Inside the ransomware playbook

123456789101112
Across
  1. 3. - Notorious group known for exploiting vulnerabilities for profit
  2. 6. - The tool of choice for a thief who likes to play hide and seek
  3. 9. - The process of scrambling information to keep it secret
  4. 11. - The principle of limiting access based on user needs
  5. 12. - Protocol used for authentication in Microsoft networks
Down
  1. 1. - Crafty crew that snatches your secrets without a sword
  2. 2. - Ritual of sharpening defenses to keep the bad guys at bay
  3. 4. - Structured guide that outlines how to respond to threats
  4. 5. - Secretive moves of an attacker, often hidden in plain sight
  5. 7. - The secret playbook of cyber mischief-makers
  6. 8. - Legendary flaw that opens doors without knocking
  7. 10. - Ransomware tactic that involves manipulating security software