DoSAttackDNSHijackingPhishingAmazonWSAttacksSpywareDNSTunnelingSocialEngineeringAttackBillFraudMaliciousPowershellOpenRedirectionCredentialDumpingDrive-byDownloadAttackMalwareCompromisedCredentialsMan-in-the-MiddleAttackInfrastructureAttacksMacroVirusesWebSessionCookieTheftAccountTakeoverCross-SiteScriptingPasstheHashSupplyChainAttackIoTThreatsWateringHoleAttackMasqueradeAttackPrivilegedUserCompromisePhishingPayloadsShadowITRansomwareCryptojackingAttackAdvancedPersistentThreatWhalePhishingNetworkSniffingInsiderThreatCloudCryptominingSQLInjectionSimjackingBusinessEmailCompromiseMeltdown& SpectreAttackDNSAmplificationSpearPhishingCommandandControlAttackBruteForceAttackZero-DayExploitCredentialReuseAttackTypoSquattingApplicationAccessTokenDoSAttackDNSHijackingPhishingAmazonWSAttacksSpywareDNSTunnelingSocialEngineeringAttackBillFraudMaliciousPowershellOpenRedirectionCredentialDumpingDrive-byDownloadAttackMalwareCompromisedCredentialsMan-in-the-MiddleAttackInfrastructureAttacksMacroVirusesWebSessionCookieTheftAccountTakeoverCross-SiteScriptingPasstheHashSupplyChainAttackIoTThreatsWateringHoleAttackMasqueradeAttackPrivilegedUserCompromisePhishingPayloadsShadowITRansomwareCryptojackingAttackAdvancedPersistentThreatWhalePhishingNetworkSniffingInsiderThreatCloudCryptominingSQLInjectionSimjackingBusinessEmailCompromiseMeltdown& SpectreAttackDNSAmplificationSpearPhishingCommandandControlAttackBruteForceAttackZero-DayExploitCredentialReuseAttackTypoSquattingApplicationAccessToken

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
  1. DoS Attack
  2. DNS Hijacking
  3. Phishing
  4. Amazon WS Attacks
  5. Spyware
  6. DNS Tunneling
  7. Social Engineering Attack
  8. Bill Fraud
  9. Malicious Powershell
  10. Open Redirection
  11. Credential Dumping
  12. Drive-by Download Attack
  13. Malware
  14. Compromised Credentials
  15. Man-in-the-Middle Attack
  16. Infrastructure Attacks
  17. Macro Viruses
  18. Web Session Cookie Theft
  19. Account Takeover
  20. Cross-Site Scripting
  21. Pass the Hash
  22. Supply Chain Attack
  23. IoT Threats
  24. Watering Hole Attack
  25. Masquerade Attack
  26. Privileged User Compromise
  27. Phishing Payloads
  28. Shadow IT
  29. Ransomware
  30. Cryptojacking Attack
  31. Advanced Persistent Threat
  32. Whale Phishing
  33. Network Sniffing
  34. Insider Threat
  35. Cloud Cryptomining
  36. SQL Injection
  37. Simjacking
  38. Business Email Compromise
  39. Meltdown & Spectre Attack
  40. DNS Amplification
  41. Spear Phishing
  42. Command and Control Attack
  43. Brute Force Attack
  44. Zero-Day Exploit
  45. Credential Reuse Attack
  46. Typo Squatting
  47. Application Access Token