Bill Fraud Cross- Site Scripting Typo Squatting Application Access Token Social Engineering Attack Simjacking Credential Dumping DoS Attack Command and Control Attack Compromised Credentials Insider Threat Spear Phishing Zero- Day Exploit Masquerade Attack Shadow IT IoT Threats Ransomware Malicious Powershell Cloud Cryptomining Business Email Compromise Phishing Drive-by Download Attack Account Takeover Spyware Malware DNS Hijacking Advanced Persistent Threat Web Session Cookie Theft Pass the Hash Cryptojacking Attack Macro Viruses DNS Amplification Credential Reuse Attack SQL Injection Man-in- the- Middle Attack Privileged User Compromise Whale Phishing Infrastructure Attacks Brute Force Attack Supply Chain Attack DNS Tunneling Watering Hole Attack Phishing Payloads Meltdown & Spectre Attack Network Sniffing Amazon WS Attacks Open Redirection Bill Fraud Cross- Site Scripting Typo Squatting Application Access Token Social Engineering Attack Simjacking Credential Dumping DoS Attack Command and Control Attack Compromised Credentials Insider Threat Spear Phishing Zero- Day Exploit Masquerade Attack Shadow IT IoT Threats Ransomware Malicious Powershell Cloud Cryptomining Business Email Compromise Phishing Drive-by Download Attack Account Takeover Spyware Malware DNS Hijacking Advanced Persistent Threat Web Session Cookie Theft Pass the Hash Cryptojacking Attack Macro Viruses DNS Amplification Credential Reuse Attack SQL Injection Man-in- the- Middle Attack Privileged User Compromise Whale Phishing Infrastructure Attacks Brute Force Attack Supply Chain Attack DNS Tunneling Watering Hole Attack Phishing Payloads Meltdown & Spectre Attack Network Sniffing Amazon WS Attacks Open Redirection
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Bill Fraud
Cross-Site Scripting
Typo Squatting
Application Access Token
Social Engineering Attack
Simjacking
Credential Dumping
DoS Attack
Command and Control Attack
Compromised Credentials
Insider Threat
Spear Phishing
Zero-Day Exploit
Masquerade Attack
Shadow IT
IoT Threats
Ransomware
Malicious Powershell
Cloud Cryptomining
Business Email Compromise
Phishing
Drive-by Download Attack
Account Takeover
Spyware
Malware
DNS Hijacking
Advanced Persistent Threat
Web Session Cookie Theft
Pass the Hash
Cryptojacking Attack
Macro Viruses
DNS Amplification
Credential Reuse Attack
SQL Injection
Man-in-the-Middle Attack
Privileged User Compromise
Whale Phishing
Infrastructure Attacks
Brute Force Attack
Supply Chain Attack
DNS Tunneling
Watering Hole Attack
Phishing Payloads
Meltdown & Spectre Attack
Network Sniffing
Amazon WS Attacks
Open Redirection