Challenge yourself with puzzles designed to test and expand your knowledge of cybersecurity concepts, trends, and terminology. Whether you’re an expert or new to the field, these puzzles are a fun way to stay engaged with the latest in cybersecurity. 

Across:

2. Popular name for Russian group known as APT28

5. Group that targeted large tech companies in 2013

7. Common tactic using deceptive emails

Down:

1. Popular name for North Korean group behind WannaCry ransomware

3. Hacktivist collective known for Guy Fawkes masks

4. Ransomware group behind Colonial Pipeline attack

6. Extortion group led by teenagers that uses $ at the end of its name

Read Next

Special Episode: A Look at Cyber Policy in 2026 (DCP S2 E12)

For our second special episode of the Distilling Cyber Policy podcast, Alex and Jen from the Center are joined by experts to try and predict the future of cyber policy in the coming year, while reflecting on some of their previous prediction.

Offensive Cyber Operations with Stacy O’Mara and Leonard Bailey (DCP S2 11)

Offensive cyber activity has become a central policy conversation as governments worldwide rethink what tools are necessary to counter increasingly sophisticated threats.

2025 Year in Review: Advancing Cybersecurity Through Collaboration

In 2025, the cybersecurity ecosystem became more complex and we’ve seen governments rethink critical policy frameworks. Nonetheless, the Center has remained steadfast in strengthening cybersecurity through policy, collaboration, and education.