Cyber Attacks
Popular TV Series
Risky Business
What's Trendy
AI in Cybersecurity
100

This term refers to phishing attacks specifically conducted over voice calls or VoIP.

What is Vishing?

100

The series that turned a giant “Red Light, Green Light” doll and the dalgona candy carving challenge into global memes.

What is Squid Game?

100

Used by lenders to estimate default likelihood, this three-digit number summarizes payment history, utilization, and credit mix.

What is a credit score? e.g. FICO

100

These snap-in charms let wearers personalize their clogs with letters, icons, and mini figures.

What are Jibbitz?

100

This OpenAI model generates minute‑long, realistic videos directly from text prompts

What is Sora?

200

A highly targeted phishing attack aimed specifically at senior executives or high-profile individuals.

What is Whaling?

200

This HBO epic series, based on George R.R. Martin's novels, features a battle for control of the Seven Kingdoms of Westeros.

What is Game of Thrones?

200

This living list tracks identified risks, their owners, ratings, and planned actions over time.

What is a risk register?

200

These medications aid weight loss by mimicking a gut hormone to increase satiety, reduce appetite, and slow gastric emptying

What are GLP‑1 receptor agonists—incretin mimetics? (GLP-1 is acceptable answer)

200

This “self‑learning” platform models normal behavior to spot anomalies and can autonomously contain threats across email, cloud, and network.

What is Darktrace?

300

Abbreviated as BEC, this type of phishing targets companies to conduct unauthorized transfers of funds.

What is Business Email Compromise?

300

This 1980s-set sci-fi series follows a group of kids in Hawkins, Indiana, as they battle creatures from an alternate dimension.

What is Stranger Things?

300

Established by Visa, Mastercard, AmEx, Discover, and JCB, this global standard sets 12 requirements to protect cardholder data.

What is PCI DSS?

300

Making a retro comeback in everyday fits, this classic Adidas sneaker became a staple of Gen Z street style.

What are Adidas Sambas?

300

 In AI-driven defense, this technique involves establishing a "baseline" of normal user behavior and flagging any activity that deviates from it as a potential threat.

What is Anomaly Detection (or Behavioral Analytics)?

400

Tracked as UNC3944/Octo Tempest and working with ALPHV/BlackCat, this social-engineering crew led the 2023 breach of MGM’s systems.

Who is Scattered Spider?

400

This critically acclaimed drama follows the power struggles of the Roy family, owners of a global media and entertainment conglomerate.

What is Succession?

400

This nonprofit issues A+–F marketplace trust ratings for businesses based on complaint handling, transparency, licensing, and advertising practices.

What is the Better Business Bureau—BBB?)

400

This K‑beauty ideal emphasizes a luminous, poreless, almost reflective complexion achieved through layered hydration and barrier-first care.

What is glass skin?

400

A specific attack where a user provides a Large Language Model (LLM) with carefully crafted text designed to ignore its safety filters and original instructions.

What is Prompt Injection (or Jailbreaking)?

500

Hit by a zero-day SQL injection in May 2023 (CVE-2023-34362), this Progress Software product’s compromise led to mass data exfiltration across hundreds of organizations

What is MOVEit Transfer?

500

In its second season, the Viscount’s marriage hunt becomes a slow-burn enemies-to-lovers arc with Kate Sharma—complete with a memorable bee scene.

What is Bridgerton?

500

Known as “bad” cholesterol, higher levels of this lab value raise atherosclerosis and heart disease risk.

What is LDL cholesterol?

500

Popularized on TikTok in early 2024, this personal finance trend encourages openly prioritizing savings and saying “no” to pricey plans.

What is loud budgeting?

500

An attack that occurs during the AI's development phase, where a malicious actor corrupts the training data to create a "backdoor" or permanent bias in the resulting model.

What is Data Poisoning?

M
e
n
u