Shadow IT Whale Phishing Phishing Payloads Simjacking Cloud Cryptomining Network Sniffing DNS Tunneling Amazon WS Attacks DNS Amplification Privileged User Compromise IoT Threats DNS Hijacking Account Takeover DoS Attack Credential Reuse Attack Infrastructure Attacks Credential Dumping Bill Fraud Supply Chain Attack SQL Injection Pass the Hash Compromised Credentials Business Email Compromise Meltdown & Spectre Attack Advanced Persistent Threat Command and Control Attack Application Access Token Watering Hole Attack Drive-by Download Attack Ransomware Web Session Cookie Theft Social Engineering Attack Zero- Day Exploit Open Redirection Spear Phishing Man-in- the- Middle Attack Cryptojacking Attack Macro Viruses Spyware Cross- Site Scripting Phishing Malware Malicious Powershell Masquerade Attack Insider Threat Brute Force Attack Typo Squatting Shadow IT Whale Phishing Phishing Payloads Simjacking Cloud Cryptomining Network Sniffing DNS Tunneling Amazon WS Attacks DNS Amplification Privileged User Compromise IoT Threats DNS Hijacking Account Takeover DoS Attack Credential Reuse Attack Infrastructure Attacks Credential Dumping Bill Fraud Supply Chain Attack SQL Injection Pass the Hash Compromised Credentials Business Email Compromise Meltdown & Spectre Attack Advanced Persistent Threat Command and Control Attack Application Access Token Watering Hole Attack Drive-by Download Attack Ransomware Web Session Cookie Theft Social Engineering Attack Zero- Day Exploit Open Redirection Spear Phishing Man-in- the- Middle Attack Cryptojacking Attack Macro Viruses Spyware Cross- Site Scripting Phishing Malware Malicious Powershell Masquerade Attack Insider Threat Brute Force Attack Typo Squatting
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Shadow IT
Whale Phishing
Phishing Payloads
Simjacking
Cloud Cryptomining
Network Sniffing
DNS Tunneling
Amazon WS Attacks
DNS Amplification
Privileged User Compromise
IoT Threats
DNS Hijacking
Account Takeover
DoS Attack
Credential Reuse Attack
Infrastructure Attacks
Credential Dumping
Bill Fraud
Supply Chain Attack
SQL Injection
Pass the Hash
Compromised Credentials
Business Email Compromise
Meltdown & Spectre Attack
Advanced Persistent Threat
Command and Control Attack
Application Access Token
Watering Hole Attack
Drive-by Download Attack
Ransomware
Web Session Cookie Theft
Social Engineering Attack
Zero-Day Exploit
Open Redirection
Spear Phishing
Man-in-the-Middle Attack
Cryptojacking Attack
Macro Viruses
Spyware
Cross-Site Scripting
Phishing
Malware
Malicious Powershell
Masquerade Attack
Insider Threat
Brute Force Attack
Typo Squatting