PhishingPrivilegedUserCompromiseDrive-byDownloadAttackTypoSquattingSpywareBillFraudShadowITCompromisedCredentialsInfrastructureAttacksIoTThreatsAccountTakeoverBusinessEmailCompromiseCommandandControlAttackMan-in-the-MiddleAttackMaliciousPowershellMalwareWhalePhishingCredentialReuseAttackDNSHijackingAdvancedPersistentThreatSimjackingSpearPhishingPhishingPayloadsSupplyChainAttackOpenRedirectionDNSTunnelingCredentialDumpingWateringHoleAttackCryptojackingAttackMeltdown& SpectreAttackBruteForceAttackMasqueradeAttackDNSAmplificationCloudCryptominingWebSessionCookieTheftInsiderThreatCross-SiteScriptingMacroVirusesZero-DayExploitSQLInjectionPasstheHashRansomwareAmazonWSAttacksDoSAttackNetworkSniffingSocialEngineeringAttackApplicationAccessTokenPhishingPrivilegedUserCompromiseDrive-byDownloadAttackTypoSquattingSpywareBillFraudShadowITCompromisedCredentialsInfrastructureAttacksIoTThreatsAccountTakeoverBusinessEmailCompromiseCommandandControlAttackMan-in-the-MiddleAttackMaliciousPowershellMalwareWhalePhishingCredentialReuseAttackDNSHijackingAdvancedPersistentThreatSimjackingSpearPhishingPhishingPayloadsSupplyChainAttackOpenRedirectionDNSTunnelingCredentialDumpingWateringHoleAttackCryptojackingAttackMeltdown& SpectreAttackBruteForceAttackMasqueradeAttackDNSAmplificationCloudCryptominingWebSessionCookieTheftInsiderThreatCross-SiteScriptingMacroVirusesZero-DayExploitSQLInjectionPasstheHashRansomwareAmazonWSAttacksDoSAttackNetworkSniffingSocialEngineeringAttackApplicationAccessToken

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
  1. Phishing
  2. Privileged User Compromise
  3. Drive-by Download Attack
  4. Typo Squatting
  5. Spyware
  6. Bill Fraud
  7. Shadow IT
  8. Compromised Credentials
  9. Infrastructure Attacks
  10. IoT Threats
  11. Account Takeover
  12. Business Email Compromise
  13. Command and Control Attack
  14. Man-in-the-Middle Attack
  15. Malicious Powershell
  16. Malware
  17. Whale Phishing
  18. Credential Reuse Attack
  19. DNS Hijacking
  20. Advanced Persistent Threat
  21. Simjacking
  22. Spear Phishing
  23. Phishing Payloads
  24. Supply Chain Attack
  25. Open Redirection
  26. DNS Tunneling
  27. Credential Dumping
  28. Watering Hole Attack
  29. Cryptojacking Attack
  30. Meltdown & Spectre Attack
  31. Brute Force Attack
  32. Masquerade Attack
  33. DNS Amplification
  34. Cloud Cryptomining
  35. Web Session Cookie Theft
  36. Insider Threat
  37. Cross-Site Scripting
  38. Macro Viruses
  39. Zero-Day Exploit
  40. SQL Injection
  41. Pass the Hash
  42. Ransomware
  43. Amazon WS Attacks
  44. DoS Attack
  45. Network Sniffing
  46. Social Engineering Attack
  47. Application Access Token