Spyware Account Takeover Masquerade Attack Compromised Credentials Pass the Hash Social Engineering Attack Shadow IT Ransomware Network Sniffing Supply Chain Attack Open Redirection Drive-by Download Attack Cryptojacking Attack IoT Threats Insider Threat Man-in- the- Middle Attack Web Session Cookie Theft Credential Reuse Attack Zero- Day Exploit DNS Amplification DNS Tunneling Cross- Site Scripting Macro Viruses Typo Squatting Malicious Powershell Spear Phishing SQL Injection Malware Infrastructure Attacks Business Email Compromise Simjacking Phishing Payloads Whale Phishing Amazon WS Attacks Meltdown & Spectre Attack Privileged User Compromise Bill Fraud Cloud Cryptomining Command and Control Attack Application Access Token DoS Attack Phishing Watering Hole Attack Advanced Persistent Threat DNS Hijacking Credential Dumping Brute Force Attack Spyware Account Takeover Masquerade Attack Compromised Credentials Pass the Hash Social Engineering Attack Shadow IT Ransomware Network Sniffing Supply Chain Attack Open Redirection Drive-by Download Attack Cryptojacking Attack IoT Threats Insider Threat Man-in- the- Middle Attack Web Session Cookie Theft Credential Reuse Attack Zero- Day Exploit DNS Amplification DNS Tunneling Cross- Site Scripting Macro Viruses Typo Squatting Malicious Powershell Spear Phishing SQL Injection Malware Infrastructure Attacks Business Email Compromise Simjacking Phishing Payloads Whale Phishing Amazon WS Attacks Meltdown & Spectre Attack Privileged User Compromise Bill Fraud Cloud Cryptomining Command and Control Attack Application Access Token DoS Attack Phishing Watering Hole Attack Advanced Persistent Threat DNS Hijacking Credential Dumping Brute Force Attack
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Spyware
Account Takeover
Masquerade Attack
Compromised Credentials
Pass the Hash
Social Engineering Attack
Shadow IT
Ransomware
Network Sniffing
Supply Chain Attack
Open Redirection
Drive-by Download Attack
Cryptojacking Attack
IoT Threats
Insider Threat
Man-in-the-Middle Attack
Web Session Cookie Theft
Credential Reuse Attack
Zero-Day Exploit
DNS Amplification
DNS Tunneling
Cross-Site Scripting
Macro Viruses
Typo Squatting
Malicious Powershell
Spear Phishing
SQL Injection
Malware
Infrastructure Attacks
Business Email Compromise
Simjacking
Phishing Payloads
Whale Phishing
Amazon WS Attacks
Meltdown & Spectre Attack
Privileged User Compromise
Bill Fraud
Cloud Cryptomining
Command and Control Attack
Application Access Token
DoS Attack
Phishing
Watering Hole Attack
Advanced Persistent Threat
DNS Hijacking
Credential Dumping
Brute Force Attack