Privileged User Compromise Insider Threat Whale Phishing SQL Injection Advanced Persistent Threat Bill Fraud Shadow IT DNS Amplification Supply Chain Attack DNS Tunneling Drive-by Download Attack Social Engineering Attack Meltdown & Spectre Attack Open Redirection Spear Phishing Spyware Amazon WS Attacks Masquerade Attack Malware Cross- Site Scripting Man-in- the- Middle Attack Compromised Credentials DoS Attack Credential Reuse Attack Command and Control Attack Phishing Business Email Compromise DNS Hijacking Application Access Token Pass the Hash Credential Dumping Web Session Cookie Theft Typo Squatting Infrastructure Attacks Simjacking Brute Force Attack Cryptojacking Attack Watering Hole Attack Zero- Day Exploit Ransomware Cloud Cryptomining Account Takeover Macro Viruses Network Sniffing Malicious Powershell IoT Threats Phishing Payloads Privileged User Compromise Insider Threat Whale Phishing SQL Injection Advanced Persistent Threat Bill Fraud Shadow IT DNS Amplification Supply Chain Attack DNS Tunneling Drive-by Download Attack Social Engineering Attack Meltdown & Spectre Attack Open Redirection Spear Phishing Spyware Amazon WS Attacks Masquerade Attack Malware Cross- Site Scripting Man-in- the- Middle Attack Compromised Credentials DoS Attack Credential Reuse Attack Command and Control Attack Phishing Business Email Compromise DNS Hijacking Application Access Token Pass the Hash Credential Dumping Web Session Cookie Theft Typo Squatting Infrastructure Attacks Simjacking Brute Force Attack Cryptojacking Attack Watering Hole Attack Zero- Day Exploit Ransomware Cloud Cryptomining Account Takeover Macro Viruses Network Sniffing Malicious Powershell IoT Threats Phishing Payloads
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Privileged User Compromise
Insider Threat
Whale Phishing
SQL Injection
Advanced Persistent Threat
Bill Fraud
Shadow IT
DNS Amplification
Supply Chain Attack
DNS Tunneling
Drive-by Download Attack
Social Engineering Attack
Meltdown & Spectre Attack
Open Redirection
Spear Phishing
Spyware
Amazon WS Attacks
Masquerade Attack
Malware
Cross-Site Scripting
Man-in-the-Middle Attack
Compromised Credentials
DoS Attack
Credential Reuse Attack
Command and Control Attack
Phishing
Business Email Compromise
DNS Hijacking
Application Access Token
Pass the Hash
Credential Dumping
Web Session Cookie Theft
Typo Squatting
Infrastructure Attacks
Simjacking
Brute Force Attack
Cryptojacking Attack
Watering Hole Attack
Zero-Day Exploit
Ransomware
Cloud Cryptomining
Account Takeover
Macro Viruses
Network Sniffing
Malicious Powershell
IoT Threats
Phishing Payloads