InfrastructureAttacksMacroVirusesIoTThreatsSpearPhishingBruteForceAttackMalwareSpywareMeltdown& SpectreAttackAccountTakeoverMan-in-the-MiddleAttackCross-SiteScriptingRansomwareSQLInjectionDNSAmplificationSocialEngineeringAttackDNSHijackingCryptojackingAttackDNSTunnelingCommandandControlAttackOpenRedirectionNetworkSniffingZero-DayExploitInsiderThreatBillFraudSupplyChainAttackWhalePhishingCredentialDumpingDrive-byDownloadAttackAmazonWSAttacksMaliciousPowershellCompromisedCredentialsPasstheHashTypoSquattingWebSessionCookieTheftPhishingPayloadsWateringHoleAttackCredentialReuseAttackAdvancedPersistentThreatApplicationAccessTokenMasqueradeAttackPhishingSimjackingBusinessEmailCompromiseShadowITCloudCryptominingDoSAttackPrivilegedUserCompromiseInfrastructureAttacksMacroVirusesIoTThreatsSpearPhishingBruteForceAttackMalwareSpywareMeltdown& SpectreAttackAccountTakeoverMan-in-the-MiddleAttackCross-SiteScriptingRansomwareSQLInjectionDNSAmplificationSocialEngineeringAttackDNSHijackingCryptojackingAttackDNSTunnelingCommandandControlAttackOpenRedirectionNetworkSniffingZero-DayExploitInsiderThreatBillFraudSupplyChainAttackWhalePhishingCredentialDumpingDrive-byDownloadAttackAmazonWSAttacksMaliciousPowershellCompromisedCredentialsPasstheHashTypoSquattingWebSessionCookieTheftPhishingPayloadsWateringHoleAttackCredentialReuseAttackAdvancedPersistentThreatApplicationAccessTokenMasqueradeAttackPhishingSimjackingBusinessEmailCompromiseShadowITCloudCryptominingDoSAttackPrivilegedUserCompromise

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
  1. Infrastructure Attacks
  2. Macro Viruses
  3. IoT Threats
  4. Spear Phishing
  5. Brute Force Attack
  6. Malware
  7. Spyware
  8. Meltdown & Spectre Attack
  9. Account Takeover
  10. Man-in-the-Middle Attack
  11. Cross-Site Scripting
  12. Ransomware
  13. SQL Injection
  14. DNS Amplification
  15. Social Engineering Attack
  16. DNS Hijacking
  17. Cryptojacking Attack
  18. DNS Tunneling
  19. Command and Control Attack
  20. Open Redirection
  21. Network Sniffing
  22. Zero-Day Exploit
  23. Insider Threat
  24. Bill Fraud
  25. Supply Chain Attack
  26. Whale Phishing
  27. Credential Dumping
  28. Drive-by Download Attack
  29. Amazon WS Attacks
  30. Malicious Powershell
  31. Compromised Credentials
  32. Pass the Hash
  33. Typo Squatting
  34. Web Session Cookie Theft
  35. Phishing Payloads
  36. Watering Hole Attack
  37. Credential Reuse Attack
  38. Advanced Persistent Threat
  39. Application Access Token
  40. Masquerade Attack
  41. Phishing
  42. Simjacking
  43. Business Email Compromise
  44. Shadow IT
  45. Cloud Cryptomining
  46. DoS Attack
  47. Privileged User Compromise