Emerging Cyber Threats and Attack Vectors Puzzle

1234567
Across
  1. 1. Cyberattack method involving reused login credentials
  2. 5. Field focused on protecting digital information from unauthorized access
  3. 7. A type of cyberattack where attackers demand payment to restore access
Down
  1. 2. A breach involving an entertainment company that revealed weaknesses in cybersecurity
  2. 3. A technique that makes it hard for attackers to distinguish between real and decoy assets
  3. 4. A famous malware that targeted industrial control systems, raising concerns over cyber warfare
  4. 6. Name of the ransomware known for using traditional tradecraft in its attacks