MiTRE SIEM PII Ransomware DNS Exploit Honeypot Spear Phishing Sandbox Keylogger Sim Swapping Malvertising 0- Day Cryptojacking Drive By Download Zero Trust Incident Assessment Virus EDR Clickjacking Spyware Breach IAM Authentication 2FA SSL BYOD Forensics SOAR Vulnerability BIA Inline Device CSOC Rootkit MFA IoT COOP PHI Greylist Fileless Malware Security MITM Cyber Encryption Darkweb Blacklist Insider Threat Attack Vector IOC COTS WAF SPAM Technology DLP Social Engineering Antivirus Phishing Adware Identity SaaS Threat Whitelist Malware IDS Endpoint DDOS Decryption Bruteforce RDP Firewall Patching Scareware CAPTCHA Anti- Malware IPS Blocklist Spoofing Hacker Botnet Anti- Phishing Nework VPN Safeguard CTI Sniffing Risk Backdoor APT Trojan MiTRE SIEM PII Ransomware DNS Exploit Honeypot Spear Phishing Sandbox Keylogger Sim Swapping Malvertising 0- Day Cryptojacking Drive By Download Zero Trust Incident Assessment Virus EDR Clickjacking Spyware Breach IAM Authentication 2FA SSL BYOD Forensics SOAR Vulnerability BIA Inline Device CSOC Rootkit MFA IoT COOP PHI Greylist Fileless Malware Security MITM Cyber Encryption Darkweb Blacklist Insider Threat Attack Vector IOC COTS WAF SPAM Technology DLP Social Engineering Antivirus Phishing Adware Identity SaaS Threat Whitelist Malware IDS Endpoint DDOS Decryption Bruteforce RDP Firewall Patching Scareware CAPTCHA Anti- Malware IPS Blocklist Spoofing Hacker Botnet Anti- Phishing Nework VPN Safeguard CTI Sniffing Risk Backdoor APT Trojan
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
MiTRE
SIEM
PII
Ransomware
DNS
Exploit
Honeypot
Spear Phishing
Sandbox
Keylogger
Sim Swapping
Malvertising
0-Day
Cryptojacking
Drive By Download
Zero Trust
Incident
Assessment
Virus
EDR
Clickjacking
Spyware
Breach
IAM
Authentication
2FA
SSL
BYOD
Forensics
SOAR
Vulnerability
BIA
Inline Device
CSOC
Rootkit
MFA
IoT
COOP
PHI
Greylist
Fileless Malware
Security
MITM
Cyber
Encryption
Darkweb
Blacklist
Insider Threat
Attack Vector
IOC
COTS
WAF
SPAM
Technology
DLP
Social Engineering
Antivirus
Phishing
Adware
Identity
SaaS
Threat
Whitelist
Malware
IDS
Endpoint
DDOS
Decryption
Bruteforce
RDP
Firewall
Patching
Scareware
CAPTCHA
Anti-Malware
IPS
Blocklist
Spoofing
Hacker
Botnet
Anti-Phishing
Nework
VPN
Safeguard
CTI
Sniffing
Risk
Backdoor
APT
Trojan