Threat Risk Hacker Technology Forensics Inline Device Patching CAPTCHA Rootkit Identity Virus Malvertising Incident WAF SPAM Blacklist SaaS Whitelist DDOS Fileless Malware Nework Authentication MFA Attack Vector Vulnerability 2FA Malware Cryptojacking Breach IAM Decryption Antivirus MiTRE Spyware RDP Adware DLP Phishing BYOD Spear Phishing SSL Darkweb Bruteforce Encryption SOAR APT PII Assessment CTI Blocklist IOC EDR COOP Insider Threat CSOC Greylist Backdoor SIEM IoT Social Engineering Firewall Ransomware Safeguard BIA Anti- Malware Exploit MITM Drive By Download Cyber Botnet PHI VPN Keylogger COTS Clickjacking Endpoint Honeypot Trojan Scareware IDS Sniffing Sim Swapping DNS Zero Trust 0- Day Sandbox Spoofing IPS Anti- Phishing Security Threat Risk Hacker Technology Forensics Inline Device Patching CAPTCHA Rootkit Identity Virus Malvertising Incident WAF SPAM Blacklist SaaS Whitelist DDOS Fileless Malware Nework Authentication MFA Attack Vector Vulnerability 2FA Malware Cryptojacking Breach IAM Decryption Antivirus MiTRE Spyware RDP Adware DLP Phishing BYOD Spear Phishing SSL Darkweb Bruteforce Encryption SOAR APT PII Assessment CTI Blocklist IOC EDR COOP Insider Threat CSOC Greylist Backdoor SIEM IoT Social Engineering Firewall Ransomware Safeguard BIA Anti- Malware Exploit MITM Drive By Download Cyber Botnet PHI VPN Keylogger COTS Clickjacking Endpoint Honeypot Trojan Scareware IDS Sniffing Sim Swapping DNS Zero Trust 0- Day Sandbox Spoofing IPS Anti- Phishing Security
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Threat
Risk
Hacker
Technology
Forensics
Inline Device
Patching
CAPTCHA
Rootkit
Identity
Virus
Malvertising
Incident
WAF
SPAM
Blacklist
SaaS
Whitelist
DDOS
Fileless Malware
Nework
Authentication
MFA
Attack Vector
Vulnerability
2FA
Malware
Cryptojacking
Breach
IAM
Decryption
Antivirus
MiTRE
Spyware
RDP
Adware
DLP
Phishing
BYOD
Spear Phishing
SSL
Darkweb
Bruteforce
Encryption
SOAR
APT
PII
Assessment
CTI
Blocklist
IOC
EDR
COOP
Insider Threat
CSOC
Greylist
Backdoor
SIEM
IoT
Social Engineering
Firewall
Ransomware
Safeguard
BIA
Anti-Malware
Exploit
MITM
Drive By Download
Cyber
Botnet
PHI
VPN
Keylogger
COTS
Clickjacking
Endpoint
Honeypot
Trojan
Scareware
IDS
Sniffing
Sim Swapping
DNS
Zero Trust
0-Day
Sandbox
Spoofing
IPS
Anti-Phishing
Security