PhishingMaliciousPowershellPasstheHashSQLInjectionBillFraudCryptojackingAttackDNSHijackingPrivilegedUserCompromiseCross-SiteScriptingSocialEngineeringAttackMasqueradeAttackMalwareWhalePhishingDoSAttackInfrastructureAttacksOpenRedirectionAmazonWSAttacksCommandandControlAttackSupplyChainAttackDNSTunnelingCredentialDumpingAccountTakeoverDNSAmplificationMacroVirusesCredentialReuseAttackSimjackingBusinessEmailCompromiseBruteForceAttackNetworkSniffingTypoSquattingWateringHoleAttackInsiderThreatSpywareSpearPhishingShadowITApplicationAccessTokenDrive-byDownloadAttackZero-DayExploitCompromisedCredentialsCloudCryptominingWebSessionCookieTheftPhishingPayloadsIoTThreatsMeltdown& SpectreAttackAdvancedPersistentThreatMan-in-the-MiddleAttackRansomwarePhishingMaliciousPowershellPasstheHashSQLInjectionBillFraudCryptojackingAttackDNSHijackingPrivilegedUserCompromiseCross-SiteScriptingSocialEngineeringAttackMasqueradeAttackMalwareWhalePhishingDoSAttackInfrastructureAttacksOpenRedirectionAmazonWSAttacksCommandandControlAttackSupplyChainAttackDNSTunnelingCredentialDumpingAccountTakeoverDNSAmplificationMacroVirusesCredentialReuseAttackSimjackingBusinessEmailCompromiseBruteForceAttackNetworkSniffingTypoSquattingWateringHoleAttackInsiderThreatSpywareSpearPhishingShadowITApplicationAccessTokenDrive-byDownloadAttackZero-DayExploitCompromisedCredentialsCloudCryptominingWebSessionCookieTheftPhishingPayloadsIoTThreatsMeltdown& SpectreAttackAdvancedPersistentThreatMan-in-the-MiddleAttackRansomware

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
  1. Phishing
  2. Malicious Powershell
  3. Pass the Hash
  4. SQL Injection
  5. Bill Fraud
  6. Cryptojacking Attack
  7. DNS Hijacking
  8. Privileged User Compromise
  9. Cross-Site Scripting
  10. Social Engineering Attack
  11. Masquerade Attack
  12. Malware
  13. Whale Phishing
  14. DoS Attack
  15. Infrastructure Attacks
  16. Open Redirection
  17. Amazon WS Attacks
  18. Command and Control Attack
  19. Supply Chain Attack
  20. DNS Tunneling
  21. Credential Dumping
  22. Account Takeover
  23. DNS Amplification
  24. Macro Viruses
  25. Credential Reuse Attack
  26. Simjacking
  27. Business Email Compromise
  28. Brute Force Attack
  29. Network Sniffing
  30. Typo Squatting
  31. Watering Hole Attack
  32. Insider Threat
  33. Spyware
  34. Spear Phishing
  35. Shadow IT
  36. Application Access Token
  37. Drive-by Download Attack
  38. Zero-Day Exploit
  39. Compromised Credentials
  40. Cloud Cryptomining
  41. Web Session Cookie Theft
  42. Phishing Payloads
  43. IoT Threats
  44. Meltdown & Spectre Attack
  45. Advanced Persistent Threat
  46. Man-in-the-Middle Attack
  47. Ransomware