Across
- 2. This malware name is brutally honest.
- 5. “When an attacker pretends to be you… which is rude, because you barely want to be you on Mondays.”
- 7. When sensitive information goes on an unsanctioned field trip.
- 8. Group that treats mass extortion like a quarterly business plan.
- 9. Paranoia with governance—and for once that’s a compliment.
- 14. Attack when session tokens went sightseeing.
- 15. The file transfer brand that learned what “blast radius” means.
- 17. The business model that turns backups from “nice to have” into “board‑level KPI.”
- 18. When bash said: ‘I’ll run whatever you put in here, no questions asked.’
- 21. A deliciously fake host that flatters attackers into oversharing their techniques.
- 22. Thousands of machines working together to ruin someone’s day. Teamwork!
- 23. Why adversaries hack who you trust instead of hacking you—because efficiency matters, even in crime.
Down
- 1. The internet’s basement—less spiders than expected, more stolen credentials than desired.
- 3. The franchised ransomware brand with more press releases than your product launch.
- 4. Your network’s bouncer; denies service to anyone not on the list (and some who are).
- 6. The bug that made everyone learn what memory feels like when it overshares
- 10. The door that was “definitely locked” until someone checked the logs.
- 11. Not a horse, but still extremely good at hosting guests you didn’t invite.
- 12. One zeroday log message to rule them all—and to invite remote code execution in for tea.
- 13. words -
- 16. That “urgent password reset” that somehow always lands 5 minutes before lunch.
- 19. “Did someone say free database access?”
- 20. Your keyboard’s diary—written without consent.
