Zero Trust Exploit DDOS Social Engineering Blocklist Safeguard SOAR Darkweb Encryption DNS SIEM PHI Fileless Malware SPAM CSOC Security Risk IoT IPS Malware Endpoint Cryptojacking Inline Device Scareware Rootkit Bruteforce VPN SaaS Backdoor COTS Ransomware Whitelist Clickjacking Drive By Download WAF Malvertising Incident Patching Authentication Identity Sim Swapping Assessment Antivirus Spoofing IDS Keylogger Threat COOP BIA CTI Botnet MFA Trojan Forensics EDR PII Sniffing CAPTCHA IOC Anti- Malware Virus DLP Nework Honeypot Hacker Spear Phishing Blacklist BYOD Breach Attack Vector Cyber Vulnerability Decryption 0- Day RDP IAM Adware MiTRE SSL Sandbox Spyware Firewall Greylist Insider Threat Technology MITM APT Anti- Phishing Phishing 2FA Zero Trust Exploit DDOS Social Engineering Blocklist Safeguard SOAR Darkweb Encryption DNS SIEM PHI Fileless Malware SPAM CSOC Security Risk IoT IPS Malware Endpoint Cryptojacking Inline Device Scareware Rootkit Bruteforce VPN SaaS Backdoor COTS Ransomware Whitelist Clickjacking Drive By Download WAF Malvertising Incident Patching Authentication Identity Sim Swapping Assessment Antivirus Spoofing IDS Keylogger Threat COOP BIA CTI Botnet MFA Trojan Forensics EDR PII Sniffing CAPTCHA IOC Anti- Malware Virus DLP Nework Honeypot Hacker Spear Phishing Blacklist BYOD Breach Attack Vector Cyber Vulnerability Decryption 0- Day RDP IAM Adware MiTRE SSL Sandbox Spyware Firewall Greylist Insider Threat Technology MITM APT Anti- Phishing Phishing 2FA
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Zero Trust
Exploit
DDOS
Social Engineering
Blocklist
Safeguard
SOAR
Darkweb
Encryption
DNS
SIEM
PHI
Fileless Malware
SPAM
CSOC
Security
Risk
IoT
IPS
Malware
Endpoint
Cryptojacking
Inline Device
Scareware
Rootkit
Bruteforce
VPN
SaaS
Backdoor
COTS
Ransomware
Whitelist
Clickjacking
Drive By Download
WAF
Malvertising
Incident
Patching
Authentication
Identity
Sim Swapping
Assessment
Antivirus
Spoofing
IDS
Keylogger
Threat
COOP
BIA
CTI
Botnet
MFA
Trojan
Forensics
EDR
PII
Sniffing
CAPTCHA
IOC
Anti-Malware
Virus
DLP
Nework
Honeypot
Hacker
Spear Phishing
Blacklist
BYOD
Breach
Attack Vector
Cyber
Vulnerability
Decryption
0-Day
RDP
IAM
Adware
MiTRE
SSL
Sandbox
Spyware
Firewall
Greylist
Insider Threat
Technology
MITM
APT
Anti-Phishing
Phishing
2FA