NodeXL Graph Gallery: Interactive Graph


Donate to the Social Media Research Foundation's NodeXL development fund

infosec_2019-07-14_00-00-01.xlsx (experimental version)
NOTE: This version of the graph is not available with the browser you are using. A more recent version of the browser is required.
Zoom in Zoom out Reset the graph
Go to the graph's main page

From:
NodeXLExcelAutomator
Uploaded on:
July 14, 2019
Short Description:
infosec via NodeXL http://bit.ly/2NSIbVL
@sectest9
@cybersec_feeds
@guillaume_lpl
@securityblog
@hansesecure
@hakin9
@p403n1xi
@kim_crawley
@melsecurity
@xenophage

Top hashtags:
#infosec
#cybersecurity
#security
#hacking
#cyberwarfare
#privacy
#malware
#phishing

Description:
Description
The graph represents a network of 3,391 Twitter users whose tweets in the requested range contained "infosec", or who were replied to or mentioned in those tweets. The network was obtained from the NodeXL Graph Server on Sunday, 14 July 2019 at 07:01 UTC.

The requested start date was Sunday, 14 July 2019 at 00:01 UTC and the maximum number of days (going backward) was 14.

The maximum number of tweets collected was 5,000.

The tweets in the network were tweeted over the 2-day, 8-hour, 54-minute period from Thursday, 11 July 2019 at 15:05 UTC to Sunday, 14 July 2019 at 00:00 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 3391
Unique Edges : 4437
Edges With Duplicates : 3475
Total Edges : 7912
Number of Edge Types : 3
Mentions : 5255
Tweet : 2414
Replies to : 243
Self-Loops : 2414
Reciprocated Vertex Pair Ratio : 0.0453471894189891
Reciprocated Edge Ratio : 0.0867600542250339
Connected Components : 595
Single-Vertex Connected Components : 350
Maximum Vertices in a Connected Component : 2302
Maximum Edges in a Connected Component : 6619
Maximum Geodesic Distance (Diameter) : 13
Average Geodesic Distance : 5.109225
Graph Density : 0.000385020560237102
Modularity : 0.520022
NodeXL Version : 1.0.1.413

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[64] https://github.com/mitchellkrogza/Phishing.Database/blob/master/phishing-domains-NEW-last-hour.txt
[44] https://github.com/mitchellkrogza/Phishing.Database/blob/master/phishing-links-ACTIVE-NOW.txt
[38] https://github.com/mitchellkrogza/Phishing.Database/blob/master/phishing-links-NEW-today.txt
[26] https://www.cnbc.com/2019/06/18/facebook-libra-cryptocurrency-bitcoin-competitor-calibra-consortium.html
[23] https://www.csoonline.com/article/3397044/over-90-of-data-transactions-on-iot-devices-are-unencrypted.html
[22] https://www.pentestpartners.com/security-blog/docker-for-hackers-a-pen-testers-guide/
[16] https://hakin9.org/list-of-free-python-resources/
[14] http://www.us-cert.gov/
[11] https://medium.com/@yusuffurkan/facebook-bug-bounty-page-admin-disclose-bug-facebook-android-app-c0fa50459177
[10] http://open-sez.me

Top URLs in Tweet in G1:
[59] https://github.com/mitchellkrogza/Phishing.Database/blob/master/phishing-domains-NEW-last-hour.txt
[41] https://github.com/mitchellkrogza/Phishing.Database/blob/master/phishing-links-ACTIVE-NOW.txt
[35] https://github.com/mitchellkrogza/Phishing.Database/blob/master/phishing-links-NEW-today.txt
[12] https://hakin9.org/list-of-free-python-resources/
[10] http://open-sez.me
[7] https://thehill.com/opinion/national-security/452172-why-america-must-take-the-fight-against-cyberterrorism-seriously
[7] https://nakedsecurity.sophos.com/2019/07/10/instagram-asks-bullies-are-you-sure-you-want-to-say-that/
[6] https://blog.appknox.com/top-cybersecurity-data-breaches-2019/?utm_content=96275859&utm_medium=social&utm_source=twitter&hss_channel=tw-2466013141
[6] https://blog.appknox.com/gdpr-data-breach/?utm_content=96276372&utm_medium=social&utm_source=twitter&hss_channel=tw-2466013141
[6] https://infosecroundup.com/?edition_id=07db6720-a4a1-11e9-a176-0cc47a0d15fd

Top URLs in Tweet in G2:
[7] https://www.webiron.com/bot_feed/bd7f678e9b87f3079d9fda5d9f6157c7
[6] http://www.sectechno.com/packeth-ethernet-packet-generator/
[5] https://www.helpnetsecurity.com/2019/07/12/new-infosec-products-of-the-week-july-12-2019/?utm_source=dlvr.it&utm_medium=twitter
[4] https://itjobpro.com/job/information-technology-specialist-infosec-3
[4] https://www.webiron.com/bot_feed/d26b8595518082af76db9f48f9f7e568
[3] https://www.youtube.com/watch?v=_v_PjQEfyiA

[3] https://phishstats.info/
[3] https://www.webiron.com/bot_feed/3f588a26163867af7e848cd98d23889d
[2] https://www.theverge.com/2019/7/10/20689468/tesla-autopilot-trade-secret-theft-guangzhi-cao-xpeng-xiaopeng-motors-lawsuit-filing
[2] https://www.alienvault.com/blogs/security-essentials/what-is-chaos-engineering-in-pen-testing

Top URLs in Tweet in G3:
[5] https://www.peerlyst.com/posts/travel-with-a-burner-phone-china-puts-spyware-on-travelers-phones-kimberly-crawley
[2] http://rniconsulting.com.au/?p=1330
[1] https://www.venafi.com/blog/will-trump-administration-succeed-banning-end-end-encryption
[1] http://www.viruss.eu/malware/ios-url-scheme-susceptible-to-hijacking/
[1] https://twitter.com/i/web/status/984433828746924037
[1] https://twitter.com/i/web/status/1150006560841752577
[1] https://thehackernews.com/2019/07/magecart-amazon-s3-hacking.html
[1] https://twitter.com/i/web/status/1150147925915439105
[1] https://twitter.com/StephandSec/status/1149314095809748992
[1] https://johnopdenakker.com/some-useful-appsec-learning-resources/

Top URLs in Tweet in G4:
[5] https://docs.google.com/forms/d/e/1FAIpQLSehEtSCMjv88EgzUwpQORB9mXN94_eHxBq9uC8HvxxlwPg45g/viewform
[3] https://www.youtube.com/watch?v=qoplmHxmOp4&feature=youtu.be

[3] https://chrissanders.org/2019/07/infosec-tour-of-duty/
[2] https://censys.io/blog/hunting-mirai?utm_content=95967911&utm_medium=social&utm_source=twitter&hss_channel=tw-3566263693
[1] https://twitter.com/i/web/status/1149476848646025223
[1] https://twitter.com/i/web/status/1149476668370669573
[1] https://hakin9.org/preventing-mimikatz-attacks/
[1] https://twitter.com/i/web/status/1150049909242023937
[1] https://twitter.com/i/web/status/1150118660964528131
[1] https://twitter.com/jose_pagliery/status/1149005850041884672

Top URLs in Tweet in G5:
[20] https://www.pentestpartners.com/security-blog/docker-for-hackers-a-pen-testers-guide/
[9] https://medium.com/@malcomvetter/red-team-use-of-mitre-att-ck-f9ceac6b3be2
[5] https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/
[4] https://sensepost.com/blog/2018/linux-heap-exploitation-intro-series-set-you-free-part-1/
[3] https://securityonline.info/automate-pentesting-penta/
[3] https://securityonline.info/diaphora-ida-python-bindiffing-plugin/
[2] https://www.darkreading.com/attacks-breaches/zoom-client-for-mac-exposing-users-to-serious-risks/d/d-id/1335196?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple
[2] https://thehackernews.com/2019/07/finspy-spyware-android-ios.html
[2] https://securityonline.info/air-ng/
[2] https://securityonline.info/amass-subdomain-enumeration/

Top URLs in Tweet in G6:
[10] http://www.us-cert.gov/
[3] https://go.usa.gov/xyNeb
[3] https://thehill.com/policy/cybersecurity/452707-feds-allow-campaigns-to-accept-discounted-cybersecurity-services
[2] https://www.zdnet.com/article/mcafee-plots-return-to-public-markets-with-ipo/
[2] https://www.csoonline.com/article/3408317/what-blockchain-can-and-cant-do-for-security.html
[2] https://www.zdnet.com/article/the-windows-10-security-guide-how-to-safeguard-your-business/
[2] https://www.darkreading.com/endpoint/authentication/intelligent-authentication-market-grows-to-meet-demand/d/d-id/1335155
[2] https://www.techrepublic.com/article/how-to-set-up-multi-factor-authentication-for-an-iam-user-in-aws/
[2] https://www.zdnet.com/article/researcher-says-zoom-web-server-is-vulnerable-to-remote-code-execution/
[2] https://www.csoonline.com/article/3390222/top-10-global-cybersecurity-hubs-for-2019.html#slide1

Top URLs in Tweet in G7:
[3] https://www.cnbc.com/2019/07/10/this-blind-spot-puts-financial-advisors-and-their-clients-at-risk.html
[3] http://www.viruss.eu/malware/ios-url-scheme-susceptible-to-hijacking/
[2] https://github.com/m4ll0k/Galileo
[2] https://www.forbes.com/sites/gilpress/2017/10/17/top-10-hot-data-security-and-privacy-technologies/?utm_content=buffer879da&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
[1] https://twitter.com/i/web/status/1150164002972098560
[1] https://twitter.com/i/web/status/1143597990575300608
[1] https://twitter.com/i/web/status/1143507394447773696
[1] https://twitter.com/i/web/status/1147068102234050560
[1] https://twitter.com/i/web/status/1143007346471387141
[1] https://twitter.com/i/web/status/1143492350536278016

Top URLs in Tweet in G8:
[4] http://feedproxy.google.com/~r/PentestTools/~3/rO38ouawMjA/mozdef-mozilla-enterprise-defense.html
[4] http://woshub.com/rdp-connection-logs-forensics-windows/
[3] https://kalilinuxtutorials.com/ghostsquadhackers/
[3] https://www.cert.ssi.gouv.fr/avis/CERTFR-2019-AVI-330/
[2] https://www.cnil.fr/fr/certification-des-competences-du-dpo-la-cnil-delivre-son-premier-agrement
[2] https://www.economist.com/gulliver/2019/07/08/british-airways-faces-ps183m-fine-over-a-data-breach
[2] https://www.zdnet.com/article/zoom-defends-use-of-local-web-server-on-macs-after-security-report/#ftag=RSSbaffb68
[2] https://kalilinuxtutorials.com/backbox-penetration-tests-security-assessments/
[2] https://github.com/mitchellkrogza/Phishing.Database/blob/master/phishing-domains-NEW-last-hour.txt
[2] https://amazon.com/dp/1725877759

Top URLs in Tweet in G9:
[5] https://en.m.wikipedia.org/wiki/Spread_spectrum
[1] https://twitter.com/i/web/status/1149343647000866820
[1] https://twitter.com/i/web/status/1149351822672441345
[1] https://twitter.com/i/web/status/1149351746805911552
[1] https://twitter.com/i/web/status/1149354988503818241
[1] https://twitter.com/i/web/status/1149352152013463553
[1] https://twitter.com/i/web/status/1149353522347073541
[1] https://twitter.com/i/web/status/1149354426819387392
[1] https://web.archive.org/web/20190302130326if_/https://apps.dtic.mil/dtic/tr/fulltext/u2/a623995.pdf
[1] http://apps.dtic.mil

Top URLs in Tweet in G10:
[2] https://www.govtech.com/security/Los-Angeles-County-Hospitals-Clinics-Suffer-Data-Breach.html
[1] https://www.teiss.co.uk/analysis/the-big-interview/leadership-imposter-syndrome-and-humour-with-thom-langford/
[1] https://www.teiss.co.uk/information-security/how-to-ensure-your-it-strategy-is-strategic-not-reactive/
[1] https://www.teiss.co.uk/media/video/bio-hacker-kevin-mcpeake-opens-up-about-aspergers-and-adhd/
[1] https://www.csoonline.com/article/3406464/review-xm-cyber-haxm-makes-automated-penetration-testing-more-accessible-reliable.html?utm_campaign=XM%20Cyber%20HaXM%20makes%20automated%20pentesting%20more%20accessible%20and%20reliable%21%20&utm_content=95929695&utm_medium=social&utm_source=twitter&hss_channel=tw-954069116398329856
[1] https://twitter.com/i/web/status/1149334045274324992
[1] https://deadspin.com/jim-bouton-woke-up-america-1836279676
[1] https://threatconnect.com/resources/events/?utm_content=96307633&utm_medium=social&utm_source=twitter&hss_channel=tw-432783321
[1] https://threatconnect.com/blog/threatconnect-supports-mitre-attck/?utm_campaign=Organic%20Social%20-%20SOAR%20-%202019&utm_content=96100554&utm_medium=social&utm_source=twitter&hss_channel=tw-432783321
[1] https://threatconnect.com/blog/threatconnect-supports-mitre-attck/?utm_campaign=Organic%20Social%20-%20SOAR%20-%202019&utm_content=96222284&utm_medium=social&utm_source=twitter&hss_channel=tw-432783321

Top Domains
Top Domains in Tweet in Entire Graph:
[525] twitter.com
[195] tobem.com
[178] github.com
[150] feedburner.com
[76] zdnet.com
[58] paper.li
[52] hakin9.org
[51] darkreading.com
[50] csoonline.com
[46] helpnetsecurity.com

Top Domains in Tweet in G1:
[190] tobem.com
[146] twitter.com
[140] github.com
[44] hakin9.org
[39] techcrunch.com
[33] scmagazine.com
[29] jdsupra.com
[29] darkreading.com
[28] zdnet.com
[25] google.com

Top Domains in Tweet in G2:
[122] twitter.com
[26] webiron.com
[13] paper.li
[13] pastebeen.com
[13] packetstormsecurity.com
[12] helpnetsecurity.com
[8] lnkd.in
[6] youtube.com
[6] sectechno.com
[5] securityaffairs.co

Top Domains in Tweet in G3:
[9] twitter.com
[5] peerlyst.com
[3] lnkd.in
[2] com.au
[1] venafi.com
[1] viruss.eu
[1] thehackernews.com
[1] johnopdenakker.com
[1] blackhillsinfosec.com

Top Domains in Tweet in G4:
[13] twitter.com
[6] google.com
[4] censys.io
[3] youtube.com
[3] chrissanders.org
[1] hakin9.org
[1] def.camp
[1] paper.li
[1] mediatrust.com
[1] blackhat.com

Top Domains in Tweet in G5:
[20] pentestpartners.com
[10] medium.com
[10] securityonline.info
[5] absolomb.com
[5] pentesteracademy.com
[4] twitter.com
[4] sensepost.com
[4] darkreading.com
[3] github.com
[2] zdnet.com

Top Domains in Tweet in G6:
[24] twitter.com
[14] zdnet.com
[10] us-cert.gov
[9] usa.gov
[7] csoonline.com
[7] darkreading.com
[3] github.com
[3] thehill.com
[2] techrepublic.com
[2] splunk.com

Top Domains in Tweet in G7:
[21] twitter.com
[7] dy.si
[5] cnbc.com
[5] github.com
[3] viruss.eu
[3] forbes.com
[2] packetstormsecurity.com
[1] securityaffairs.co
[1] aravo.com

Top Domains in Tweet in G8:
[7] gouv.fr
[6] google.com
[6] kalilinuxtutorials.com
[5] twitter.com
[4] github.com
[4] woshub.com
[3] zdnet.com
[3] washingtonpost.com
[2] cnil.fr
[2] economist.com

Top Domains in Tweet in G9:
[7] twitter.com
[5] wikipedia.org
[1] archive.org
[1] dtic.mil
[1] cyberscoop.com

Top Domains in Tweet in G10:
[5] twitter.com
[5] threatconnect.com
[3] co.uk
[3] csoonline.com
[2] crowdstrike.com
[2] govtech.com
[1] deadspin.com
[1] yahoo.com
[1] reportlinker.com
[1] 7wdata.be

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[3270] infosec
[1717] cybersecurity
[486] security
[214] hacking
[213] cyberwarfare
[189] privacy
[172] malware
[157] phishing
[143] technology
[132] pentest



Top Hashtags in Tweet in G1:
[1424] infosec
[883] cybersecurity
[286] security
[210] cyberwarfare
[126] follow
[124] rt
[121] hacking
[118] technology
[110] phishing
[103] malware

Top Hashtags in Tweet in G2:
[327] infosec
[154] cybersecurity
[48] security
[21] privacy
[21] databreach
[19] hacking
[16] phishing
[13] ciso
[11] informationsecurity
[11] breach

Top Hashtags in Tweet in G3:
[39] infosec
[10] cybersecurity
[8] ff
[5] china
[5] travel
[4] encryption
[4] security
[4] iisplive
[3] whoremoney
[2] hackers

Top Hashtags in Tweet in G4:
[47] infosec
[11] steganography
[9] malware
[8] ios
[8] stegoware
[7] dfir
[6] cfp
[4] cybersecurity
[3] defcamp
[3] linux

Top Hashtags in Tweet in G5:
[79] infosec
[60] pentest
[26] redteam
[21] bugbounty
[15] security
[9] opensource
[5] exploitdev
[5] phishing
[4] onpatrol4malware
[3] malware

Top Hashtags in Tweet in G6:
[81] infosec
[59] cybersecurity
[14] infographics
[13] thread
[10] internet
[8] cyber
[8] ics
[4] atx
[4] sacramento
[4] activedirectory

Top Hashtags in Tweet in G7:
[67] cybersecurity
[61] infosec
[29] iot
[26] security
[14] malware
[14] artificialintelligence
[13] databreach
[13] fintech
[13] ai
[12] bigdata

Top Hashtags in Tweet in G8:
[76] infosec
[54] cybersecurity
[16] toussecnum
[10] security
[9] career
[7] phishing
[7] privacy
[6] cybertools
[6] pentest
[5] itsec

Top Hashtags in Tweet in G9:
[8] neuroscience
[7] telecom
[6] satellite
[6] satcom
[6] infosec
[5] auditory
[5] researcher
[5] microwave
[5] rf
[5] milcom

Top Hashtags in Tweet in G10:
[27] infosec
[18] cybersecurity
[4] soar
[4] security
[3] cyberfacts
[3] ransomware
[3] breach
[2] threatintel
[2] hipaa
[2] iot

Top Words
Top Words in Tweet in Entire Graph:
[2696] Words in Sentiment List#1: Positive
[3055] Words in Sentiment List#2: Negative
[15] Words in Sentiment List#3: Angry/Violent
[101380] Non-categorized Words
[107132] Total Words
[3271] #infosec
[1716] #cybersecurity
[605] security
[513] infosec
[486] #security

Top Words in Tweet in G1:
[1424] #infosec
[883] #cybersecurity
[286] #security
[240] gt
[223] security
[210] #cyberwarfare
[172] found
[168] new
[133] cyber
[126] #follow

Top Words in Tweet in G2:
[327] #infosec
[154] #cybersecurity
[65] new
[61] infosec
[50] security
[48] #security
[31] data
[30] network
[30] 2019
[27] s

Top Words in Tweet in G3:
[39] #infosec
[34] fs0c131y
[33] infosec
[30] kim_crawley
[28] phat_hobbit
[28] appsecbloke
[27] seanwrightsec
[26] infosec_drama
[26] notameadow
[25] cybergeekgirl

Top Words in Tweet in G4:
[91] infosec
[70] security
[67] years
[67] please
[66] airbnb
[66] looking
[66] software
[66] engineer
[66] 0
[66] levels

Top Words in Tweet in G5:
[84] collection
[79] #infosec
[77] hansesecure
[60] #pentest
[46] windows
[41] detection
[41] lab
[41] packer
[41] vagrant
[41] scripts

Top Words in Tweet in G6:
[81] #infosec
[59] #cybersecurity
[46] guillaume_lpl
[31] attack
[28] learn
[27] probably
[25] heard
[25] infosec
[21] tor
[16] made

Top Words in Tweet in G7:
[67] #cybersecurity
[62] #infosec
[46] fisher85m
[32] infographic
[29] #iot
[26] #security
[19] cloudpreacher
[18] cnbc
[15] cybersecurity
[14] #malware

Top Words in Tweet in G8:
[76] #infosec
[54] #cybersecurity
[16] #toussecnum
[16] 2019
[13] security
[12] data
[11] thanks
[10] #security
[10] 12
[10] ihub

Top Words in Tweet in G9:
[15] p403n1xi
[12] fbiwfo
[11] us_cybercom
[11] afspace
[11] itu
[11] eff
[11] aclu
[10] nsa
[10] ussocom
[10] faasafetybrief

Top Words in Tweet in G10:
[27] #infosec
[24] engineer
[23] car
[21] ian_infosec
[18] #cybersecurity
[15] eric_conrad
[15] nerdpyle
[15] ajohnsocyber
[15] restinbeachface
[15] now

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[726] #cybersecurity,#infosec
[291] #infosec,#cybersecurity
[211] #cyberwarfare,#infosec
[135] #security,#infosec
[129] #infosec,#security
[122] #follow,#rt
[121] #rt,#cybersecurity
[97] new,#phishing
[89] phishfindr,found
[88] gt,found

Top Word Pairs in Tweet in G1:
[392] #cybersecurity,#infosec
[209] #cyberwarfare,#infosec
[122] #follow,#rt
[121] #rt,#cybersecurity
[114] #infosec,#cybersecurity
[98] #security,#infosec
[84] new,#phishing
[81] phishfindr,found
[80] gt,found
[80] found,today

Top Word Pairs in Tweet in G2:
[57] #infosec,#cybersecurity
[44] #cybersecurity,#infosec
[20] new,node
[17] #security,#infosec
[13] passwords,emails
[13] emails,paste
[12] #infosec,#security
[12] week,july
[12] july,12
[12] 12,2019

Top Word Pairs in Tweet in G3:
[19] beckypinkard,cyberbaines
[19] cyberbaines,happygeek
[19] kim_crawley,phat_hobbit
[19] notameadow,cyberchillphil
[18] cybergeekgirl,beckypinkard
[18] seanwrightsec,kim_crawley
[18] thecyberviking,notameadow
[17] happygeek,seanwrightsec
[16] kateoflaherty,j_opdenakker
[16] lisaforteuk,cybergeekgirl

Top Word Pairs in Tweet in G4:
[66] airbnb,looking
[66] looking,security
[66] security,software
[66] software,engineer
[66] engineer,0
[66] 0,years
[66] years,infosec
[66] infosec,levels
[66] levels,welcome
[66] welcome,dm

Top Word Pairs in Tweet in G5:
[51] #infosec,#pentest
[41] detection,lab
[41] lab,collection
[41] collection,packer
[41] packer,vagrant
[41] vagrant,scripts
[41] scripts,quickly
[41] quickly,bring
[41] bring,windows
[41] windows,ad

Top Word Pairs in Tweet in G6:
[42] #cybersecurity,#infosec
[25] probably,heard
[23] guillaume_lpl,probably
[15] those,want
[15] heard,ddos
[15] ddos,attack
[15] attack,very
[15] very,common
[15] common,attack
[15] attack,usually

Top Word Pairs in Tweet in G7:
[28] #cybersecurity,#infosec
[15] infographic,#cybersecurity
[12] infographic,fisher85m
[11] over,next
[11] next,decade
[11] malls,beginning
[11] beginning,track
[11] track,shoppers
[11] shoppers,#facialrecognition
[10] #ai,#artificialintelligence

Top Word Pairs in Tweet in G8:
[27] #cybersecurity,#infosec
[16] #infosec,#toussecnum
[7] certfr,2019
[7] 2019,avi
[7] multiples,vulnérabilités
[7] vulnérabilités,dans
[7] 12,juillet
[7] juillet,2019
[6] #toussecnum,#cybertools
[6] #infosec,#cybersecurity

Top Word Pairs in Tweet in G9:
[11] eff,aclu
[10] fbiwfo,us_cybercom
[10] us_cybercom,afspace
[10] afspace,ussocom
[10] ussocom,faasafetybrief
[10] faasafetybrief,itu
[10] itu,ungeneva
[10] ungeneva,intlcrimcourt
[10] intlcrimcourt,guardian
[10] guardian,eff

Top Word Pairs in Tweet in G10:
[15] eric_conrad,nerdpyle
[15] ian_infosec,ajohnsocyber
[15] ajohnsocyber,restinbeachface
[12] markmorow,eric_conrad
[11] 4,engineers
[11] engineers,car
[11] car,car
[11] car,start
[11] start,mechanical
[11] mechanical,engineer

Top Replied-To
Top Replied-To in Entire Graph:
@alyssam_infosec
@cybersecstu
@carmencrincoli
@infosec_taylor
@fbiwfo
@badassbowden
@tyrejim
@fs0c131y
@ian_infosec
@infosec_jb

Top Replied-To in G1:
@marriott
@ckitoutpassiton

Top Replied-To in G2:
@silexsecure

Top Replied-To in G3:
@cybersecstu
@fs0c131y
@badassbowden
@northwestsec
@infosec_taylor
@appsecbloke
@zephrfish
@iancoldwater
@kateoflaherty
@lisaforteuk

Top Replied-To in G4:
@profwoodward
@crunkcomputing

Top Replied-To in G6:
@sherrod_im
@icscert
@teck923
@olafhartong
@rhodeislander

Top Replied-To in G7:
@cioonline
@cnbc

Top Replied-To in G8:
@thesslstore

Top Replied-To in G9:
@fbiwfo
@foiapost

Top Replied-To in G10:
@carmencrincoli
@tyrejim
@ian_infosec
@ron_fab
@threatconnect
@markmorow
@fpieces
@girlgerms
@badassbowden
@igor948

Top Mentioned
Top Mentioned in Entire Graph:
@masergy
@hansesecure
@guillaume_lpl
@melsecurity
@wi
@fisher85m
@datashadow
@hakin9
@malwarebytes
@facebook

Top Mentioned in G1:
@hakin9
@phishfindr
@keoxes
@datashadow
@cybertoolsbooks
@cybersecuritypl
@corixpartners
@cioamaro
@appknox
@zdnet

Top Mentioned in G2:
@brucehallas
@si1isec
@koddoscom
@christyquinn
@setdeep

Top Mentioned in G3:
@fs0c131y
@kim_crawley
@phat_hobbit
@appsecbloke
@seanwrightsec
@notameadow
@infosec_drama
@happygeek
@j_opdenakker
@cybergeekgirl

Top Mentioned in G4:
@melsecurity
@wi
@0xuid
@wo
@bsideslv
@chrissanders88
@wmazurczyk
@bsideslux
@queercon
@j3ssa

Top Mentioned in G5:
@hansesecure
@ropnop
@malcomvetter
@breachedsec_com
@the_yellow_fall
@cry__pto
@guillaume_lpl
@securitytube
@hacker0x01
@pyrotek3

Top Mentioned in G6:
@guillaume_lpl
@cybersecboardrm
@infosecsherpa
@raj_samani
@huykh4
@infosechotspot
@jackrhysider
@valcan_k
@purplesquadsec
@ch33r10

Top Mentioned in G7:
@fisher85m
@cloudpreacher
@cnbc
@mikequindazzi
@karolina_kurzac
@devcleary
@stepha
@ronald_vanloon
@nowthisnews
@stephanenappo

Top Mentioned in G8:
@davehatter
@cyberdian_tools
@microsoft
@ihub
@tracelabs
@virustotal
@abdihakx
@camcybersec
@sector035
@accessosint

Top Mentioned in G9:
@p403n1xi
@us_cybercom
@afspace
@itu
@eff
@aclu
@ussocom
@faasafetybrief
@ungeneva
@intlcrimcourt

Top Mentioned in G10:
@ian_infosec
@eric_conrad
@nerdpyle
@ajohnsocyber
@restinbeachface
@teiss
@markmorow
@fpieces
@dragosinc
@tyrejim

Top Tweeters
Top Tweeters in Entire Graph:
@arkangelscrap
@sectest9
@javascriptd
@robre62
@cyberdomain
@nosqldigest
@applesupport
@edinburghwatch
@cybertoolsbooks
@webironbots

Top Tweeters in G1:
@sectest9
@nosqldigest
@cybertoolsbooks
@aaroncuddeback
@calcaware
@foxnews
@santchiweb
@ap
@cnet
@ham_gretsky

Top Tweeters in G2:
@webironbots
@aldoceccarelli
@csa_dvillamizar
@evanderburg
@joviannfeed
@pdp00000001
@c_randieri
@securitynewsbot
@mrsyiswhy
@weems

Top Tweeters in G3:
@cwindley
@smesecurity
@randileeharper
@nerdpyle
@hackerfantastic
@hacks4pancakes
@unix_guru
@darksim905
@kim_crawley
@nicoladiaz

Top Tweeters in G4:
@macandcheeks
@hurt_angle
@honey_bee2
@kay_suigeneris
@securityblog
@maesesonoro
@lite_matoi
@divinetechygirl
@unspokenvibes_
@picturepunxx

Top Tweeters in G5:
@ovidiug
@securitytube
@sasukeourad
@seguridadyredes
@abdullahalzakry
@tinolle
@crmunoz27
@the_yellow_fall
@jorge_delrio
@malwaredev

Top Tweeters in G6:
@krypt3ia
@triprr
@john_westra
@cxi
@atsen_
@infosechotspot
@cybersecboardrm
@jessesprawl
@infointuitive
@iianaisii

Top Tweeters in G7:
@arkangelscrap
@evankirstel
@chidambara09
@cnbc
@spirosmargaris
@ipfconline1
@wef
@nowthisnews
@wil_bielert
@vestedventures

Top Tweeters in G8:
@javascriptd
@fox19
@ku5h4l
@jayeshmthakur
@office365
@davehatter
@jbakerohio
@onedrive
@hervegotzila
@fsecure

Top Tweeters in G9:
@applesupport
@guardian
@peta
@rdsweb
@hrw
@satellitetrack
@markszaidesq
@hrc
@crewcrew
@ungeneva

Top Tweeters in G10:
@piratepartyint
@kara3864
@sauronsshadow
@girlgerms
@carmencrincoli
@selenalarson
@fpieces
@tyrejim
@esmechloedudoit
@duganchen


We use necessary cookies to make our site work. We’d like to set additional cookies to understand site usage, make site improvements and to remember your settings. We also use cookies set by other sites to help deliver content from their services.