Insider Threat DoS Attack Application Access Token Shadow IT Cross- Site Scripting Credential Reuse Attack Credential Dumping Compromised Credentials Zero- Day Exploit Business Email Compromise Open Redirection Supply Chain Attack Meltdown & Spectre Attack Spyware DNS Amplification DNS Hijacking IoT Threats Privileged User Compromise Cryptojacking Attack Amazon WS Attacks Malware Web Session Cookie Theft Phishing Pass the Hash Network Sniffing Social Engineering Attack Phishing Payloads Man-in- the- Middle Attack Spear Phishing Cloud Cryptomining Account Takeover Command and Control Attack Malicious Powershell Drive-by Download Attack Brute Force Attack Advanced Persistent Threat Bill Fraud Typo Squatting Ransomware Infrastructure Attacks Simjacking DNS Tunneling Whale Phishing Masquerade Attack Watering Hole Attack SQL Injection Macro Viruses Insider Threat DoS Attack Application Access Token Shadow IT Cross- Site Scripting Credential Reuse Attack Credential Dumping Compromised Credentials Zero- Day Exploit Business Email Compromise Open Redirection Supply Chain Attack Meltdown & Spectre Attack Spyware DNS Amplification DNS Hijacking IoT Threats Privileged User Compromise Cryptojacking Attack Amazon WS Attacks Malware Web Session Cookie Theft Phishing Pass the Hash Network Sniffing Social Engineering Attack Phishing Payloads Man-in- the- Middle Attack Spear Phishing Cloud Cryptomining Account Takeover Command and Control Attack Malicious Powershell Drive-by Download Attack Brute Force Attack Advanced Persistent Threat Bill Fraud Typo Squatting Ransomware Infrastructure Attacks Simjacking DNS Tunneling Whale Phishing Masquerade Attack Watering Hole Attack SQL Injection Macro Viruses
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Insider Threat
DoS Attack
Application Access Token
Shadow IT
Cross-Site Scripting
Credential Reuse Attack
Credential Dumping
Compromised Credentials
Zero-Day Exploit
Business Email Compromise
Open Redirection
Supply Chain Attack
Meltdown & Spectre Attack
Spyware
DNS Amplification
DNS Hijacking
IoT Threats
Privileged User Compromise
Cryptojacking Attack
Amazon WS Attacks
Malware
Web Session Cookie Theft
Phishing
Pass the Hash
Network Sniffing
Social Engineering Attack
Phishing Payloads
Man-in-the-Middle Attack
Spear Phishing
Cloud Cryptomining
Account Takeover
Command and Control Attack
Malicious Powershell
Drive-by Download Attack
Brute Force Attack
Advanced Persistent Threat
Bill Fraud
Typo Squatting
Ransomware
Infrastructure Attacks
Simjacking
DNS Tunneling
Whale Phishing
Masquerade Attack
Watering Hole Attack
SQL Injection
Macro Viruses