Dark Reading Cybersecurity Crossword Puzzle
May 15, 2020
Dark Reading's The Edge

Tired of crossword puzzles with the same tired clues? Can't survive a weekend without proving your infosec know-how? Just need another reason to snuggle up with Dark Reading? All of the above?

Then have a go and the new Dark Reading security crossword on the Edge. We believe in you. (And if you need a few hints, we know a good place to look for a few.)

Good luck! 


Revert
Check
Save
Submit
Reveal
Reveal Letter
Solution
Pencil
00:00
Across
  •  1 . AKA Triton, ICS malware that shut down Saudi petrochemical plant (6)

  •  3 . Amazon's personal assistant (or surveillance) device (5)

    [?]
  •  5 . Mountain Lion is its most famous OS (3)

  •  7 . white, black, or gray item (3)

  •  8 . old web attack still in use (4)

    [?]
  • 11. software security, for short (6)

    [?]
  • 12. Fancy, Cozy, or Energetic (4)

  • 13. what attackers do with SIM cards? (4)

  • 15. log in (12)

  • 18. ransomware known for long dwell time, human operators, that took down Tribune Publishing (4)

    [?]
  • 20. Jackson Higgins or Sheridan (5)

  • 21. the R in RSA (6)

  • 23. ransomware strain or a nice place to be (8)

  • 25. vuln being exploited in-the-wild (7)

  • 27. home base for security first responders (3)

  • 28. Def or Shmoo (3)

  • 29. type of biometric scanner (11)

    [?]
  • 31. something you have too many of (6)

    [?]
  • 34. embedded systems security researcher Ruben (10)

  • 36. European privacy law (4)

  • 37. way to head off privacy snafus (3)

    [?]
  • 38. microprocessor vulnerability (7)

  • 39. PoisonIvy, Dark Comet, or Blackshades (3)

  • 40. revealer of vulns on Patch Tuesday (9)

    [?]
  • Down
  •  1 . state that didn't pay ransom (5)

  •  2 . firm that bought Carbon Black in 2019 (6)

  •  4 . ever-popular web app flaw, for short (3)

    [?]
  •  6 . Bank that exposed 100M customers in 2019 in an S3 bucket leak (10)

  •  7 . healthcare privacy law (5)

  •  8 . California privacy law (4)

  •  9 . the Feds (3)

  • 10. key part of recovery efforts (7)

  • 14. wireless security protocol (3)

  • 16. AKA Trisis, ICS malware threatening US power grid (6)

    [?]
  • 17. might "borrow" bandwidth to dig for Bitcoin (11)

  • 18. team that finds your weak links (3)

  • 19. Elsa, or a breached cruise line (8)

  • 20. object needed to encrypt data or sing well (3)

  • 22. exploitable software bug, for short (4)

  • 24. Apple's mobile operating system (3)

  • 25. rigorous security architecture (9)

  • 26. individual who menaces your network (8)

  • 30. Source of nation-state actors Oilrig, Charming Kitten and APT39 (4)

    [?]
  • 32. Dark Reading features section (4)

  • 33. Apache framework exploited in Equifax breach (6)

  • 35. sophisticated attack group, for short (3)

  • 37. data security standard for payments (3)

  • Created with Raphaël 2.3.0
    1

    2

    3

    4

    5

    6

    7

    8

    9

    10

    11

    12

    13

    14

    15

    16

    17

    18

    19

    20

    21

    22

    23

    24

    25

    26

    27

    28

    29

    30

    31

    32

    33

    34

    35

    36

    37

    38

    39

    40

    PDF