NodeXL Graph Gallery: Interactive Graph


Donate to the Social Media Research Foundation's NodeXL development fund

(Cyber Security) OR Cybersecurity_2021-03-29_23-24-56.xlsx (experimental version)
NOTE: This version of the graph is not available with the browser you are using. A more recent version of the browser is required.
Zoom in Zoom out Reset the graph
Go to the graph's main page

From:
NodeXLExcelAutomator
Uploaded on:
March 30, 2021
Short Description:
(Cyber Security) OR Cybersecurity via NodeXL https://bit.ly/3cx6Aur
@botcybersec
@kylegriffin1
@three_cube
@antonweye
@hostinfonet
@cybersecurityn8
@sectest9
@curiouschinwag
@paula_piccard
@hugolowell

Top hashtags:
#cybersecurity
#infosec
#python
#security

Description:
Description
The graph represents a network of 4,928 Twitter users whose tweets in the requested range contained "(Cyber Security) OR Cybersecurity", or who were replied to or mentioned in those tweets. The network was obtained from the NodeXL Graph Server on Tuesday, 30 March 2021 at 06:43 UTC.

The requested start date was Tuesday, 30 March 2021 at 00:01 UTC and the maximum number of days (going backward) was 14.

The maximum number of tweets collected was 7,500.

The tweets in the network were tweeted over the 2-day, 2-hour, 55-minute period from Saturday, 27 March 2021 at 21:05 UTC to Tuesday, 30 March 2021 at 00:00 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 4928
Unique Edges : 3243
Edges With Duplicates : 13008
Total Edges : 16251
Number of Edge Types : 5
Mentions : 1778
Tweet : 2268
Retweet : 5344
MentionsInRetweet : 6647
Replies to : 214
Self-Loops : 2368
Reciprocated Vertex Pair Ratio : 0.0108797015853279
Reciprocated Edge Ratio : 0.0215252152521525
Connected Components : 890
Single-Vertex Connected Components : 433
Maximum Vertices in a Connected Component : 2720
Maximum Edges in a Connected Component : 13006
Maximum Geodesic Distance (Diameter) : 16
Average Geodesic Distance : 5.44788
Graph Density : 0.000267871969718935
Modularity : 0.374813
NodeXL Version : 1.0.1.444
Data Import : The graph represents a network of 4,928 Twitter users whose tweets in the requested range contained "(Cyber Security) OR Cybersecurity", or who were replied to or mentioned in those tweets. The network was obtained from the NodeXL Graph Server on Tuesday, 30 March 2021 at 06:43 UTC.

The requested start date was Tuesday, 30 March 2021 at 00:01 UTC and the maximum number of days (going backward) was 14.

The maximum number of tweets collected was 7,500.

The tweets in the network were tweeted over the 2-day, 2-hour, 55-minute period from Saturday, 27 March 2021 at 21:05 UTC to Tuesday, 30 March 2021 at 00:00 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

Layout Algorithm : The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.
Graph Source : GraphServerTwitterSearch
Graph Term : (Cyber Security) OR Cybersecurity
Groups : The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.
Edge Color : Edge Weight
Edge Width : Edge Weight
Edge Alpha : Edge Weight
Vertex Radius : Betweenness Centrality

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[74] https://successanalytics.blogspot.com/
[60] https://missionimproxyble.com
[46] https://4programmer.com/1267/adobe-photoshop-cs6-dor-fotoshob-kaml
[46] https://4programmer.com/5/java-beginner-programming-tutorials
[42] https://twinybots.ch/
[32] https://phishstats.info/
[31] http://www.bombaynews.net/news/268150925/china-cyber-war-with-india
[31] https://danielbrummitt.com/2021/03/21/aedan-safe-mobile-firewall-antivirus-%f0%9f%8d%80-aedansafe-firewall-antivirus-freedownload/
[30] https://www.reuters.com/article/idUSKBN2BH3HJ?utm_sq=goy34u8469
[24] https://www.linkedin.com/slink?code=eBaxFxH

Top URLs in Tweet in G1:
[60] https://missionimproxyble.com
[31] https://danielbrummitt.com/2021/03/21/aedan-safe-mobile-firewall-antivirus-%f0%9f%8d%80-aedansafe-firewall-antivirus-freedownload/
[29] http://www.bombaynews.net/news/268150925/china-cyber-war-with-india
[28] https://phishstats.info/
[18] https://twinybots.ch/
[14] https://www.phishing.org.uk/2020/12/14/hackers-trick-employees-with-training-notifications/
[12] https://www.reuters.com/article/idUSKBN2BH3HJ?utm_sq=goy34u8469
[12] https://redalert.nshc.net/2019/03/28/threat-actor-group-using-uac-bypass-module-to-run-bat-file/
[12] https://herbertrsim.com/what-is-decentralization-about/
[10] https://exploitpack.com

Top URLs in Tweet in G2:
[66] https://successanalytics.blogspot.com/
[24] https://www.linkedin.com/slink?code=eBaxFxH
[20] https://www.hrw.org/news/2021/03/24/dont-arm-robots-policing?utm_sq=gox60q3nnc
[19] https://www.forbes.com/sites/forbestechcouncil/2021/03/26/artificial-intelligence-blazing-a-trail-for-the-future/?utm_sq=goy42z6unb&sh=3063bcba4e4c
[17] https://twinybots.ch/
[17] https://www.cbinsights.com/research/report/game-changing-technologies-2021/?utm_source=CB+Insights+Newsletter&utm_campaign=5b67f24c91-newsletter_general_Thurs_20210218&utm_medium=email&utm_term=0_9dc0513989-5b67f24c91-90603942
[16] https://wpcodersclub.blogspot.com/2021/03/stop-there-if-you-are-going-to-start.html
[15] https://www.cbinsights.com/research/unicorn-startup-market-map/?utm_sq=gox4ywqd2m
[15] https://www.goodmorningamerica.com/wellness/story/suicide-prevention-boost-artificial-intelligence-exclusive-76541481?utm_sq=gox66hgb60
[14] https://hbr.org/2021/03/digitizing-isnt-the-same-as-digital-transformation?utm_sq=gp08530k7k

Top URLs in Tweet in G3:
[10] https://www.nbcnews.com/tech/security/justice-department-issues-rare-charges-against-ransomware-operator-n1255899
[8] https://www.darkreading.com/physical-security/manufacturing-firms-learn-cybersecurity-the-hard-way/d/d-id/1340542?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple
[7] https://www.darkreading.com/physical-security/manufacturing-firms-learn-cybersecurity-the-hard-way/d/d-id/1340542?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple&utm_source=dlvr.it&utm_medium=twitter
[6] https://bankautomationnews.com/allposts/secur-risk/small-banks-outsource-cybersecurity-to-sei-for-automated-solutions/
[4] https://cybersecuritynews.es/alejandro-villar-nuevo-cybersecurity-director-ot-advisory-board-en-entelgy-innotec-security/?utm_source=dlvr.it&utm_medium=twitter
[4] https://jp.cointelegraph.com/news/former-us-director-of-the-cybersecurity-crypto-ransomware-running-wild
[3] https://twinybots.ch/
[3] https://sites.ziftsolutions.com/nutanix.ziftsolutions.com/8a99837e67bf46c90167c2bbd10d34df?cid=8a99825c78707d9f0178709fa75e0319&url=https%3A%2F%2Fstatic.ziftsolutions.com%2Ffiles%2F8a9982b6780202c1017802f170880146%2Ftbransomware.pdf
[3] https://securitygladiators.com/is-torrenting-illegal/?ref=quuu
[3] https://www.investing.com/news/cryptocurrency-news/former-us-director-of-cybersecurity-crypto-ransomware-running-wild-2459464?utm_source=dlvr.it&utm_medium=twitter

Top URLs in Tweet in G4:
[3] https://www.zdnet.com/article/purple-fox-malware-evolves-to-propagate-across-windows-machines/
[1] https://bit.ly/3sy1CTN
[1] https://www.forbes.com/sites/forbestechcouncil/2021/03/10/training-your-team-to-be-more-secure-in-the-workplace/?sh=70e5c80c24ce
[1] https://www.washingtonpost.com/politics/2021/03/26/cybersecurity-202-nsa-director-says-intelligence-has-big-blind-spot-domestic-internet-activity/
[1] https://apnews.com/article/rob-portman-hacking-email-russia-8bcd4a4eb3be1f8f98244766bae70395?utm_source=Sailthru&utm_medium=email&utm_campaign=Monday%20Morning%20Wire&utm_term=Morning%20Wire%20Subscribers

Top URLs in Tweet in G5:
[16] https://github.com/Tylous/Limelighter
[13] https://github.com/1ndianl33t/Bug-Bounty-Roadmaps
[13] https://github.com/pascalschulz/Infosec-Resources
[11] https://www.pentestpartners.com/security-blog/dumping-lsass-in-memory-undetected-using-mirrordump/
[9] https://redalert.nshc.net/2019/03/28/threat-actor-group-using-uac-bypass-module-to-run-bat-file/
[7] https://redcanary.com/blog/testing-the-top-mitre-attck-techniques-powershell-scripting-regsvr32/
[5] https://www.hackers-arise.com/single-post/2019/04/05/Port-Scanning-and-Recon-with-nmap-Part-1
[5] https://www.hackers-arise.com/post/2016/09/16/hack-to-spy-building-a-raspberry-spy-pi
[5] https://www.bugcrowd.com/blog/the-ultimate-guide-to-finding-and-escalating-xss-bugs/
[5] https://medium.com/r3d-buck3t/top-10-tips-for-burp-suite-72212d22328f

Top URLs in Tweet in G6:
[2] https://apnews.com/article/rob-portman-hacking-email-russia-8bcd4a4eb3be1f8f98244766bae70395
[2] https://www.washingtonpost.com/news/powerpost/paloma/the-cybersecurity-202/2019/09/09/the-cybersecurity-202-here-s-why-mitch-mcconnell-s-blocking-election-security-bills/5d758b86602ff171a5d734b6/
[1] https://twitter.com/mikeshepard4/status/1376327092133068802
[1] https://apnews.com/article/solarwinds-hack-email-top-dhs-officials-8bcd4a4eb3be1f8f98244766bae70395

Top URLs in Tweet in G7:
[2] https://petitions.ourcommons.ca/en/Petition/Details?Petition=e-3092
[2] https://dragonchain.com/blog/quantum-safe-blockchain-cybersecurity/
[1] https://go.usa.gov:443/xsSH3
[1] https://cisa.gov/ransomware
[1] https://twitter.com/FBI/status/1374148939738443778
[1] https://twinybots.ch/
[1] https://cybergen.com/uncategorized/how-the-lift-mentoring-program-gives-women-in-cybersecurity-a-leg-up/
[1] https://fortune.com/2021/03/16/not-all-a-i-surveillance-is-a-bad-thing/
[1] https://www.enterpriseirregulars.com/174829/the-top-20-cybersecurity-startups-to-watch-in-2021/
[1] https://www.rsaconference.com/library/blog/my-humorous-foray-into-cybersecurity?utm_source=twitter&utm_medium=social&utm_content=humorous-foray-into-cybersecurity-blog&utm_campaign=march-2021-rsac365&postID=4660873047

Top URLs in Tweet in G9:
[2] https://www.darkreading.com/physical-security/manufacturing-firms-learn-cybersecurity-the-hard-way/d/d-id/1340542?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple
[2] https://cybersecurity.att.com/blogs/security-essentials/texas-power-failures-highlight-dangers-of-grid-attacks
[2] https://www.infosecurity-magazine.com/webinars/security-trends-2020/
[2] https://www.infosecurity-magazine.com/magazine-features/offensive-cybercapabilities-be-used/
[2] https://okt.to/Sq9Hgw
[1] https://bit.ly/2PfBfU4
[1] https://socprime.com/blog/new-hades-ransomware-hits-leading-us-vendors/
[1] https://securityaffairs.co/wordpress/115925/data-breach/fbs-data-breach.html
[1] https://www.bleepingcomputer.com/news/security/fatface-sends-controversial-data-breach-email-after-ransomware-attack/#.YGBYS1QaU5k.twitter
[1] https://thehackernews.com/2021/03/openssl-releases-patches-for-2-high.html

Top Domains
Top Domains in Tweet in Entire Graph:
[140] blogspot.com
[135] twitter.com
[112] forbes.com
[105] linkedin.com
[101] helpnetsecurity.com
[100] github.com
[96] 4programmer.com
[93] darkreading.com
[92] youtube.com
[69] missionimproxyble.com

Top Domains in Tweet in G1:
[87] helpnetsecurity.com
[68] missionimproxyble.com
[42] twitter.com
[40] forbes.com
[32] darkreading.com
[32] youtube.com
[32] nationalcybersecuritynews.today
[31] blogspot.com
[31] danielbrummitt.com
[30] linkedin.com

Top Domains in Tweet in G2:
[103] blogspot.com
[50] cybersec24.com
[45] forbes.com
[44] analyticsinsight.net
[38] linkedin.com
[32] cbinsights.com
[30] youtube.com
[27] twitter.com
[23] github.com
[20] darkreading.com

Top Domains in Tweet in G3:
[27] linkedin.com
[25] twitter.com
[19] darkreading.com
[18] com.au
[12] youtube.com
[12] ziftsolutions.com
[11] cointelegraph.com
[10] nbcnews.com
[10] bankautomationnews.com
[8] forbes.com

Top Domains in Tweet in G4:
[3] zdnet.com
[1] bit.ly
[1] forbes.com
[1] washingtonpost.com
[1] apnews.com

Top Domains in Tweet in G5:
[55] github.com
[30] hackers-arise.com
[11] pentestpartners.com
[10] hakin9.org
[9] nshc.net
[8] medium.com
[7] redcanary.com
[6] securityonline.info
[5] bugcrowd.com
[2] hacker-arise.com

Top Domains in Tweet in G6:
[3] apnews.com
[2] washingtonpost.com
[1] twitter.com

Top Domains in Tweet in G7:
[5] rsaconference.com
[4] twitter.com
[4] technative.io
[2] usa.gov
[2] msft.it
[2] ourcommons.ca
[2] womencybersecuritysociety.org
[2] europa.eu
[2] dragonchain.com
[1] cisa.gov

Top Domains in Tweet in G9:
[6] darkreading.com
[6] infosecurity-magazine.com
[4] thehackernews.com
[4] att.com
[3] scmagazine.com
[3] okt.to
[2] bit.ly
[2] informationweek.com
[1] socprime.com
[1] securityaffairs.co

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[3640] cybersecurity
[1105] infosec
[640] python
[578] security
[558] machinelearning
[545] ai
[449] javascript
[369] iot
[349] malware
[347] technology



Top Hashtags in Tweet in G1:
[1612] cybersecurity
[612] infosec
[316] security
[204] malware
[170] ransomware
[161] technology
[158] hacking
[148] news
[137] cyberattack
[121] hacker

Top Hashtags in Tweet in G2:
[1010] cybersecurity
[566] python
[501] machinelearning
[447] ai
[405] javascript
[316] infosec
[311] 100daysofcode
[279] nodejs
[275] datascience
[238] iot

Top Hashtags in Tweet in G3:
[164] cybersecurity
[21] security
[16] ransomware
[14] infosec
[12] cybercrime
[10] cyber
[10] privacy
[8] iot
[8] technology
[7] jobs

Top Hashtags in Tweet in G4:
[5] cybersecurity
[3] malware
[3] newvulnerabilities
[2] cybersecuritytips
[2] cybersecuritytraining

Top Hashtags in Tweet in G5:
[130] cybersecurity
[88] pentesting
[70] infosec
[43] cyberwarrior
[21] bugbounty
[19] hacking
[14] burpsuite
[12] recon
[11] osint
[10] bypass

Top Hashtags in Tweet in G6:
[11] dhs
[1] solarwinds
[1] mog

Top Hashtags in Tweet in G7:
[37] cybersecurity
[12] cookies
[10] rsac
[5] security
[5] brampton
[4] ai
[4] enisa
[3] dhsgov
[3] infosec
[3] womenshistorymonth

Top Hashtags in Tweet in G9:
[40] cybersecurity
[13] infosec
[12] iphone
[6] security
[4] cyberattack
[4] phishing
[3] cybercrime
[3] darkweb
[3] osint
[3] cybersec

Top Hashtags in Tweet in G10:
[65] breakingnews

Top Words
Top Words in Tweet in Entire Graph:
[3640] #cybersecurity
[1584] security
[1520] cybersecurity
[1218] cyber
[1105] #infosec
[640] #python
[578] #security
[558] #machinelearning
[545] #ai
[449] #javascript

Top Words in Tweet in G1:
[1612] #cybersecurity
[612] #infosec
[504] cybersecurity
[337] security
[316] #security
[250] cyber
[204] #malware
[170] #ransomware
[161] #technology
[158] #hacking

Top Words in Tweet in G2:
[1010] #cybersecurity
[566] #python
[501] #machinelearning
[447] #ai
[405] #javascript
[316] #infosec
[311] #100daysofcode
[279] #nodejs
[275] #datascience
[238] #iot

Top Words in Tweet in G3:
[199] cybersecurity
[168] security
[164] #cybersecurity
[132] cyber
[45] more
[42] learn
[41] ransomware
[30] way
[28] firms
[26] technology

Top Words in Tweet in G4:
[183] security
[126] america
[122] trump
[119] suspected
[119] russian
[119] email
[119] accounts
[119] homeland
[108] kylegriffin1
[108] operation

Top Words in Tweet in G5:
[130] #cybersecurity
[88] #pentesting
[72] ptracesecurity
[70] #infosec
[43] #cyberwarrior
[38] three_cube
[35] web
[32] signing
[31] tool
[29] hacking

Top Words in Tweet in G6:
[118] russian
[118] email
[118] accounts
[116] hackers
[116] belonging
[104] gained
[104] access
[99] members
[88] dhs
[87] ap

Top Words in Tweet in G7:
[48] cybersecurity
[47] women
[37] #cybersecurity
[36] cisagov
[30] 2020
[27] received
[26] ransomware
[26] 29
[26] million
[25] ic3

Top Words in Tweet in G8:
[71] expert
[70] done
[70] dusted
[70] bachelor
[70] sciences
[70] cs
[70] programmer
[70] cyber
[70] security
[70] web

Top Words in Tweet in G9:
[40] #cybersecurity
[24] update
[24] apple
[18] thehackersnews
[16] best
[15] threat
[15] cybersecurity
[14] named
[14] report
[14] watch

Top Words in Tweet in G10:
[68] russian
[68] hacked
[67] operation
[67] homeland
[67] security
[67] officials
[67] acting
[65] #breakingnews
[65] emails
[65] trumps

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[637] cyber,security
[474] #cybersecurity,#infosec
[279] email,accounts
[231] homeland,security
[211] russian,hackers
[207] #cybersecurity,#security
[202] #infosec,#cybersecurity
[189] #python,#javascript
[185] #javascript,#nodejs
[182] security,officials

Top Word Pairs in Tweet in G1:
[276] #cybersecurity,#infosec
[126] #infosec,#cybersecurity
[124] #cybersecurity,#security
[71] cyber,security
[64] #app,available
[64] available,#googleplay
[64] #googleplay,#amazon
[64] #amazon,#appstore
[64] #appstore,#samsunggalaxy
[64] #samsunggalaxy,store

Top Word Pairs in Tweet in G2:
[173] #python,#javascript
[169] #javascript,#nodejs
[154] #programming,#programmer
[153] #programmer,#python
[153] #nodejs,javascriptflx
[146] #machinelearning,#python
[141] javascriptflx,phishfindr
[141] phishfindr,#cybersecurity
[120] #hclswlobp,#nocode
[120] 42sz40,#programming

Top Word Pairs in Tweet in G3:
[93] cyber,security
[24] manufacturing,firms
[24] firms,learn
[24] learn,cybersecurity
[24] cybersecurity,hard
[24] hard,way
[15] former,director
[15] director,cybersecurity
[15] cybersecurity,crypto
[15] crypto,ransomware

Top Word Pairs in Tweet in G4:
[119] suspected,russian
[119] email,accounts
[119] homeland,security
[108] russian,operation
[108] operation,hacked
[108] hacked,email
[108] accounts,top
[108] top,trump
[108] trump,admin
[108] admin,homeland

Top Word Pairs in Tweet in G5:
[57] #cybersecurity,#infosec
[26] #cybersecurity,#cyberwarrior
[20] #pentesting,#bugbounty
[18] #pentesting,#cybersecurity
[16] tool,generating
[16] generating,fake
[16] fake,code
[16] code,signing
[16] signing,certificates
[16] certificates,signing

Top Word Pairs in Tweet in G6:
[118] email,accounts
[116] russian,hackers
[116] accounts,belonging
[104] hackers,gained
[104] gained,access
[104] access,email
[87] ap,russian
[87] belonging,former
[87] former,dhs
[87] dhs,secretary

Top Word Pairs in Tweet in G7:
[26] 29,million
[25] 2020,ic3
[25] ic3,received
[25] received,474
[25] 474,complaints
[25] complaints,identified
[25] identified,ransomware
[25] ransomware,adjusted
[25] adjusted,losses
[25] losses,over

Top Word Pairs in Tweet in G8:
[70] done,dusted
[70] dusted,bachelor
[70] bachelor,sciences
[70] sciences,cs
[70] cs,programmer
[70] programmer,cyber
[70] cyber,security
[70] security,expert
[70] expert,web
[70] web,designer

Top Word Pairs in Tweet in G9:
[12] update,#iphone
[12] #iphone,ipad
[12] ipad,apple
[12] apple,watch
[12] watch,apple
[12] apple,released
[12] released,urgent
[12] urgent,patch
[12] patch,update
[12] update,devices

Top Word Pairs in Tweet in G10:
[67] russian,operation
[67] operation,hacked
[67] homeland,security
[67] security,officials
[65] #breakingnews,russian
[65] hacked,emails
[65] emails,trumps
[65] trumps,administration
[65] administration,homeland
[65] officials,illegally

Top Replied-To
Top Replied-To in Entire Graph:
@abu7ala1
@hope25205513
@reuters
@aaarz368
@outsiderdf
@priscil14062061
@averyyhere
@abbyyarcherr
@traceyryniec
@alvcro

Top Replied-To in G1:
@microsoft
@carmensinek
@awscloud
@capesandbox
@canalys
@defenseone
@serghei
@marcusjcarey
@itspmagazine
@gcluley

Top Replied-To in G2:
@abu7ala1
@northsec_io
@deloitte

Top Replied-To in G4:
@kylegriffin1

Top Replied-To in G7:
@cisagov
@technative
@scruffur

Top Mentioned
Top Mentioned in Entire Graph:
@paula_piccard
@javascriptflx
@42sz40
@phishfindr
@abu7ala1
@kylegriffin1
@iotcybersec24
@lanceschukies
@reach2ratan
@miriamasensi

Top Mentioned in G1:
@lanceschukies
@itspmagazine
@3xs0
@paula_piccard
@reach2ratan
@netsecu
@cioamaro
@iotcybersec24
@deepfriedcyber
@ajblackston

Top Mentioned in G2:
@paula_piccard
@javascriptflx
@phishfindr
@42sz40
@abu7ala1
@miriamasensi
@eli_krumova
@iotcybersec24
@ingliguori
@successanalytix

Top Mentioned in G3:
@dantechservices
@gocleared
@aerobytecyber
@kryptolinks_de
@mgastateu
@itguys
@vilnis11
@mcgglobaltechn1
@5stocksinto

Top Mentioned in G4:
@kylegriffin1
@selectedwisdom
@johnjharwood
@attomushq
@malcolmnance

Top Mentioned in G5:
@ptracesecurity
@three_cube
@blueteamblog
@vysecurity
@hakin9
@ethical_enso
@ericrzimmerman
@pethuraj
@3xs0
@paula_piccard

Top Mentioned in G6:
@hugolowell
@jenniferjjacobs
@mog7546
@jonlemire
@kylegriffin1
@chadfwolf
@alansuderman
@whnsc
@grudging1

Top Mentioned in G7:
@cisagov
@uscert_gov
@cyber
@rsaconference
@carolinewmwong
@dhsgov
@technative
@msftsecurity
@sonialiberal
@secmayorkas

Top Mentioned in G8:
@zaynafrica_

Top Mentioned in G9:
@thehackersnews
@darkreading
@keysightnas
@scmagazine
@attcyber
@infosecuritymag
@attivonetworks
@hidglobal
@thepkiguy
@centripetalnet

Top Mentioned in G10:
@fordjohnathan5
@kylegriffin1
@hugolowell

Top Tweeters
Top Tweeters in Entire Graph:
@missb62
@sectest9
@marshawright
@easy_branches
@paoloigna1
@jurylady5
@atviassist
@hrblock_21
@s9tmt
@mlnangalama

Top Tweeters in G1:
@sectest9
@cyberdomain
@123trabajo
@csa_dvillamizar
@cybersecurityn8
@sosmcwin
@daretothink53
@netsecu
@johnnyciocca
@jimmyroybloom

Top Tweeters in G2:
@chidambara09
@femtech_
@aaroncuddeback
@evankirstel
@indianexpress
@codernotesbot
@ottlegalrebels
@npsusa
@santchiweb
@fintechna

Top Tweeters in G3:
@bitcoinagile
@crweworld
@it_securitynews
@otiose94
@dwatchnews
@m157q_news_rss
@joviannfeed
@andytoronto
@globalfirstnews
@cangal_39

Top Tweeters in G4:
@russelltim151
@givemepie360
@amyayers16
@jodotcom
@teckiegirl
@penneyewart
@debbie_dease
@marciabunney
@29361rmsm
@ethomas3915

Top Tweeters in G5:
@538355
@securityblog
@rjacksix
@unixdoss
@heshimuk
@jarritodcerveza
@armandnarcissek
@jmartynuk
@fragmentedsoul5
@chillywillee1

Top Tweeters in G6:
@missb62
@inspiteoftrump
@mog7546
@briangrnotabot
@familygrowing1
@multijo1
@snw106
@janesepmeier
@leftnotright
@myradsirois1

Top Tweeters in G7:
@solutioneer72
@k1a1zzz
@cnn
@hubbucket
@sequoia2001
@bosoxbruins
@kaylauffer1
@scruffur
@kristyndante
@jonathansbored

Top Tweeters in G8:
@maxajee
@hustleuthman
@alfais_chiroma
@maryamumar__
@itz_raksy_mo
@abdullahilawerl
@asserdiq
@naibi__
@ii_khaleedor
@ahmad___v

Top Tweeters in G9:
@securityaffairs
@jc_vazquez
@scmagazine
@securitybrew
@infosecuritymag
@bagnararod
@nitr0usmx
@phoneguymark
@attcyber
@thehackersnews

Top Tweeters in G10:
@micjojd
@royaleight
@beckyrae12345
@catlover1943
@debr3322
@solomankarl
@deejay90192
@argusc
@tati_vict
@mjoehlerich


We use necessary cookies to make our site work. We’d like to set additional cookies to understand site usage, make site improvements and to remember your settings. We also use cookies set by other sites to help deliver content from their services.