(Cyber Security) OR Cybersecurity, Twitter, 2/7/2023 7:43:20 AM, 288780


FAQ | Problem?

(Cyber Security) OR Cybersecurity_2023-02-06_23-30-00.xlsx
(Cyber Security) OR Cybersecurity_2023-02-06_23-30-00.xlsx
From:
NodeXLExcelAutomator
Uploaded on:
February 07, 2023
Short Description:
(Cyber Security) OR Cybersecurity via NodeXL https://bit.ly/3I2g80h
@eli_krumova
@cybersecurityn8
@twitter
@sectest9
@elonmusk
@securitytrybe
@hackinarticles
@navauriel311
@sofia_verga003
@merson_johnson

Top hashtags:
#cybersecurity
#infosec
#ai
#datascience

Description:
Description
The graph represents a network of 4,493 Twitter users whose recent tweets contained "(Cyber Security) OR Cybersecurity", or who were replied to, mentioned, retweeted or quoted in those tweets, taken from a data set limited to a maximum of 5,000 tweets, tweeted between 3/26/2006 12:00:00 AM and 2/6/2023 5:00:35 PM. The network was obtained from Twitter on Tuesday, 07 February 2023 at 07:36 UTC.

The tweets in the network were tweeted over the 2219-day, 3-hour, 26-minute period from Monday, 09 January 2017 at 21:34 UTC to Tuesday, 07 February 2023 at 01:00 UTC.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, an edge for each "retweet" relationship in a tweet, an edge for each "quote" relationship in a tweet, an edge for each "mention in retweet" relationship in a tweet, an edge for each "mention in reply-to" relationship in a tweet, an edge for each "mention in quote" relationship in a tweet, an edge for each "mention in quote reply-to" relationship in a tweet, and a self-loop edge for each tweet that is not from above.

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 4493
Unique Edges : 3076
Edges With Duplicates : 8097
Total Edges : 11173
Number of Edge Types : 9
MentionsInRetweet : 3216
MentionsInQuote : 165
Mentions : 1110
Retweet : 2573
Quote : 221
Tweet : 2018
Replies to : 685
MentionsInReplyTo : 1181
MentionsInQuoteReply : 4
Self-Loops : 2423
Reciprocated Vertex Pair Ratio : 0.016030373338958
Reciprocated Edge Ratio : 0.0315549096948308
Connected Components : 1062
Single-Vertex Connected Components : 572
Maximum Vertices in a Connected Component : 2151
Maximum Edges in a Connected Component : 7558
Maximum Geodesic Distance (Diameter) : 14
Average Geodesic Distance : 5.752727
Graph Density : 0.000238671454695827
Modularity : 0.447351
NodeXL Version : 1.0.1.510
Data Import : The graph represents a network of 4,493 Twitter users whose recent tweets contained "(Cyber Security) OR Cybersecurity", or who were replied to, mentioned, retweeted or quoted in those tweets, taken from a data set limited to a maximum of 5,000 tweets, tweeted between 3/26/2006 12:00:00 AM and 2/6/2023 5:00:35 PM. The network was obtained from Twitter on Tuesday, 07 February 2023 at 07:36 UTC.

The tweets in the network were tweeted over the 2219-day, 3-hour, 26-minute period from Monday, 09 January 2017 at 21:34 UTC to Tuesday, 07 February 2023 at 01:00 UTC.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, an edge for each "retweet" relationship in a tweet, an edge for each "quote" relationship in a tweet, an edge for each "mention in retweet" relationship in a tweet, an edge for each "mention in reply-to" relationship in a tweet, an edge for each "mention in quote" relationship in a tweet, an edge for each "mention in quote reply-to" relationship in a tweet, and a self-loop edge for each tweet that is not from above.

Layout Algorithm : The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.
Graph Source : TwitterSearch2
Graph Term : (Cyber Security) OR Cybersecurity
Groups : The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.
Edge Color : Edge Weight
Edge Width : Edge Weight
Edge Alpha : Edge Weight
Vertex Radius : Betweenness Centrality

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[47] https://www.youtube.com/watch?v=kj8IfmcY6Nc&feature=youtu.be

[34] https://instagram.com/cyber_mass_recovery/?igshid=YmMyMTA2M2Y=
[33] https://instagram.com/andreas_tech1/
[17] https://idov31.github.io/2022/07/14/lord-of-the-ring0-p1.html
[17] https://gist.github.com/yassineaboukir/8e12adefbd505ef704674ad6ad48743d
[17] https://fcw.com/security/2023/01/fcc-rule-would-require-telecom-providers-immediately-disclose-sensitive-data-breaches/381651/
[14] https://twitter.com/BowTiedCyber/status/1622668511934914582/photo/1
[8] https://justthenews.com/politics-policy/cybersecurity/monus-tech-giants-funding-chinas-race-supremacy-ai-battlefield-future?utm_medium=social_media&utm_source=twitter_social_icon&utm_campaign=social_icons
[8] https://instagram.com/mass_coder_fix/?igshid=YmMyMTA2M2Y=
[7] https://github.com/TalEliyahu/awesome-security-newsletters

Top URLs in Tweet in G1:
[16] https://fcw.com/security/2023/01/fcc-rule-would-require-telecom-providers-immediately-disclose-sensitive-data-breaches/381651/
[4] https://twitter.com/CyberSecurityCC/status/1622746383751979008/photo/1
[3] https://www.forbes.com/sites/petersuciu/2023/02/06/the-top-us-cybersecurity-diplomats-personal-twitter-account-was-hacked/
[2] https://dellyranks.com/cybersecurity-startup-firecompass-raises-7-million-in-early-stage-funding/?feed_id=305530&_unique_id=63e19ff6dab25
[2] https://twitter.com/8020lawyer/status/1622704735747801095/photo/1
[2] https://securityaffairs.com/141889/cyber-crime/experts-warn-esxi-ransomware-attacks.html
[2] https://www.infosecurity-magazine.com/blogs/chatgpt-wave-cybersecurity-concerns/
[2] https://reprints2.forrester.com/#/assets/2/108/RES176400/report
[2] https://pditechnologies.com/blog/2023-cybersecurity-trends/
[2] https://www.malwarebytes.com/blog/news/2023/02/financials-are-facing-an-unprecedented-number-of-cybersecurity-threats?utm_source=dlvr.it&utm_medium=twitter

Top URLs in Tweet in G2:
[2] https://hacklido.com/blog/278-the-key-components-of-the-iso-27001-framework
[2] https://hacklido.com/blog/279
[2] https://cybersecuritynews.com/secure-your-ci-cd-pipeline/
[2] https://www.helpnetsecurity.com/2023/02/07/u2opia-ornl-technologies/
[2] https://getpvaaccount.com/buy-edu-emails/
[2] https://www.wbrc.com/2023/02/05/birmingham-medical-practice-informs-patients-security-breach/
[2] https://www.jpost.com/breaking-news/article-730673
[2] https://www.threatshub.org/blog/massive-ransomware-attack-targets-vmware-esxi-servers-worldwide/
[2] https://paper.li/CloudReputation/1415403704?share_id=22b00240-a678-11ed-9506-fa163eed9ef2
[2] https://twitter.com/CoryKennedy/status/1622705840791715845/photo/1

Top URLs in Tweet in G3:
[34] https://instagram.com/cyber_mass_recovery/?igshid=YmMyMTA2M2Y=
[8] https://instagram.com/mass_coder_fix/?igshid=YmMyMTA2M2Y=
[5] https://instagram.com/cyber_mass_rec
[2] https://twitter.com/Weslieweski/status/1622715139865673735
[1] https://www.facebook.com/brindleposse/?mibextid=LQQJ4d
[1] https://twitter.com/CBucks3242/status/1622747728907304963/photo/1
[1] https://twitter.com/priteshpatel9/status/1622700944717742263/photo/1
[1] https://twitter.com/abdallh_kritm/status/1622736457302528001/photo/1
[1] https://twitter.com/ylecun/status/1622300311573651458
[1] https://twitter.com/LauraJo45459016/status/1622706258678620161

Top URLs in Tweet in G4:
[2] https://www.intel.co.uk/content/www/uk/en/business/enterprise-computers/resources/how-to-guide-intel-vpro-ema-amt.html?wapkw=vpro%20battery%20life&cid=iosm&source=twitter&campid=2022_uk_always_on_social_content&content=100003062253283&icid=ccg-commercial-vpro-campaign&linkId=100000122930340
[2] https://venturebeat.com/security/getting-results-from-your-zero-trust-initiatives-in-2023/
[2] https://twitter.com/Nickieyey/status/1622630539936268288/photo/1
[2] https://www.altcash.co.uk/?q=content/cryptocurrency-games
[2] https://usaonlineservice.com/product/buy-yelp-reviews/
[1] https://twitter.com/Eli_Krumova/status/1531737655276453896/photo/1
[1] https://twitter.com/IntelUK/status/1524026536390803456
[1] https://twitter.com/Eli_Krumova/status/1521182638303760384/photo/1
[1] https://twitter.com/AllanOluchiri/status/1408810751993786373
[1] https://twitter.com/Eli_Krumova/status/1621591228843270147

Top URLs in Tweet in G5:
[3] https://twitter.com/SecurityTrybe/status/1617535162140721152/photo/1
[2] https://twitter.com/TheDgtalEmpress/status/1622708669283532812/video/1
[2] http://nevonprojects.com
[1] https://ec.europa.eu/digital-single-market/en/news/eu105-million-eu-funding-available-projects-stepping-eus-cybersecurity-capabilities-and
[1] https://twitter.com/CoffeTechnology/status/1622730384155807746/photo/1
[1] https://github.com/TalEliyahu/awesome-security-newsletters
[1] https://twitter.com/NandanLohitaksh/status/1622537585020252160/photo/1
[1] https://twitter.com/TheDgtalEmpress/status/1622729462654681092/video/1
[1] https://straightblast.medium.com/my-poc-walkthrough-for-cve-2021-21974-a266bcad14b9
[1] https://www.fosstechnix.com/

Top URLs in Tweet in G6:
[17] https://gist.github.com/yassineaboukir/8e12adefbd505ef704674ad6ad48743d
[16] https://idov31.github.io/2022/07/14/lord-of-the-ring0-p1.html
[6] https://github.com/TalEliyahu/awesome-security-newsletters
[6] https://twitter.com/NandanLohitaksh/status/1622537585020252160/photo/1
[4] https://www.qualys.com/2021/01/26/cve-2021-3156/baron-samedit-heap-based-overflow-sudo.txt
[4] https://www.kalmarunionen.dk/writeups/sudo/
[4] https://twitter.com/ptracesecurity/status/1622701817120403457/photo/1
[2] https://github.com/A-poc/BlueTeam-Tools
[2] https://www.fosstechnix.com/
[2] https://straightblast.medium.com/my-poc-walkthrough-for-cve-2021-21974-a266bcad14b9

Top URLs in Tweet in G7:
[6] https://cyberstartupobservatory.com/cyber-security-observatory/
[3] https://www.fosstechnix.com/
[2] https://github.com/CMEPW/BypassAV
[2] https://github.com/Ignitetechnologies/Mindmap/tree/main/Owasp
[2] https://community.ui.com/questions/Ubiquiti-Cybersecurity-team-announces-changes-related-to-the-security-of-our-products-and-services/dc719a82-cb77-4894-9d8f-d62d507b9bc3
[1] https://twitter.com/hackinarticles/status/1622210907240816640/photo/1
[1] https://twitter.com/MaiteOrtegaCSO/status/1622688706854375426/photo/1
[1] https://hakin9.org/improper-error-handling-penetration-testing-owasp-top-10-vulnerabilities-free-course-content/
[1] https://github.com/Ignitetechnologies/Mindmap/tree/main/Privacy%20Tools
[1] https://twitter.com/EveryDayOnMyWay/status/1622718298935754759/photo/1

Top URLs in Tweet in G9:
[2] https://www.washingtonpost.com/politics/2023/02/06/how-cisa-plans-get-tech-firms-bake-security-into-their-products/
[2] https://www.darkreading.com/cloud/global-ransomware-attack-vmware-exsi-hypervisors-continues-to-spread
[1] https://www.foreignaffairs.com/articles/united-states/2021-12-07/hacking-cybersecurity-keeping-wrong-secrets?utm_medium=social
[1] https://twitter.com/ForeignAffairs/status/1622603292508291074
[1] https://channel969.com/all-you-need-to-know-to-get-them/
[1] https://thecyberwire.com/stories/9f4329667cf149908d3b36d1ed95faf7/new-ransomware-exploits-vmware-esxi-vulnerability
[1] https://www.linkedin.com/posts/the-cyber-security-hub_gartner-predictions-2025-activity-7028459002824904705-uJas?utm_source=share&utm_medium=member_ios
[1] https://www.armis.com/blog/ransomware-attack-targets-vmware-esxi-servers-worldwide/
[1] https://www.bleepingcomputer.com/news/security/linux-version-of-royal-ransomware-targets-vmware-esxi-servers/#.Y-EJ1bOnmKU.twitter
[1] https://twitter.com/ForeignAffairs/status/1621143428016017408

Top URLs in Tweet in G10:
[47] https://www.youtube.com/watch?v=kj8IfmcY6Nc&feature=youtu.be


Top Domains
Top Domains in Tweet in Entire Graph:
[1463] twitter.com
[145] youtube.com
[106] instagram.com
[90] github.com
[71] paper.li
[60] cyberiqs.com
[52] medium.com
[50] adzuna.com
[41] github.io
[39] linkedin.com

Top Domains in Tweet in G1:
[256] twitter.com
[26] fcw.com
[19] linkedin.com
[13] paper.li
[12] google.com
[11] securecybersolution.com
[9] com.au
[9] co.uk
[7] jdsupra.com
[6] medium.com

Top Domains in Tweet in G2:
[241] twitter.com
[60] cyberiqs.com
[25] medium.com
[20] thehackernews.com
[18] virustotal.com
[17] infosec-jobs.com
[15] dr-farfar.com
[15] csoonline.com
[15] urlscan.io
[14] scmagazine.com

Top Domains in Tweet in G3:
[218] twitter.com
[52] instagram.com
[1] facebook.com
[1] safety.google
[1] youtube.com
[1] thekingslife.com
[1] t.me
[1] washingtonpost.com

Top Domains in Tweet in G4:
[116] twitter.com
[21] youtube.com
[8] venturebeat.com
[7] netscout.com
[7] sentinelone.com
[6] iiot-world.com
[5] mltut.com
[5] grnh.se
[4] betterprogramming.pub
[4] co.uk

Top Domains in Tweet in G5:
[32] twitter.com
[5] netacad.com
[5] nevonprojects.com
[4] tryhackme.com
[3] voicestorm.com
[2] venturebeat.com
[2] utilitydive.com
[2] fosstechnix.com
[2] cyberjobcentral.com
[2] github.com

Top Domains in Tweet in G6:
[76] twitter.com
[60] github.com
[35] github.io
[15] qualys.com
[14] kalmarunionen.dk
[11] medium.com
[4] microsoft.com
[3] gitlab.io
[2] securityzines.com
[2] substack.com

Top Domains in Tweet in G7:
[34] twitter.com
[17] cyberstartupobservatory.com
[9] github.com
[7] hakin9.org
[6] fosstechnix.com
[5] nextgov.com
[4] hackers-arise.com
[3] hackingarticles.in
[3] paper.li
[2] microsoft.com

Top Domains in Tweet in G8:
[7] twitter.com
[1] medium.com

Top Domains in Tweet in G9:
[40] twitter.com
[20] channel969.com
[8] darkreading.com
[4] washingtonpost.com
[4] foreignaffairs.com
[3] whitehouse.gov
[3] jpost.com
[2] usajobs.gov
[2] bleepingcomputer.com
[2] cisa.gov

Top Domains in Tweet in G10:
[92] youtube.com
[1] twitter.com

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[2457] cybersecurity
[943] infosec
[341] ai
[333] datascience
[312] 100daysofcode
[303] python
[286] security
[267] bigdata
[250] hacking
[249] pentesting



Top Hashtags in Tweet in G1:
[368] cybersecurity
[40] infosec
[31] ransomware
[26] wireless
[26] ai
[22] crypto
[22] hacking
[21] security
[20] threatintel
[18] cyber

Top Hashtags in Tweet in G2:
[967] cybersecurity
[546] infosec
[238] 100daysofcode
[217] datascience
[185] python
[174] bigdata
[163] ransomware
[159] linux
[145] malware
[145] hacking

Top Hashtags in Tweet in G3:
[35] cyber_mass_recovery
[3] كلنا_حساب_المصحف
[2] smart_tech080
[2] ai
[2] meta
[2] openai
[2] elon
[2] virtualreality
[2] metaverse
[2] artificialintelligence

Top Hashtags in Tweet in G4:
[201] cybersecurity
[112] ai
[91] datascience
[86] machinelearning
[80] iiot
[80] python
[80] iot
[65] bigdata
[60] 100daysofcode
[59] tech

Top Hashtags in Tweet in G5:
[77] cybersecurity
[35] infosec
[26] hacking
[24] tech
[18] hacked
[17] cyberattack
[17] python
[16] cybersec
[16] programming
[15] coding

Top Hashtags in Tweet in G6:
[79] cybersecurity
[70] infosec
[49] bugbounty
[44] pentesting
[25] informationsecurity
[22] hacking
[20] bugbountytips
[19] datasecurity
[19] cybersec
[11] linux

Top Hashtags in Tweet in G7:
[170] cybersecurity
[112] infosec
[98] cybersecuritytips
[91] pentesting
[84] oscp
[81] redteam
[80] informationsecurity
[52] cissp
[50] cybersecurite
[17] bugbounty

Top Hashtags in Tweet in G8:
[2] scam
[2] coredao
[2] crypto
[1] cryptotoast
[1] getthatbread
[1] pissedthefuckoff
[1] wtf
[1] ens
[1] stolen
[1] cracked

Top Hashtags in Tweet in G9:
[58] cybersecurity
[26] seo
[26] google
[26] apple
[26] ios
[24] robotics
[23] ai
[7] ransomware
[7] cyberattack
[4] security

Top Words
Top Words in Tweet in Entire Graph:
[2457] #cybersecurity
[1341] security
[1141] cybersecurity
[1140] cyber
[943] #infosec
[730] account
[596] help
[442] dm
[410] instagram
[410] expert

Top Words in Tweet in G1:
[368] #cybersecurity
[226] cybersecurity
[173] security
[124] cyber
[75] data
[63] 2023
[58] more
[57] ransomware
[56] federal
[50] learn

Top Words in Tweet in G2:
[967] #cybersecurity
[546] #infosec
[270] dm
[238] #100daysofcode
[217] #datascience
[188] recovery
[185] #python
[174] #bigdata
[167] hacking
[163] #ransomware

Top Words in Tweet in G3:
[390] account
[286] instagram
[271] help
[264] cyber
[262] security
[240] expert
[197] professional
[163] ig
[148] send
[147] back

Top Words in Tweet in G4:
[201] #cybersecurity
[112] #ai
[91] #datascience
[86] #machinelearning
[81] #iot
[80] #python
[80] #iiot
[71] eli_krumova
[65] #bigdata
[60] #100daysofcode

Top Words in Tweet in G5:
[115] cybersecurity
[85] securitytrybe
[77] #cybersecurity
[65] free
[52] learn
[50] 2023
[49] platforms
[35] #infosec
[33] thread
[29] preparing

Top Words in Tweet in G6:
[79] #cybersecurity
[70] #infosec
[67] part
[54] 0xor0ne
[49] #bugbounty
[47] collection
[44] #pentesting
[43] kernel
[37] team
[37] tools

Top Words in Tweet in G7:
[170] #cybersecurity
[112] #infosec
[98] #cybersecuritytips
[91] #pentesting
[84] #oscp
[81] #redteam
[80] #informationsecurity
[76] hackinarticles
[58] attack
[52] #cissp

Top Words in Tweet in G8:
[58] write
[58] security
[57] recently
[57] directed
[57] talk
[57] expert
[57] cyber
[57] user
[57] awful
[56] evidence

Top Words in Tweet in G9:
[69] cybersecurity
[58] #cybersecurity
[48] cyber
[31] attacks
[26] #seo
[26] #ios
[26] #apple
[26] #google
[25] nation
[24] energy

Top Words in Tweet in G10:
[92] friends
[92] show
[92] retweet
[92] tag
[92] video
[92] giveaway
[92] security
[92] cyber
[92] support
[92] m4a4

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[799] cyber,security
[384] security,expert
[366] #infosec,#cybersecurity
[289] professional,cyber
[225] expert,hit
[170] #pentesting,#oscp
[164] account,professional
[153] #cybersecurity,#cybersecuritytips
[145] seek,help
[145] reactivating,account

Top Word Pairs in Tweet in G1:
[61] cyber,security
[27] data,here's
[26] proprietary,network
[26] telecom,orgs
[26] here's,mean
[26] require,telecom
[26] proposed,rule
[26] orgs,immediately
[26] mean,#cybersecurity
[26] federal,agencies

Top Word Pairs in Tweet in G2:
[160] #infosec,#cybersecurity
[91] #datascience,#datascientists
[89] #infosec,#infosecurity
[88] #malware,#ransomware
[83] #infosecurity,#cybersecurity
[81] #cybersecurity,#hacker
[80] #python,#coding
[79] #cybersecurity,#threatintel
[74] #hacker,#infosec
[74] #100daysofcode,#programming

Top Word Pairs in Tweet in G3:
[262] cyber,security
[226] security,expert
[197] professional,cyber
[133] expert,hit
[118] send,dm
[88] acct,fixed
[87] back,professional
[87] fixed,back
[86] instagram,help
[82] simply,reach

Top Word Pairs in Tweet in G4:
[47] #iot,#iiot
[40] #iiot,#iotpl
[38] #bigdata,#analytics
[32] #ai,#ml
[31] #analytics,#ai
[28] #iotpl,#iotcl
[24] #python,#rstats
[24] #machinelearning,#datascience
[23] #machinelearning,#ml
[23] #cybersecurity,#bigdata

Top Word Pairs in Tweet in G5:
[49] cybersecurity,2023
[49] platforms,learn
[49] learn,cybersecurity
[49] 2023,free
[48] securitytrybe,platforms
[29] preparing,cybersecurity
[29] cybersecurity,entry
[29] interview,thread
[29] entry,level
[29] level,interview

Top Word Pairs in Tweet in G6:
[38] #infosec,#cybersecurity
[34] part,part
[33] development,credits
[33] team,tools
[33] introduction,windows
[33] tools,development
[33] idov31,part
[33] drivers,red
[33] red,team
[33] credits,idov31

Top Word Pairs in Tweet in G7:
[93] #infosec,#cybersecurity
[89] #cybersecurity,#cybersecuritytips
[86] #cybersecuritytips,#pentesting
[84] #pentesting,#oscp
[77] #oscp,#redteam
[72] #redteam,#informationsecurity
[52] #informationsecurity,#cissp
[50] #cybersecurity,#cybersecurite
[50] touchscreen,#cybersecurity
[50] scrolling,attack

Top Word Pairs in Tweet in G8:
[57] talk,cyber
[57] cyber,security
[57] expert,user
[57] security,expert
[57] recently,directed
[57] directed,talk
[56] write,evidence
[50] awful,scammed
[49] wisdom_eth,write
[49] user,wisdom_eth

Top Word Pairs in Tweet in G9:
[26] #ios,#cybersecurity
[26] #google,#apple
[26] #apple,#ios
[26] #seo,#google
[24] #cybersecurity,#robotics
[22] #robotics,#ai
[16] cyber,attacks
[11] cyber,threats
[10] ransomware,attack
[10] leadership,act

Top Word Pairs in Tweet in G10:
[92] support,video
[92] security,giveaway
[92] cyber,security
[92] tag,friends
[92] giveaway,retweet
[92] m4a4,cyber
[92] friends,show
[92] retweet,tag
[92] show,support
[91] lepajeecsgo,m4a4

Top Replied-To
Top Replied-To in Entire Graph:
@boydclewis
@facebook
@teamyoutube
@instagram
@elonmusk
@tidefoundation
@timothepng
@uber_support
@securitytrybe
@shorterin_urmom

Top Replied-To in G2:
@tidefoundation
@palazzo_chigi
@trupulse
@flysoulfree
@franklin_graham
@officeoftheciso
@chuckdbrooks
@maxthatpadi
@investingbff
@easymillion_co

Top Replied-To in G3:
@facebook
@teamyoutube
@instagram
@elonmusk
@timothepng
@uber_support
@twittersupport
@discord
@jonthadon10
@smileysweed

Top Replied-To in G4:
@khulood_almani
@robmay70
@sallyeaves
@mvollmer1
@inteligenca4

Top Replied-To in G5:
@securitytrybe
@tityosatya
@ameermuminin

Top Replied-To in G7:
@hackinarticles

Top Replied-To in G8:
@bokchoybabynft
@swervortrades
@asad_alam7
@sharkeysharks
@libovski5
@ephrum
@toastpunk
@aryanyt_nft
@vicendraws
@nftmakima

Top Replied-To in G9:
@cisagov

Top Mentioned
Top Mentioned in Entire Graph:
@hackinarticles
@securitytrybe
@lepajeecsgo
@eli_krumova
@0xor0ne
@beboxos
@bowtiedcyber
@wisdom_eth
@joneshacksit
@idov31

Top Mentioned in G1:
@researchguru6
@complyapplyjobs
@gocloudwave
@poseidontpa
@vincema1951
@brand9couk
@newsconsumerbot
@info_sec_buzz
@activ8te_
@academicsaplus

Top Mentioned in G2:
@joneshacksit
@experthac_gary1
@hackinarticles
@feltech03
@technative
@cyberiqs_
@reach2ratan
@hackwithniklas
@eugenioromar
@noladefense

Top Mentioned in G3:
@osheyrecovery
@facebook
@elonmusk
@twittersupport
@instagram
@meta
@twitter
@uber_support
@teamyoutube
@sama

Top Mentioned in G4:
@eli_krumova
@sourabhskatoch
@sheraj99
@kred
@avrohomg
@khulood_almani
@iotchannel
@iotcommunity
@cybersecboardrm
@netscout

Top Mentioned in G5:
@securitytrybe
@ireteeh
@cristinamolendi
@hackinarticles
@alonso_reydes
@savetonotion
@securityaffairs
@realtryhackme
@khalilapriday
@davidbombal

Top Mentioned in G6:
@0xor0ne
@idov31
@mah3sec
@nandanlohitaksh
@shubham_pen
@ptracesecurity
@cyberk9x
@hackinarticles
@sansforensics
@marcvlp

Top Mentioned in G7:
@hackinarticles
@beboxos
@jmonteagudoe
@three_cube
@cybersecob
@hakin9
@owasp
@atomspam
@smersh_sec
@nextgov

Top Mentioned in G8:
@wisdom_eth
@ethan_eth01
@opensea
@pepe_kd
@ether
@visionofviii
@cvalley_
@spiritether
@terra_money
@coinlist

Top Mentioned in G9:
@cisagov
@cisajen
@jerusalem_post
@repdeborahross
@channel969
@darkreading
@repericsorensen
@repmikecarey
@potus
@tracylfox

Top Mentioned in G10:
@lepajeecsgo

Top Tweeters
Top Tweeters in Entire Graph:
@amazonhelp
@sectest9
@xboxsupport
@uber_support
@teamyoutube
@chidambara09
@tradermarcocost
@atviassist
@cybersecurityn8
@javascriptd

Top Tweeters in G1:
@netsecu
@miragenewscom
@322ahsiws
@suriyasubraman
@newsworldpress
@bizcommunityit
@fincalcaterra
@joviannfeed
@pcexpander
@sec_cyber

Top Tweeters in G2:
@sectest9
@cybersecurityn8
@rahul05ranjan
@timesofindia
@youranonriots
@andrewmorrisuk
@frcretweets
@tmobile
@laveilletechno
@fullnam35087976

Top Tweeters in G3:
@amazonhelp
@xboxsupport
@uber_support
@teamyoutube
@atviassist
@eahelp
@riotsupport
@snapchatsupport
@zerohedge
@discord

Top Tweeters in G4:
@chidambara09
@evankirstel
@100daysof2020
@jamesvgingerich
@arealhumanname1
@nicochan33
@trippbraden
@ajblackston
@akwyz
@ilovebooks786

Top Tweeters in G5:
@savetonotion
@t0rir0t
@pythonbot_by_pm
@securityaffairs
@robertosignore7
@fvtsqk7bvto6viv
@thedgtalempress
@titzbiltz
@cdwgwagov
@ireteeh

Top Tweeters in G6:
@securityblog
@rodtrent
@take_gattcha
@mariang1979
@1nf0s3cpt
@good_sector
@howtopam
@crypto___baby
@richard_s81
@iquechocosa

Top Tweeters in G7:
@deenie7940
@adam_it_
@01larryj
@uchuukaeru
@sacred__shadow
@three_cube
@nextgov
@chinaezurum
@er_wanchu
@el_tio_chus

Top Tweeters in G8:
@instacart
@demshenanigans
@ravers
@bo_________t
@shillin_villian
@ryancarson
@binancehelpdesk
@amber_vittoria
@ganartnft
@elixir_activity

Top Tweeters in G9:
@all435reps
@annoula64
@stlhd100
@mefbama
@mig30m6
@buckleyswartz
@keller_lind
@jerusalem_post
@valurank
@warriors_mom

Top Tweeters in G10:
@mihaiender
@aammaarrp
@piyaniko52
@knight5514
@deltacraft17
@lorranstz
@tomytenu
@russeras7
@blastyyyyyy
@matheus66198002