DNS Amplification Man-in- the- Middle Attack Business Email Compromise Infrastructure Attacks Bill Fraud DNS Tunneling Watering Hole Attack Supply Chain Attack Account Takeover Whale Phishing Brute Force Attack Pass the Hash Social Engineering Attack Spyware Phishing Payloads Shadow IT Drive-by Download Attack Phishing Open Redirection Compromised Credentials Cross- Site Scripting Simjacking IoT Threats Privileged User Compromise Malware Spear Phishing Ransomware Meltdown & Spectre Attack Cloud Cryptomining SQL Injection Cryptojacking Attack Malicious Powershell DoS Attack Command and Control Attack Web Session Cookie Theft Masquerade Attack Application Access Token Zero- Day Exploit Credential Dumping Credential Reuse Attack Network Sniffing Macro Viruses Insider Threat Amazon WS Attacks Advanced Persistent Threat DNS Hijacking Typo Squatting DNS Amplification Man-in- the- Middle Attack Business Email Compromise Infrastructure Attacks Bill Fraud DNS Tunneling Watering Hole Attack Supply Chain Attack Account Takeover Whale Phishing Brute Force Attack Pass the Hash Social Engineering Attack Spyware Phishing Payloads Shadow IT Drive-by Download Attack Phishing Open Redirection Compromised Credentials Cross- Site Scripting Simjacking IoT Threats Privileged User Compromise Malware Spear Phishing Ransomware Meltdown & Spectre Attack Cloud Cryptomining SQL Injection Cryptojacking Attack Malicious Powershell DoS Attack Command and Control Attack Web Session Cookie Theft Masquerade Attack Application Access Token Zero- Day Exploit Credential Dumping Credential Reuse Attack Network Sniffing Macro Viruses Insider Threat Amazon WS Attacks Advanced Persistent Threat DNS Hijacking Typo Squatting
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
DNS Amplification
Man-in-the-Middle Attack
Business Email Compromise
Infrastructure Attacks
Bill Fraud
DNS Tunneling
Watering Hole Attack
Supply Chain Attack
Account Takeover
Whale Phishing
Brute Force Attack
Pass the Hash
Social Engineering Attack
Spyware
Phishing Payloads
Shadow IT
Drive-by Download Attack
Phishing
Open Redirection
Compromised Credentials
Cross-Site Scripting
Simjacking
IoT Threats
Privileged User Compromise
Malware
Spear Phishing
Ransomware
Meltdown & Spectre Attack
Cloud Cryptomining
SQL Injection
Cryptojacking Attack
Malicious Powershell
DoS Attack
Command and Control Attack
Web Session Cookie Theft
Masquerade Attack
Application Access Token
Zero-Day Exploit
Credential Dumping
Credential Reuse Attack
Network Sniffing
Macro Viruses
Insider Threat
Amazon WS Attacks
Advanced Persistent Threat
DNS Hijacking
Typo Squatting