Decryption Endpoint VPN Adware Keylogger MITM Inline Device EDR IoT Blacklist Backdoor BYOD Nework Malvertising Botnet Encryption Antivirus CSOC DLP MiTRE Technology CTI Greylist Vulnerability Breach Hacker Firewall IOC IPS COTS Spear Phishing Darkweb Safeguard Virus Trojan Spoofing PHI 2FA Sniffing DDOS Identity Sim Swapping Risk Phishing Insider Threat DNS SaaS Spyware Cryptojacking SPAM Scareware SIEM Whitelist Forensics Clickjacking Attack Vector MFA Blocklist Sandbox Ransomware Authentication Zero Trust IAM BIA Bruteforce Fileless Malware Security WAF Cyber CAPTCHA 0- Day IDS Honeypot Exploit PII RDP Assessment Anti- Malware Threat SOAR Patching Incident SSL APT Rootkit Anti- Phishing Social Engineering COOP Malware Drive By Download Decryption Endpoint VPN Adware Keylogger MITM Inline Device EDR IoT Blacklist Backdoor BYOD Nework Malvertising Botnet Encryption Antivirus CSOC DLP MiTRE Technology CTI Greylist Vulnerability Breach Hacker Firewall IOC IPS COTS Spear Phishing Darkweb Safeguard Virus Trojan Spoofing PHI 2FA Sniffing DDOS Identity Sim Swapping Risk Phishing Insider Threat DNS SaaS Spyware Cryptojacking SPAM Scareware SIEM Whitelist Forensics Clickjacking Attack Vector MFA Blocklist Sandbox Ransomware Authentication Zero Trust IAM BIA Bruteforce Fileless Malware Security WAF Cyber CAPTCHA 0- Day IDS Honeypot Exploit PII RDP Assessment Anti- Malware Threat SOAR Patching Incident SSL APT Rootkit Anti- Phishing Social Engineering COOP Malware Drive By Download
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Decryption
Endpoint
VPN
Adware
Keylogger
MITM
Inline Device
EDR
IoT
Blacklist
Backdoor
BYOD
Nework
Malvertising
Botnet
Encryption
Antivirus
CSOC
DLP
MiTRE
Technology
CTI
Greylist
Vulnerability
Breach
Hacker
Firewall
IOC
IPS
COTS
Spear Phishing
Darkweb
Safeguard
Virus
Trojan
Spoofing
PHI
2FA
Sniffing
DDOS
Identity
Sim Swapping
Risk
Phishing
Insider Threat
DNS
SaaS
Spyware
Cryptojacking
SPAM
Scareware
SIEM
Whitelist
Forensics
Clickjacking
Attack Vector
MFA
Blocklist
Sandbox
Ransomware
Authentication
Zero Trust
IAM
BIA
Bruteforce
Fileless Malware
Security
WAF
Cyber
CAPTCHA
0-Day
IDS
Honeypot
Exploit
PII
RDP
Assessment
Anti-Malware
Threat
SOAR
Patching
Incident
SSL
APT
Rootkit
Anti-Phishing
Social Engineering
COOP
Malware
Drive By Download