12 Days of Cybersecurity Christmas
Reading Time: 2 minutes | Published: December 24, 2019 in Uncategorized
Tags: Christmas, cybersecurity
On the first day of Christmas a cyber attacker sent to me
A Trojan to access my PC
On the second day of Christmas a cyber attacker sent to me
Two root hole exploits
And Trojan to access my PC
On the third day of Christmas a cyber attacker sent to me
Three computer worms
Two root hole exploits
And Trojan to access my PC
On the fifth day of Christmas a cyber attacker sent to me
Five ransomware rings
Four crypto-miners
Three computer worms
Two root hole exploits
And Trojan to access my PC
On the sixth day of Christmas a cyber attacker sent to me
Six files infecting
Five ransomware rings
Four crypto-miners
Three computer worms
Two root hole exploits
And Trojan to access my PC
On the seventh day of Christmas a cyber attacker sent to me
Seven loggers spying
Six files infecting
Five ransomware rings
Four crypto-miners
Three computer worms
Two root hole exploits
And Trojan to access my PC
On the eighth day of Christmas a cyber attacker sent to me
Eight drive-by-downloads
Seven loggers spying
Six files infecting
Five ransomware rings
Four crypto-miners
Three computer worms
Two root hole exploits
And Trojan to access my PC
On the ninth day of Christmas a cyber attacker sent to me
Nine code-bombs ticking
Eight drive-by-downloads
Seven loggers spying
Six files infecting
Five ransomware rings
Four crypto-miners
Three computer worms
Two root hole exploits
And Trojan to access my PC
On the 10th day of Christmas a cyber attacker sent to me
Ten botnets scanning
Nine code-bombs ticking
Eight drive-by-downloads
Seven loggers spying
Six files infecting
Five ransomware rings
Four crypto-miners
Three computer worms
Two root hole exploits
And Trojan to access my PC
On the 11th day of Christmas a cyber attacker sent to me
Eleven scripts injecting
Ten botnets scanning
Nine code-bombs ticking
Eight drive-by-downloads
Seven loggers spying
Six files infecting
Five ransomware rings
Four crypto-miners
Three computer worms
Two root hole exploits
And Trojan to access my PC
On the 12th day of Christmas a cyber attacker sent to me
Twelve phishing emails (Wow – that discount looked great!)
Eleven scripts injecting
Ten botnets scanning
Nine code-bombs ticking
Eight drive-by-downloads
Seven loggers spying
Six files infecting
Five ransomware rings
Four crypto-miners
Three computer worms
Two root hole exploits
And Trojan to access my PC
Wishing you all a happy and safe holiday season!
Made in fun by Carolyn Crandall, Chief Deception Officer and CMO of Attivo Networks
Share on:
Continue Reading
Free Active Directory Assessment
Get Visibility Into Privilege And Service Account Exposure
For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.
Try Our Endpoint Detection Net (EDN) for Free
FAST AND EASY
Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.
Newsletter Signup
ADSecure 90-Day Free Trial
GET PROTECTION AGAINST UNAUTHORIZED ACCESS TO ACTIVE DIRECTORY
- Hide and deny access to AD objects
- Get alerted on unauthorized queries
- Attack details easily viewable in dashboard
- Your data remains on-premise