1

Top URLs in Tweet in G8:
[26] https://www.cyberark.com/resources/threat-research-blog/fantastic-rootkits-and-where-to-find-them-part-1
[15] https://skynettools.com/shells-a-script-for-generating-common-revshells-fast-easy/
[10] https://twitter.com/DailyDarkWeb/status/1615052793966129153/photo/1
[9] https://raw.githubusercontent.com/Orange-Cyberdefense/arsenal/master/mindmap/pentest_ad.png
[5] https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development?s=09
[4] https://twitter.com/0xor0ne/status/1615038730544218117/photo/1
[4] https://twitter.com/0xor0ne/status/1614706498097090560/photo/1
[3] https://www.comparitech.com/net-admin/subnetting-guide/
[3] https://foxutech.com/what-is-dns-and-how-it-works/
[3] https://twitter.com/0xor0ne/status/1613589181388701696/photo/1

Top URLs in Tweet in G9:
[12] https://www.mltut.com/best-math-courses-for-machine-learning/
[6] https://www.tomshardware.com/news/raspberry-pi-pico-powered-open-source-ebook-reader
[4] https://twitter.com/Eli_Krumova/status/1551558210959679489/photo/1
[4] https://verticalinsider.tradepub.com/free/w_bund20/prgm.cgi?a=1
[4] https://twitter.com/Eli_Krumova/status/1359491699811233799/photo/1
[4] https://twitter.com/Eli_Krumova/status/1565023615342596104/photo/1
[4] https://enterprivacy.com/2017/03/01/categories-of-personal-information/
[3] https://www.youtube.com/watch?v=KtKZVc0joYQ

[3] https://twitter.com/Eli_Krumova/status/1559179121816752129/photo/1
[3] https://twitter.com/HarbRimah/status/1506514847021912070

Top URLs in Tweet in G10:
[9] https://twitter.com/SecurityTrybe/status/1614987267633995781/photo/1
[3] https://fedvte.usalearning.gov/publiccourses/cyberessentials/index.htm?track=trackingon
[2] https://cloud.connect.isc2.org/CISSP-eBook-Fundamentals-Focus?utm_source=metatarget&utm_medium=email&utm_campaign=GBL-cisspfundamentalsinfocus&utm_term=dec6&utm_content=ebook
[2] https://www.cybersecurity-insiders.com/cuba-ransomware-gang-hacking-microsoft-exchange-servers/
[1] https://drive.google.com/drive/folders/1DqvFPxC3ROZgRndVYsfpX7C7Nqx1CnmL?usp=sharing
[1] https://twitter.com/SecurityTrybe/status/1615083760713891840/photo/1
[1] https://fedvte.usalearning.gov/publiccourses/IMR_cloud/index01.htm?track=trackingon
[1] https://fedvte.usalearning.gov/publiccourses/cloud2/cloudframe.php
[1] https://twitter.com/SecurityTrybe/status/1615083031127097355/photo/1
[1] https://twitter.com/SecurityTrybe/status/1614956803032317952/photo/1

Top Domains
Top Domains in Tweet in Entire Graph:
[1823] twitter.com
[205] agram.com
[122] microsoft.com
[97] paper.li
[62] instagram.com
[55] youtube.com
[49] bleepingcomputer.com
[45] medium.com
[42] co.uk
[39] nusurtech.ca

Top Domains in Tweet in G1:
[220] twitter.com
[24] microsoft.com
[22] paper.li
[20] co.uk
[15] google.com
[13] com.au
[12] linkedin.com
[11] hackthebox.com
[10] forbes.com
[8] t.me

Top Domains in Tweet in G2:
[322] twitter.com
[39] cyberfeed.io
[31] nationalcybersecurity.com
[30] cyberiqs.com
[29] infosec-jobs.com
[28] medium.com
[27] bleepingcomputer.com
[16] dr-farfar.com
[14] securityboulevard.com
[12] infosecurity-magazine.com

Top Domains in Tweet in G3:
[244] twitter.com
[2] hitmarker.net
[1] d.va
[1] somachar.us
[1] variety.com

Top Domains in Tweet in G4:
[266] twitter.com
[205] agram.com
[10] instagram.com
[2] tiktok.com
[1] whatsapp.com
[1] trib.al
[1] kwwl.com
[1] businessinsider.com
[1] musical.ly
[1] worldstar.com

Top Domains in Tweet in G5:
[54] twitter.com
[1] petitions.net
[1] reddit.com
[1] instagram.com
[1] nypost.com
[1] stupidpartyland.com
[1] twittertrails.com

Top Domains in Tweet in G6:
[18] substack.com
[8] twitter.com
[3] tryhackme.com
[3] nature.com
[2] cyberoutlook.org
[2] towardsdatascience.com
[2] securitymagazine.com
[2] hackthebox.com
[1] credly.com
[1] co.uk

Top Domains in Tweet in G7:
[48] twitter.com
[46] instagram.com
[6] youtube.com
[3] progathers.com
[2] linkedin.com
[2] ds3-bandwidth.com
[2] nccgroup.com
[2] iiot-world.com
[2] paper.li
[1] marklynd.com

Top Domains in Tweet in G8:
[46] twitter.com
[26] cyberark.com
[16] skynettools.com
[11] securecybersolution.com
[9] githubusercontent.com
[5] comparitech.com
[5] gitbook.io
[5] intezer.com
[4] github.io
[4] k3170makan.com

Top Domains in Tweet in G9:
[102] twitter.com
[16] youtube.com
[15] mltut.com
[6] tomshardware.com
[4] medium.com
[4] tradepub.com
[4] kdnuggets.com
[4] enterprivacy.com
[2] securityboulevard.com
[2] betterprogramming.pub

Top Domains in Tweet in G10:
[24] twitter.com
[6] cybersecurity-insiders.com
[5] usalearning.gov
[2] isc2.org
[2] wehackpurple.com
[1] google.com
[1] github.com
[1] youtube.com
[1] ow.ly
[1] or.jp

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[2478] cybersecurity
[876] infosec
[343] security
[332] 100daysofcode
[330] ai
[293] datascience
[285] hacking
[265] machinelearning
[248] pentesting
[238] tech



Top Hashtags in Tweet in G1:
[350] cybersecurity
[38] infosec
[34] security
[31] crypto
[27] ai
[22] technology
[19] tech
[18] cyber
[16] invest
[15] investment

Top Hashtags in Tweet in G2:
[1093] cybersecurity
[603] infosec
[242] 100daysofcode
[194] datascience
[186] pentesting
[170] hacking
[159] cloudsecurity
[151] machinelearning
[151] privacy
[149] oscp

Top Hashtags in Tweet in G3:
[3] cybersecurity
[2] lensaai
[1] hackers
[1] iphone
[1] android
[1] iwasntnaked
[1] bhfamily
[1] prohuman
[1] amazon
[1] silverlining

Top Hashtags in Tweet in G4:
[6] tiktok
[4] snapchat
[4] snapchatsupport
[3] banned
[2] viral
[2] the_webhack
[1] transwomenareconmen
[1] letwomenspeak
[1] twam
[1] deadbydaylgiht

Top Hashtags in Tweet in G5:
[12] cybersecurity
[11] web3trainer
[9] bigfacts
[8] jaethehybridwhite
[7] bitcoin
[5] mayc
[5] education
[4] blockchaintechnology
[4] blockchain
[4] nycbbyc

Top Hashtags in Tweet in G6:
[26] cybersecurity
[15] machinelearning
[11] 100daysofcode
[11] bigdata
[11] datascience
[9] 100daysofmlcode
[9] python
[9] flutter
[9] rstats
[9] devcommunity

Top Hashtags in Tweet in G7:
[29] cybersecurity
[10] security
[9] technology
[5] ai
[5] hacked
[4] iot
[4] wireless
[4] hacking
[3] infosec
[3] vr

Top Hashtags in Tweet in G8:
[99] cybersecurity
[94] infosec
[41] pentesting
[33] oscp
[28] malware
[27] windows
[26] rootkit
[18] informationsecurity
[17] pentest
[16] netsec

Top Hashtags in Tweet in G9:
[77] ai
[71] cybersecurity
[67] iot
[64] datascience
[62] machinelearning
[56] ml
[55] bigdata
[54] analytics
[49] 100daysofcode
[48] iiot

Top Hashtags in Tweet in G10:
[69] cybersecurity
[43] tech
[43] hacked
[43] hacking
[43] security
[42] infosec
[40] cyberattack
[21] community
[18] cyber
[16] cybersec

Top Words
Top Words in Tweet in Entire Graph:
[2479] #cybersecurity
[1555] security
[1258] account
[1232] cyber
[1088] cybersecurity
[876] #infosec
[581] expert
[572] professional
[567] dm
[547] help

Top Words in Tweet in G1:
[350] #cybersecurity
[236] cybersecurity
[163] security
[131] cyber
[69] more
[57] learn
[56] data
[47] 2023
[42] read
[38] #infosec

Top Words in Tweet in G2:
[1093] #cybersecurity
[603] #infosec
[242] #100daysofcode
[230] security
[198] dm
[194] #datascience
[186] #pentesting
[170] #hacking
[161] account
[159] #cloudsecurity

Top Words in Tweet in G3:
[483] account
[298] security
[297] instagram
[296] cyber
[295] expert
[294] send
[293] simply
[293] contact
[293] ig
[293] dm

Top Words in Tweet in G4:
[353] account
[273] help
[225] security
[221] cyber
[219] recovering
[219] professional
[214] good
[212] whatsapp
[212] hit
[211] expert

Top Words in Tweet in G5:
[124] account
[63] security
[59] cyber
[53] recovery
[52] help
[50] hacker
[48] recover
[37] elonmusk
[35] sure
[35] cozy_j7

Top Words in Tweet in G6:
[232] cybersecurity
[202] data
[166] science
[140] bowtiedcyber
[33] know
[32] job
[26] #cybersecurity
[25] need
[23] cyber
[23] career

Top Words in Tweet in G7:
[68] account
[61] cyber
[46] security
[38] hacked
[34] youtube
[32] won
[31] 854
[31] assist
[31] 639
[31] recovered

Top Words in Tweet in G8:
[99] #cybersecurity
[94] #infosec
[46] 0xor0ne
[41] #pentesting
[33] #oscp
[30] series
[30] intro
[28] #malware
[28] windows
[27] #c

Top Words in Tweet in G9:
[78] #ai
[72] #cybersecurity
[67] #iot
[64] #datascience
[63] #machinelearning
[59] eli_krumova
[57] #ml
[55] #bigdata
[54] #analytics
[49] #100daysofcode

Top Words in Tweet in G10:
[70] cybersecurity
[69] #cybersecurity
[67] securitytrybe
[43] #hacked
[43] #hacking
[43] #security
[43] #tech
[42] #infosec
[40] #cyberattack
[32] security

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[965] cyber,security
[532] security,expert
[506] professional,cyber
[500] account,professional
[334] send,dm
[321] #infosec,#cybersecurity
[292] retrieve,reactivate
[292] brian,j5
[292] instagram,retrieve
[292] simply,contact

Top Word Pairs in Tweet in G1:
[63] cyber,security
[24] learn,more
[22] iot,ot
[21] addressing,vulnerabilities
[21] ot,environment
[21] proactively,addressing
[21] customer,story
[21] learn,vital
[21] vulnerabilities,iot
[21] read,mfstsecurity

Top Word Pairs in Tweet in G2:
[243] #infosec,#cybersecurity
[149] #pentesting,#oscp
[122] #cybersecurity,#cybersecuritytips
[117] #cybersecuritytips,#pentesting
[102] #datasecurity,#privacy
[99] #cybersecurity,#infosec
[97] #oscp,#redteam
[95] #privacy,#100daysofcode
[84] #datascience,#datascientists
[81] #100daysofcode,#cloudsecurity

Top Word Pairs in Tweet in G3:
[296] cyber,security
[295] security,expert
[292] retrieve,reactivate
[292] brian,j5
[292] contact,brian
[292] simply,contact
[292] j5,instagram
[292] dm,ig
[292] expert,send
[292] professional,cyber

Top Word Pairs in Tweet in G4:
[221] cyber,security
[211] security,expert
[208] seek,help
[208] advise,seek
[208] reach,whatsapp
[207] professional,cyber
[207] reactivating,account
[207] good,recovering
[207] account,professional
[207] expert,hit

Top Word Pairs in Tweet in G5:
[58] cyber,security
[47] recover,account
[35] security,hacker
[35] sure,help
[32] help,recover
[32] fully,sure
[32] hacker,fully
[32] cozy_j7,ig
[25] support,team
[23] haven't,gotten

Top Word Pairs in Tweet in G6:
[163] data,science
[104] bowtiedcyber,cybersecurity
[81] science,cybersecurity
[80] science,data
[80] cybersecurity,data
[18] data,analytics
[16] cybersecurity,defense
[16] blue,team
[15] know,read
[15] read,data

Top Word Pairs in Tweet in G7:
[46] cyber,security
[31] whatsapp,639
[31] 639,854
[31] 854,1167
[31] recovered,reach
[31] assist,hit
[31] account,recovered
[31] hit,cyber
[31] reach,whatsapp
[31] won,assist

Top Word Pairs in Tweet in G8:
[38] #infosec,#cybersecurity
[33] #pentesting,#oscp
[30] intro,series
[30] #cybersecurity,#pentesting
[28] series,windows
[26] #malware,#windows
[26] cyberarklabs,#malware
[26] #rootkit,#infosec
[26] rootkits,internals
[26] internals,cyberarklabs

Top Word Pairs in Tweet in G9:
[43] #iot,#iiot
[34] #iiot,#iotpl
[33] #ai,#ml
[29] #bigdata,#analytics
[21] #analytics,#ai
[19] #ai,#machinelearning
[18] #programming,#coding
[16] #ml,#machinelearning
[16] #datascience,#bigdata
[15] #iot,#100daysofmlcode

Top Word Pairs in Tweet in G10:
[43] #hacked,#hacking
[18] #cybersecurity,#cyberattack
[18] #cyber,#security
[18] #tech,#infosec
[18] #infosec,#hacked
[18] vectors,#cybersecurity
[18] attack,vectors
[18] #hacking,#cyber
[18] cybersecurity,attack
[18] securitytrybe,cybersecurity

Top Replied-To
Top Replied-To in Entire Graph:
@snapchatsupport
@elonmusk
@bowtiedcyber
@digitalniit
@instagram
@snapchat
@tiktoksupport
@tiktok_us
@facebook
@perfectlyadnan

Top Replied-To in G1:
@addressintel

Top Replied-To in G2:
@pepsi_is_great
@hubnutvids
@bbctech
@ncsventurescorp
@rekcahcomics
@veeam
@deepakprab

Top Replied-To in G3:
@jksthv
@tiktoksupport
@1tules
@eddie_j_g
@adoswhiz
@the_weed_shop
@patpetterson2
@catlaw75
@microsofthelps
@discord

Top Replied-To in G4:
@snapchatsupport
@instagram
@snapchat
@tiktok_us
@tiktoksupport
@perfectlyadnan
@facebook
@whatsapp
@hasanthehun

Top Replied-To in G5:
@elonmusk
@stats_feed
@davidsacks
@camecoulove
@fanduel
@instagram
@cloakbrand
@ronaldd86530213
@snowgod635
@flavortowndon92

Top Replied-To in G6:
@bowtiedcyber
@hackinglz
@b_bonaventure_
@ralphyflex
@0bin_cyber
@miketalonnyc
@imposecost
@jsayushthakur

Top Replied-To in G7:
@youtube
@facebook
@rbx_coeptus
@gmail
@google
@comicsexplained
@bitzelyt
@nightmareloona
@maurice51132848
@nitajay_

Top Replied-To in G9:
@bostondynamics

Top Replied-To in G10:
@xymbiz
@hamadhady

Top Mentioned
Top Mentioned in Entire Graph:
@bowtiedcyber
@hackinarticles
@securitytrybe
@msftsecurity
@eli_krumova
@0xor0ne
@hackwithilaria
@hackwithgibson1
@dkeys_hacks

Top Mentioned in G1:
@oramcyberadvice
@kinlesen1
@a4etechnologies
@poseidontpa
@eksored
@futurumcareers
@dedicatedessays
@gocleared
@andres_btos

Top Mentioned in G2:
@hackinarticles
@hackwithilaria
@hackwithgibson1
@dkeys_hacks
@smartcodeteh77
@point2tech
@technative
@three_cube
@reach2ratan
@sophos

Top Mentioned in G3:
@twitter
@twittersupport
@uber
@discord
@joebiden
@iamtabithabrown
@defiancemediatv
@pokerstars
@elonmusk
@amrullahsaleh2

Top Mentioned in G4:
@instagram
@facebook
@snapchatsupport
@snapchat
@tiktok_us
@tiktoksupport
@aidspott
@jaspercods
@metaforbusiness

Top Mentioned in G5:
@elonmusk
@white_jae
@boredapeyc
@yugalabs
@scottadamssays
@machibigbrother
@baycnyc
@_shanicebest
@cz_binance
@creamdotfinance

Top Mentioned in G6:
@bowtiedcyber
@kevinclarity
@hackthebox_eu
@bowtied_raptor
@0bin_cyber
@realtryhackme
@delancecrockett
@danielmakelley
@bowtiedpussycat
@echoctf

Top Mentioned in G7:
@youtube
@teamyoutube
@shirastweet
@google
@paypal
@liyaraht
@fogoros
@m49d4ch3lly
@nydfs
@evankirstel

Top Mentioned in G8:
@0xor0ne
@cyberarklabs
@shubham_pen
@_cpresearch_
@skynettools
@dailydarkweb
@infoseccomm
@ptracesecurity
@thebinarybot
@_jenniferdavis1

Top Mentioned in G9:
@eli_krumova
@analytics_699
@sourabhskatoch
@tut_ml
@ingliguori
@harbrimah
@gp_pulipaka
@wef
@mvollmer1
@antgrasso

Top Mentioned in G10:
@securitytrybe
@notshenetworks
@wehackpurple
@ireteeh
@bowtiedcyber
@shehackspurple
@womencyberjutsu
@shubham_pen
@cyb_detective
@isc2

Top Tweeters
Top Tweeters in Entire Graph:
@amazonhelp
@pulpnews
@flipkartsupport
@sectest9
@uber_support
@teamyoutube
@chidambara09
@andyvermaut
@rk70534
@hrblock_21

Top Tweeters in G1:
@andyvermaut
@thedextazlab
@123trabajo
@postjobfree
@nwjs_jobs
@hillbeverlyhill
@fincalcaterra
@warriors_mom
@rutkowskidr
@stock_market_pr

Top Tweeters in G2:
@sectest9
@cybersecurityn8
@thehill
@rahul05ranjan
@dataaugmented
@periscopeislit
@royalmail
@andrewmorrisuk
@botstreamer
@fintechna

Top Tweeters in G3:
@amazonhelp
@flipkartsupport
@uber_support
@jot_au
@ola_supports
@discord
@microsofthelps
@lenubienne
@banjarbase
@joncoopertweets

Top Tweeters in G4:
@_kw_23
@snapchatsupport
@nytimes
@lamhfada
@omgstacks
@perfectlyadnan
@shanatic_nimra1
@alyssa_marchese
@morganesdiary
@nizaiah1221

Top Tweeters in G5:
@eahelp
@stillgray
@torontostar
@newstatesman
@fanduel
@gracelover712
@_shanicebest
@100dblockchain
@scottadamssays
@my_muslim

Top Tweeters in G6:
@kaykayhoops23
@deztheplug
@trayvonee
@lamarhefner
@munachim_
@qprovocateur
@richardkimphd
@innagtrey
@ronald_vanloon
@mirakulous_

Top Tweeters in G7:
@teamyoutube
@evankirstel
@askpaypal
@rwang0
@gmail
@google
@domingonarvaez1
@billmew
@jibako44
@cybersecboardrm

Top Tweeters in G8:
@ayirpelle
@sec_cyber
@take_gattcha
@alternative200
@precision_mats
@je6whx
@massar_gueye
@proxyqtr5
@jmacc
@8p1t1h

Top Tweeters in G9:
@reuters
@trippbraden
@kirkdborne
@eli_krumova
@mvollmer1
@ing_martin_v
@socialcurrencie
@haroldsinnott
@taranoland
@realrubberduck1

Top Tweeters in G10:
@ireteeh
@circuitswan
@defcon201nj
@chinaezurum
@xymbiz
@jmlaurio
@cybersecinsider
@shehackspurple
@thepuchiherald
@solchi_06


We use necessary cookies to make our site work. We’d like to set additional cookies to understand site usage, make site improvements and to remember your settings. We also use cookies set by other sites to help deliver content from their services.