This term describes fake videos or audio created using AI to impersonate someone.
Deepfakes
This type of password is stronger than old-school passwords by being longer and using multiple words
Passphrase
This Major Casino and hotel chain was hit by a ransomware attack in 2023 that disrupted its services in Las Vegas
MGM Resorts
Among other things, this annual/onboarding training is required of all staff so that they are familiar with Cyber policies and best practices.
InfoSec 2025
This term refers to a vulnerability that hasn’t been patched or disclosed.
Zero-Day
ChatGPT is an example of a LLM. What does LLM Stand for?
Large Language Model
This portion of the "Sender" field is easy to edit and is fully customizable.
The Alias
The U.S. State Department was breached in 2023 using a Microsoft cloud vulnerability by which foreign entity?
Chinese Government
This training/list is aimed at educating developers of modern cyberthreats and updates their standards every 3–4 years for their top recommendations.
OWASP Top 10
This term refers to an email attack that requires action from the end user.
Zero-Click Attack
AI chatbots try to emulate this element of human communication in their email phishing schemes
Natural Language
This portion of the "Sender" field is much more difficult to customize or copy.
The Sender Domain
In Feb 2024, this Healthcare group was compromised by “BlackCat (ALPHV)”.
Change Healthcare – UnitedHealth Group subsidiary
This type of company document outlines how you’re allowed to use company computers.
Acceptable Use Policy (AUP)
This term describes hackers who work ethically to find vulnerabilities so they can be patched.
White-Hat Hacker
This AI attack technique uses models instead of human development to create phishing attacks.
Generative Phishing
This extra step helps to protect your account even if your credentials are stolen.
MFA (Multi-Factor Authentication)
In July 2024, a faulty update with this software caused widespread disruptions for Microsoft Windows users globally.
CrowdStrike’s Falcon Sensor
If an organization handles credit card information, it must comply with this regulatory framework.
PCI-DSS
These hackers have very little skills, relying on scripts to do most of the work.
Script Kiddies
Using unapproved AI in a work setting is known as?
Shadow AI
Reusing this across multiple accounts can turn one breach into many.
Passwords
This Energy/Digital automation company was breached in late 2024 confirming “Hellcat” as the attackers. They demanded a $125,000 ransom
Schneider Electric
This regulatory framework gives guidance on how to protect health information.
HIPAA
A piece of software, set of data, or sequence of commands that takes advantage of a bug or vulnerability is called an ___.
Exploit