AI, It's What's for Dinner
Secure or Nah?
Breach the News
Whoop Whoop, It's the Policy Police
Hacker Lingo
100

This term describes fake videos or audio created using AI to impersonate someone.

Deepfakes

100

This type of password is stronger than old-school passwords by being longer and using multiple words

Passphrase

100

This Major Casino and hotel chain was hit by a ransomware attack in 2023 that disrupted its services in Las Vegas

MGM Resorts

100

Among other things, this annual/onboarding training is required of all staff so that they are familiar with Cyber policies and best practices.

InfoSec 2025

100

This term refers to a vulnerability that hasn’t been patched or disclosed.

Zero-Day

200

ChatGPT is an example of a LLM. What does LLM Stand for?

Large Language Model

200

This portion of the "Sender" field is easy to edit and is fully customizable.

The Alias

200

The U.S. State Department was breached in 2023 using a Microsoft cloud vulnerability by which foreign entity?

Chinese Government

200

This training/list is aimed at educating developers of modern cyberthreats and updates their standards every 3–4 years for their top recommendations.

OWASP Top 10 

200

This term refers to an email attack that requires action from the end user.

Zero-Click Attack

300

AI chatbots try to emulate this element of human communication in their email phishing schemes

Natural Language

300

This portion of the "Sender" field is much more difficult to customize or copy.

The Sender Domain

300

In Feb 2024, this Healthcare group was compromised by “BlackCat (ALPHV)”.

Change Healthcare – UnitedHealth Group subsidiary

300

This type of company document outlines how you’re allowed to use company computers.

Acceptable Use Policy (AUP)

300

This term describes hackers who work ethically to find vulnerabilities so they can be patched.

White-Hat Hacker

400

This AI attack technique uses models instead of human development to create phishing attacks.

Generative Phishing

400

This extra step helps to protect your account even if your credentials are stolen.

MFA (Multi-Factor Authentication)

400

In July 2024, a faulty update with this software caused widespread disruptions for Microsoft Windows users globally.

CrowdStrike’s Falcon Sensor

400

If an organization handles credit card information, it must comply with this regulatory framework.

PCI-DSS

400

These hackers have very little skills, relying on scripts to do most of the work.

Script Kiddies

500

Using unapproved AI in a work setting is known as?

Shadow AI

500

Reusing this across multiple accounts can turn one breach into many.

Passwords

500

This Energy/Digital automation company was breached in late 2024 confirming “Hellcat” as the attackers. They demanded a $125,000 ransom

Schneider Electric

500

This regulatory framework gives guidance on how to protect health information.

HIPAA

500

A piece of software, set of data, or sequence of commands that takes advantage of a bug or vulnerability is called an ___.

Exploit

M
e
n
u