ShadowITWhalePhishingPhishingPayloadsSimjackingCloudCryptominingNetworkSniffingDNSTunnelingAmazonWSAttacksDNSAmplificationPrivilegedUserCompromiseIoTThreatsDNSHijackingAccountTakeoverDoSAttackCredentialReuseAttackInfrastructureAttacksCredentialDumpingBillFraudSupplyChainAttackSQLInjectionPasstheHashCompromisedCredentialsBusinessEmailCompromiseMeltdown& SpectreAttackAdvancedPersistentThreatCommandandControlAttackApplicationAccessTokenWateringHoleAttackDrive-byDownloadAttackRansomwareWebSessionCookieTheftSocialEngineeringAttackZero-DayExploitOpenRedirectionSpearPhishingMan-in-the-MiddleAttackCryptojackingAttackMacroVirusesSpywareCross-SiteScriptingPhishingMalwareMaliciousPowershellMasqueradeAttackInsiderThreatBruteForceAttackTypoSquattingShadowITWhalePhishingPhishingPayloadsSimjackingCloudCryptominingNetworkSniffingDNSTunnelingAmazonWSAttacksDNSAmplificationPrivilegedUserCompromiseIoTThreatsDNSHijackingAccountTakeoverDoSAttackCredentialReuseAttackInfrastructureAttacksCredentialDumpingBillFraudSupplyChainAttackSQLInjectionPasstheHashCompromisedCredentialsBusinessEmailCompromiseMeltdown& SpectreAttackAdvancedPersistentThreatCommandandControlAttackApplicationAccessTokenWateringHoleAttackDrive-byDownloadAttackRansomwareWebSessionCookieTheftSocialEngineeringAttackZero-DayExploitOpenRedirectionSpearPhishingMan-in-the-MiddleAttackCryptojackingAttackMacroVirusesSpywareCross-SiteScriptingPhishingMalwareMaliciousPowershellMasqueradeAttackInsiderThreatBruteForceAttackTypoSquatting

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
  1. Shadow IT
  2. Whale Phishing
  3. Phishing Payloads
  4. Simjacking
  5. Cloud Cryptomining
  6. Network Sniffing
  7. DNS Tunneling
  8. Amazon WS Attacks
  9. DNS Amplification
  10. Privileged User Compromise
  11. IoT Threats
  12. DNS Hijacking
  13. Account Takeover
  14. DoS Attack
  15. Credential Reuse Attack
  16. Infrastructure Attacks
  17. Credential Dumping
  18. Bill Fraud
  19. Supply Chain Attack
  20. SQL Injection
  21. Pass the Hash
  22. Compromised Credentials
  23. Business Email Compromise
  24. Meltdown & Spectre Attack
  25. Advanced Persistent Threat
  26. Command and Control Attack
  27. Application Access Token
  28. Watering Hole Attack
  29. Drive-by Download Attack
  30. Ransomware
  31. Web Session Cookie Theft
  32. Social Engineering Attack
  33. Zero-Day Exploit
  34. Open Redirection
  35. Spear Phishing
  36. Man-in-the-Middle Attack
  37. Cryptojacking Attack
  38. Macro Viruses
  39. Spyware
  40. Cross-Site Scripting
  41. Phishing
  42. Malware
  43. Malicious Powershell
  44. Masquerade Attack
  45. Insider Threat
  46. Brute Force Attack
  47. Typo Squatting