InsiderThreatDoSAttackApplicationAccessTokenShadowITCross-SiteScriptingCredentialReuseAttackCredentialDumpingCompromisedCredentialsZero-DayExploitBusinessEmailCompromiseOpenRedirectionSupplyChainAttackMeltdown& SpectreAttackSpywareDNSAmplificationDNSHijackingIoTThreatsPrivilegedUserCompromiseCryptojackingAttackAmazonWSAttacksMalwareWebSessionCookieTheftPhishingPasstheHashNetworkSniffingSocialEngineeringAttackPhishingPayloadsMan-in-the-MiddleAttackSpearPhishingCloudCryptominingAccountTakeoverCommandandControlAttackMaliciousPowershellDrive-byDownloadAttackBruteForceAttackAdvancedPersistentThreatBillFraudTypoSquattingRansomwareInfrastructureAttacksSimjackingDNSTunnelingWhalePhishingMasqueradeAttackWateringHoleAttackSQLInjectionMacroVirusesInsiderThreatDoSAttackApplicationAccessTokenShadowITCross-SiteScriptingCredentialReuseAttackCredentialDumpingCompromisedCredentialsZero-DayExploitBusinessEmailCompromiseOpenRedirectionSupplyChainAttackMeltdown& SpectreAttackSpywareDNSAmplificationDNSHijackingIoTThreatsPrivilegedUserCompromiseCryptojackingAttackAmazonWSAttacksMalwareWebSessionCookieTheftPhishingPasstheHashNetworkSniffingSocialEngineeringAttackPhishingPayloadsMan-in-the-MiddleAttackSpearPhishingCloudCryptominingAccountTakeoverCommandandControlAttackMaliciousPowershellDrive-byDownloadAttackBruteForceAttackAdvancedPersistentThreatBillFraudTypoSquattingRansomwareInfrastructureAttacksSimjackingDNSTunnelingWhalePhishingMasqueradeAttackWateringHoleAttackSQLInjectionMacroViruses

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
  1. Insider Threat
  2. DoS Attack
  3. Application Access Token
  4. Shadow IT
  5. Cross-Site Scripting
  6. Credential Reuse Attack
  7. Credential Dumping
  8. Compromised Credentials
  9. Zero-Day Exploit
  10. Business Email Compromise
  11. Open Redirection
  12. Supply Chain Attack
  13. Meltdown & Spectre Attack
  14. Spyware
  15. DNS Amplification
  16. DNS Hijacking
  17. IoT Threats
  18. Privileged User Compromise
  19. Cryptojacking Attack
  20. Amazon WS Attacks
  21. Malware
  22. Web Session Cookie Theft
  23. Phishing
  24. Pass the Hash
  25. Network Sniffing
  26. Social Engineering Attack
  27. Phishing Payloads
  28. Man-in-the-Middle Attack
  29. Spear Phishing
  30. Cloud Cryptomining
  31. Account Takeover
  32. Command and Control Attack
  33. Malicious Powershell
  34. Drive-by Download Attack
  35. Brute Force Attack
  36. Advanced Persistent Threat
  37. Bill Fraud
  38. Typo Squatting
  39. Ransomware
  40. Infrastructure Attacks
  41. Simjacking
  42. DNS Tunneling
  43. Whale Phishing
  44. Masquerade Attack
  45. Watering Hole Attack
  46. SQL Injection
  47. Macro Viruses