Used words
Overlay
Attacks
Man-in-the-Middle
Malware
Infections
SIM
Swapping
Phishing
Smishing
Vishing
Credential
Stuffing
Brute
Force
Password
Spraying
Account
Takeover
Denial-of-Service
Botnet
SQL
Injection
Remote
File
Inclusion
XML
External
Entity
Web
Application
Firewall
Bypass
Clickjacking
Insider
Threats
IoT-based
Invoice
Fraud
Weak
Encryption
and
Insecure
Data
Storage
Supply
Chain
API
Biometric
Spoofing
Cross-Site
Scripting
(XSS)
Cross-App
Geolocation
Drive-by
Downloads
Side-Channel
Memory
Corruption
Zero-Day
Exploits
Mobile
Ransomware
Social
Engineering
Malvertising
Homograph
Create your own