A spot-the-threat challenge with 8 hidden cybersecurity risks

12345678
Across
  1. 1. Software that secretly gathers information about a person or organization without their knowledge.
  2. 3. A cyberattack where a person or program disitself guises as another by falsifying data to gain an advantage.
  3. 6. A type of malware disguised as legitimate software that tricks users into installing it.
  4. 7. Malicious software designed to harm, exploit, or disable computers and networks.
  5. 8. Synthetic media in which a person in an image or video is replaced with someone else's likeness using AI.
Down
  1. 2. A type of cyberattack where attackers pretend to be a trustworthy entity to steal sensitive information.
  2. 4. A type of malware that locks or encrypts data and demands payment for its release.
  3. 5. A network of private computers infected with malicious software and controlled as a group.