Attivo Networks Blogs

12 Days of Cybersecurity Christmas

Reading Time: 2 minutes  |  Published: December 24, 2019 in Uncategorized

On the first day of Christmas a cyber attacker sent to me

A Trojan to access my PC

 

On the second day of Christmas a cyber attacker sent to me

Two root hole exploits

And Trojan to access my PC

 

On the third day of Christmas a cyber attacker sent to me

Three computer worms

Two root hole exploits

And Trojan to access my PC

 

On the fifth day of Christmas a cyber attacker sent to me

Five ransomware rings

Four crypto-miners

Three computer worms

Two root hole exploits

And Trojan to access my PC

 

On the sixth day of Christmas a cyber attacker sent to me

Six files infecting

Five ransomware rings

Four crypto-miners

Three computer worms

Two root hole exploits

And Trojan to access my PC

 

On the seventh day of Christmas a cyber attacker sent to me

Seven loggers spying

Six files infecting

Five ransomware rings

Four crypto-miners

Three computer worms

Two root hole exploits

And Trojan to access my PC

 

On the eighth day of Christmas a cyber attacker sent to me

Eight drive-by-downloads

Seven loggers spying

Six files infecting

Five ransomware rings

Four crypto-miners

Three computer worms

Two root hole exploits

And Trojan to access my PC

 

On the ninth day of Christmas a cyber attacker sent to me

Nine code-bombs ticking

Eight drive-by-downloads

Seven loggers spying

Six files infecting

Five ransomware rings

Four crypto-miners

Three computer worms

Two root hole exploits

And Trojan to access my PC

 

On the 10th day of Christmas a cyber attacker sent to me

Ten botnets scanning

Nine code-bombs ticking

Eight drive-by-downloads

Seven loggers spying

Six files infecting

Five ransomware rings

Four crypto-miners

Three computer worms

Two root hole exploits

And Trojan to access my PC

 

On the 11th day of Christmas a cyber attacker sent to me

Eleven scripts injecting

Ten botnets scanning

Nine code-bombs ticking

Eight drive-by-downloads

Seven loggers spying

Six files infecting

Five ransomware rings

Four crypto-miners

Three computer worms

Two root hole exploits

And Trojan to access my PC

 

On the 12th day of Christmas a cyber attacker sent to me

Twelve phishing emails (Wow – that discount looked great!)

Eleven scripts injecting

Ten botnets scanning

Nine code-bombs ticking

Eight drive-by-downloads

Seven loggers spying

Six files infecting

Five ransomware rings

Four crypto-miners

Three computer worms

Two root hole exploits

And Trojan to access my PC

 

Wishing you all a happy and safe holiday season!

 

Made in fun by Carolyn Crandall, Chief Deception Officer and CMO of Attivo Networks

 

No Comments

Post A Comment

three × two =