Infrastructure Attacks Macro Viruses IoT Threats Spear Phishing Brute Force Attack Malware Spyware Meltdown & Spectre Attack Account Takeover Man-in- the- Middle Attack Cross- Site Scripting Ransomware SQL Injection DNS Amplification Social Engineering Attack DNS Hijacking Cryptojacking Attack DNS Tunneling Command and Control Attack Open Redirection Network Sniffing Zero- Day Exploit Insider Threat Bill Fraud Supply Chain Attack Whale Phishing Credential Dumping Drive-by Download Attack Amazon WS Attacks Malicious Powershell Compromised Credentials Pass the Hash Typo Squatting Web Session Cookie Theft Phishing Payloads Watering Hole Attack Credential Reuse Attack Advanced Persistent Threat Application Access Token Masquerade Attack Phishing Simjacking Business Email Compromise Shadow IT Cloud Cryptomining DoS Attack Privileged User Compromise Infrastructure Attacks Macro Viruses IoT Threats Spear Phishing Brute Force Attack Malware Spyware Meltdown & Spectre Attack Account Takeover Man-in- the- Middle Attack Cross- Site Scripting Ransomware SQL Injection DNS Amplification Social Engineering Attack DNS Hijacking Cryptojacking Attack DNS Tunneling Command and Control Attack Open Redirection Network Sniffing Zero- Day Exploit Insider Threat Bill Fraud Supply Chain Attack Whale Phishing Credential Dumping Drive-by Download Attack Amazon WS Attacks Malicious Powershell Compromised Credentials Pass the Hash Typo Squatting Web Session Cookie Theft Phishing Payloads Watering Hole Attack Credential Reuse Attack Advanced Persistent Threat Application Access Token Masquerade Attack Phishing Simjacking Business Email Compromise Shadow IT Cloud Cryptomining DoS Attack Privileged User Compromise
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Infrastructure Attacks
Macro Viruses
IoT Threats
Spear Phishing
Brute Force Attack
Malware
Spyware
Meltdown & Spectre Attack
Account Takeover
Man-in-the-Middle Attack
Cross-Site Scripting
Ransomware
SQL Injection
DNS Amplification
Social Engineering Attack
DNS Hijacking
Cryptojacking Attack
DNS Tunneling
Command and Control Attack
Open Redirection
Network Sniffing
Zero-Day Exploit
Insider Threat
Bill Fraud
Supply Chain Attack
Whale Phishing
Credential Dumping
Drive-by Download Attack
Amazon WS Attacks
Malicious Powershell
Compromised Credentials
Pass the Hash
Typo Squatting
Web Session Cookie Theft
Phishing Payloads
Watering Hole Attack
Credential Reuse Attack
Advanced Persistent Threat
Application Access Token
Masquerade Attack
Phishing
Simjacking
Business Email Compromise
Shadow IT
Cloud Cryptomining
DoS Attack
Privileged User Compromise