Challenge yourself with puzzles designed to test and expand your knowledge of cybersecurity concepts, trends, and terminology. Whether you’re an expert or new to the field, these puzzles are a fun way to stay engaged with the latest in cybersecurity.

Across:
1. A secret set of characters used for authentication
3. Process of converting information into a code
7. October marks National Cybersecurity ___ Month
8. The core of what cybersecurity aims to protect
Down:
1. Deceptive attempt to obtain sensitive information
2. Software that demands payment from users
4. Program developed by criminals to cause harm
5. Deceptive emails often request this personal code
6. Advisable action for compromised login credentials
Read Next
2025 Year in Review: Advancing Cybersecurity Through Collaboration
In 2025, the cybersecurity ecosystem became more complex and we’ve seen governments rethink critical policy frameworks. Nonetheless, the Center has remained steadfast in strengthening cybersecurity through policy, collaboration, and education.
FinCEN: Ransomware Payments Peaked in 2023
Ransomware payments peaked in 2023 at $1.1 billion with 1,512 reported incidents and dropped by a third to $734 million on 1,476 incidents in 2024, according to FinCEN.
Europe’s DMA: A Cybercriminal's Paradise?
Mobile devices serve many purposes and a single vulnerability can wreak havoc. This paper focuses on the DMA provisions around mobile OS's, identifies the key risks, and makes makes recommendations to void weakening the mobile ecosystem.
