Phishing Payloads DNS Tunneling Advanced Persistent Threat Supply Chain Attack Malicious Powershell Watering Hole Attack Man-in- the- Middle Attack DoS Attack Credential Reuse Attack Bill Fraud Meltdown & Spectre Attack Network Sniffing Brute Force Attack SQL Injection Cloud Cryptomining Zero- Day Exploit Command and Control Attack Malware Typo Squatting Amazon WS Attacks Account Takeover Macro Viruses Privileged User Compromise Spear Phishing IoT Threats Social Engineering Attack Drive-by Download Attack Simjacking Masquerade Attack Cross- Site Scripting Infrastructure Attacks Ransomware Phishing Credential Dumping Pass the Hash Whale Phishing DNS Amplification Shadow IT Web Session Cookie Theft Business Email Compromise Insider Threat DNS Hijacking Application Access Token Cryptojacking Attack Spyware Open Redirection Compromised Credentials Phishing Payloads DNS Tunneling Advanced Persistent Threat Supply Chain Attack Malicious Powershell Watering Hole Attack Man-in- the- Middle Attack DoS Attack Credential Reuse Attack Bill Fraud Meltdown & Spectre Attack Network Sniffing Brute Force Attack SQL Injection Cloud Cryptomining Zero- Day Exploit Command and Control Attack Malware Typo Squatting Amazon WS Attacks Account Takeover Macro Viruses Privileged User Compromise Spear Phishing IoT Threats Social Engineering Attack Drive-by Download Attack Simjacking Masquerade Attack Cross- Site Scripting Infrastructure Attacks Ransomware Phishing Credential Dumping Pass the Hash Whale Phishing DNS Amplification Shadow IT Web Session Cookie Theft Business Email Compromise Insider Threat DNS Hijacking Application Access Token Cryptojacking Attack Spyware Open Redirection Compromised Credentials
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Phishing Payloads
DNS Tunneling
Advanced Persistent Threat
Supply Chain Attack
Malicious Powershell
Watering Hole Attack
Man-in-the-Middle Attack
DoS Attack
Credential Reuse Attack
Bill Fraud
Meltdown & Spectre Attack
Network Sniffing
Brute Force Attack
SQL Injection
Cloud Cryptomining
Zero-Day Exploit
Command and Control Attack
Malware
Typo Squatting
Amazon WS Attacks
Account Takeover
Macro Viruses
Privileged User Compromise
Spear Phishing
IoT Threats
Social Engineering Attack
Drive-by Download Attack
Simjacking
Masquerade Attack
Cross-Site Scripting
Infrastructure Attacks
Ransomware
Phishing
Credential Dumping
Pass the Hash
Whale Phishing
DNS Amplification
Shadow IT
Web Session Cookie Theft
Business Email Compromise
Insider Threat
DNS Hijacking
Application Access Token
Cryptojacking Attack
Spyware
Open Redirection
Compromised Credentials