BillFraudCross-SiteScriptingTypoSquattingApplicationAccessTokenSocialEngineeringAttackSimjackingCredentialDumpingDoSAttackCommandandControlAttackCompromisedCredentialsInsiderThreatSpearPhishingZero-DayExploitMasqueradeAttackShadowITIoTThreatsRansomwareMaliciousPowershellCloudCryptominingBusinessEmailCompromisePhishingDrive-byDownloadAttackAccountTakeoverSpywareMalwareDNSHijackingAdvancedPersistentThreatWebSessionCookieTheftPasstheHashCryptojackingAttackMacroVirusesDNSAmplificationCredentialReuseAttackSQLInjectionMan-in-the-MiddleAttackPrivilegedUserCompromiseWhalePhishingInfrastructureAttacksBruteForceAttackSupplyChainAttackDNSTunnelingWateringHoleAttackPhishingPayloadsMeltdown& SpectreAttackNetworkSniffingAmazonWSAttacksOpenRedirectionBillFraudCross-SiteScriptingTypoSquattingApplicationAccessTokenSocialEngineeringAttackSimjackingCredentialDumpingDoSAttackCommandandControlAttackCompromisedCredentialsInsiderThreatSpearPhishingZero-DayExploitMasqueradeAttackShadowITIoTThreatsRansomwareMaliciousPowershellCloudCryptominingBusinessEmailCompromisePhishingDrive-byDownloadAttackAccountTakeoverSpywareMalwareDNSHijackingAdvancedPersistentThreatWebSessionCookieTheftPasstheHashCryptojackingAttackMacroVirusesDNSAmplificationCredentialReuseAttackSQLInjectionMan-in-the-MiddleAttackPrivilegedUserCompromiseWhalePhishingInfrastructureAttacksBruteForceAttackSupplyChainAttackDNSTunnelingWateringHoleAttackPhishingPayloadsMeltdown& SpectreAttackNetworkSniffingAmazonWSAttacksOpenRedirection

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
  1. Bill Fraud
  2. Cross-Site Scripting
  3. Typo Squatting
  4. Application Access Token
  5. Social Engineering Attack
  6. Simjacking
  7. Credential Dumping
  8. DoS Attack
  9. Command and Control Attack
  10. Compromised Credentials
  11. Insider Threat
  12. Spear Phishing
  13. Zero-Day Exploit
  14. Masquerade Attack
  15. Shadow IT
  16. IoT Threats
  17. Ransomware
  18. Malicious Powershell
  19. Cloud Cryptomining
  20. Business Email Compromise
  21. Phishing
  22. Drive-by Download Attack
  23. Account Takeover
  24. Spyware
  25. Malware
  26. DNS Hijacking
  27. Advanced Persistent Threat
  28. Web Session Cookie Theft
  29. Pass the Hash
  30. Cryptojacking Attack
  31. Macro Viruses
  32. DNS Amplification
  33. Credential Reuse Attack
  34. SQL Injection
  35. Man-in-the-Middle Attack
  36. Privileged User Compromise
  37. Whale Phishing
  38. Infrastructure Attacks
  39. Brute Force Attack
  40. Supply Chain Attack
  41. DNS Tunneling
  42. Watering Hole Attack
  43. Phishing Payloads
  44. Meltdown & Spectre Attack
  45. Network Sniffing
  46. Amazon WS Attacks
  47. Open Redirection