PrivilegedUserCompromiseInsiderThreatWhalePhishingSQLInjectionAdvancedPersistentThreatBillFraudShadowITDNSAmplificationSupplyChainAttackDNSTunnelingDrive-byDownloadAttackSocialEngineeringAttackMeltdown& SpectreAttackOpenRedirectionSpearPhishingSpywareAmazonWSAttacksMasqueradeAttackMalwareCross-SiteScriptingMan-in-the-MiddleAttackCompromisedCredentialsDoSAttackCredentialReuseAttackCommandandControlAttackPhishingBusinessEmailCompromiseDNSHijackingApplicationAccessTokenPasstheHashCredentialDumpingWebSessionCookieTheftTypoSquattingInfrastructureAttacksSimjackingBruteForceAttackCryptojackingAttackWateringHoleAttackZero-DayExploitRansomwareCloudCryptominingAccountTakeoverMacroVirusesNetworkSniffingMaliciousPowershellIoTThreatsPhishingPayloadsPrivilegedUserCompromiseInsiderThreatWhalePhishingSQLInjectionAdvancedPersistentThreatBillFraudShadowITDNSAmplificationSupplyChainAttackDNSTunnelingDrive-byDownloadAttackSocialEngineeringAttackMeltdown& SpectreAttackOpenRedirectionSpearPhishingSpywareAmazonWSAttacksMasqueradeAttackMalwareCross-SiteScriptingMan-in-the-MiddleAttackCompromisedCredentialsDoSAttackCredentialReuseAttackCommandandControlAttackPhishingBusinessEmailCompromiseDNSHijackingApplicationAccessTokenPasstheHashCredentialDumpingWebSessionCookieTheftTypoSquattingInfrastructureAttacksSimjackingBruteForceAttackCryptojackingAttackWateringHoleAttackZero-DayExploitRansomwareCloudCryptominingAccountTakeoverMacroVirusesNetworkSniffingMaliciousPowershellIoTThreatsPhishingPayloads

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
  1. Privileged User Compromise
  2. Insider Threat
  3. Whale Phishing
  4. SQL Injection
  5. Advanced Persistent Threat
  6. Bill Fraud
  7. Shadow IT
  8. DNS Amplification
  9. Supply Chain Attack
  10. DNS Tunneling
  11. Drive-by Download Attack
  12. Social Engineering Attack
  13. Meltdown & Spectre Attack
  14. Open Redirection
  15. Spear Phishing
  16. Spyware
  17. Amazon WS Attacks
  18. Masquerade Attack
  19. Malware
  20. Cross-Site Scripting
  21. Man-in-the-Middle Attack
  22. Compromised Credentials
  23. DoS Attack
  24. Credential Reuse Attack
  25. Command and Control Attack
  26. Phishing
  27. Business Email Compromise
  28. DNS Hijacking
  29. Application Access Token
  30. Pass the Hash
  31. Credential Dumping
  32. Web Session Cookie Theft
  33. Typo Squatting
  34. Infrastructure Attacks
  35. Simjacking
  36. Brute Force Attack
  37. Cryptojacking Attack
  38. Watering Hole Attack
  39. Zero-Day Exploit
  40. Ransomware
  41. Cloud Cryptomining
  42. Account Takeover
  43. Macro Viruses
  44. Network Sniffing
  45. Malicious Powershell
  46. IoT Threats
  47. Phishing Payloads