This type of threat actor works for a government and often conducts espionage.
Nation-State Attackers
This attack tricks users into giving up passwords through fake emails.
Phishing
This website lets analysts check if a file hash is known malware.
VirusTotal
Employees keep getting phished — enable this second authentication factor.
MFA
Emotet
Malware
These attackers are often beginners who rely on pre-made tools and scripts rather than creating their own exploits.
Script Kiddies
Malware that locks files and demands payment.
Ransomware
This framework helps analysts map attacker behavior to known techniques.
MITRE ATT&CK
Your company hasn't patched servers in months. What should you improve?
Patch Management
DarkSide
Hacker Group
These attackers are often politically motivated and may deface websites to spread a message.
Hacktivists
An attack that floods a system with traffic to take it offline.
DDoS
This security team monitors alerts and responds to threats in real time.
SOC
Employees use the same password everywhere. What should you implement?
Password Manager
Behemoth
Metal Band
APT stands for this phrase used to describe highly skilled and persistent threat groups.
Advanced Persistent Threat
This attack attempts thousands of password combinations automatically.
Brute-Force Attack
These analysts proactively search for hidden threats that automated systems missed.
Threat Hunters
Your network lacks visibility into threats and alerts. What system should you deploy?
SIEM
TrickBot
Malware
This famous hacking group linked to North Korea has been connected to bank and crypto heists.
Lazarus Group
Attackers exploiting reused passwords across many websites are performing this attack.
Credential Stuffing
Ghidra is a free, open-source software reverse engineering (SRE) framework developed by the National Security Agency (NSA).
Ghidra
Executives want to know what threats target their industry. What service do you provide?
Threat Intelligence
Sandworm
Hacker Group