Challenge yourself with puzzles designed to test and expand your knowledge of cybersecurity concepts, trends, and terminology. Whether you’re an expert or new to the field, these puzzles are a fun way to stay engaged with the latest in cybersecurity. 

Across:

1. A secret set of characters used for authentication

3. Process of converting information into a code

7. October marks National Cybersecurity ___ Month

8. The core of what cybersecurity aims to protect

Down:

1. Deceptive attempt to obtain sensitive information

2. Software that demands payment from users

4. Program developed by criminals to cause harm

5. Deceptive emails often request this personal code

6. Advisable action for compromised login credentials

Read Next

CyberNext BRU 2026 Recap

The Cybersecurity Coalition and the Cyber Threat Alliance hosted the third annual CyberNext BRU bringing together panelists from EU institutions, industry, and academia.

Protecting Good-Faith Security Research: Building Legal Certainty Through NIS 2

Protect critical infrastructure or protect yourself. That is the untenable choice good-faith security researchers face. In much of Europe and beyond, laws still fail to clearly distinguish legitimate security research from malicious hacking.

Not All Mitigations Are Created Equal: What We are Learning from AI Vulnerability Discovery

Much has been reported on the potential looming “vulnpocolypse” but in the meantime we should be focusing on the areas where immediate resources are needed.