Challenge yourself with puzzles designed to test and expand your knowledge of cybersecurity concepts, trends, and terminology. Whether you’re an expert or new to the field, these puzzles are a fun way to stay engaged with the latest in cybersecurity.

Across:
2. Popular name for Russian group known as APT28
5. Group that targeted large tech companies in 2013
7. Common tactic using deceptive emails
Down:
1. Popular name for North Korean group behind WannaCry ransomware
3. Hacktivist collective known for Guy Fawkes masks
4. Ransomware group behind Colonial Pipeline attack
6. Extortion group led by teenagers that uses $ at the end of its name
Read Next
Not All Mitigations Are Created Equal: What We are Learning from AI Vulnerability Discovery
Much has been reported on the potential looming “vulnpocolypse” but in the meantime we should be focusing on the areas where immediate resources are needed.
S3 EP01: Digital Sovereignty, CSA 2.0, and PQC with MEP Bart Groothuis
In our latest Distilling Cyber Policy podcast, hosts Alex Botting and Jen Ellis kick off the season with a wide-ranging conversation on some of the biggest issues shaping cyber policy.
The Role of Cybersecurity Information-Sharing Amid Geopolitical Tensions
Recent military actions have heightened geopolitical tensions and with that comes an elevated cyber threat landscape. In this context, one reality stands out: information-sharing is more important than ever.
