PhishingPayloadsDNSTunnelingAdvancedPersistentThreatSupplyChainAttackMaliciousPowershellWateringHoleAttackMan-in-the-MiddleAttackDoSAttackCredentialReuseAttackBillFraudMeltdown& SpectreAttackNetworkSniffingBruteForceAttackSQLInjectionCloudCryptominingZero-DayExploitCommandandControlAttackMalwareTypoSquattingAmazonWSAttacksAccountTakeoverMacroVirusesPrivilegedUserCompromiseSpearPhishingIoTThreatsSocialEngineeringAttackDrive-byDownloadAttackSimjackingMasqueradeAttackCross-SiteScriptingInfrastructureAttacksRansomwarePhishingCredentialDumpingPasstheHashWhalePhishingDNSAmplificationShadowITWebSessionCookieTheftBusinessEmailCompromiseInsiderThreatDNSHijackingApplicationAccessTokenCryptojackingAttackSpywareOpenRedirectionCompromisedCredentialsPhishingPayloadsDNSTunnelingAdvancedPersistentThreatSupplyChainAttackMaliciousPowershellWateringHoleAttackMan-in-the-MiddleAttackDoSAttackCredentialReuseAttackBillFraudMeltdown& SpectreAttackNetworkSniffingBruteForceAttackSQLInjectionCloudCryptominingZero-DayExploitCommandandControlAttackMalwareTypoSquattingAmazonWSAttacksAccountTakeoverMacroVirusesPrivilegedUserCompromiseSpearPhishingIoTThreatsSocialEngineeringAttackDrive-byDownloadAttackSimjackingMasqueradeAttackCross-SiteScriptingInfrastructureAttacksRansomwarePhishingCredentialDumpingPasstheHashWhalePhishingDNSAmplificationShadowITWebSessionCookieTheftBusinessEmailCompromiseInsiderThreatDNSHijackingApplicationAccessTokenCryptojackingAttackSpywareOpenRedirectionCompromisedCredentials

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
  1. Phishing Payloads
  2. DNS Tunneling
  3. Advanced Persistent Threat
  4. Supply Chain Attack
  5. Malicious Powershell
  6. Watering Hole Attack
  7. Man-in-the-Middle Attack
  8. DoS Attack
  9. Credential Reuse Attack
  10. Bill Fraud
  11. Meltdown & Spectre Attack
  12. Network Sniffing
  13. Brute Force Attack
  14. SQL Injection
  15. Cloud Cryptomining
  16. Zero-Day Exploit
  17. Command and Control Attack
  18. Malware
  19. Typo Squatting
  20. Amazon WS Attacks
  21. Account Takeover
  22. Macro Viruses
  23. Privileged User Compromise
  24. Spear Phishing
  25. IoT Threats
  26. Social Engineering Attack
  27. Drive-by Download Attack
  28. Simjacking
  29. Masquerade Attack
  30. Cross-Site Scripting
  31. Infrastructure Attacks
  32. Ransomware
  33. Phishing
  34. Credential Dumping
  35. Pass the Hash
  36. Whale Phishing
  37. DNS Amplification
  38. Shadow IT
  39. Web Session Cookie Theft
  40. Business Email Compromise
  41. Insider Threat
  42. DNS Hijacking
  43. Application Access Token
  44. Cryptojacking Attack
  45. Spyware
  46. Open Redirection
  47. Compromised Credentials