PhishingWateringHoleAttackApplicationAccessTokenInfrastructureAttacksBillFraudSpearPhishingCross-SiteScriptingMasqueradeAttackWebSessionCookieTheftCredentialReuseAttackIoTThreatsShadowITZero-DayExploitPhishingPayloadsCryptojackingAttackMeltdown& SpectreAttackCloudCryptominingMan-in-the-MiddleAttackBruteForceAttackMalwareWhalePhishingPrivilegedUserCompromiseSupplyChainAttackPasstheHashSQLInjectionOpenRedirectionCredentialDumpingRansomwareSimjackingNetworkSniffingSocialEngineeringAttackSpywareInsiderThreatDNSTunnelingBusinessEmailCompromiseDoSAttackDrive-byDownloadAttackAmazonWSAttacksTypoSquattingAccountTakeoverDNSHijackingCompromisedCredentialsMaliciousPowershellMacroVirusesCommandandControlAttackDNSAmplificationAdvancedPersistentThreatPhishingWateringHoleAttackApplicationAccessTokenInfrastructureAttacksBillFraudSpearPhishingCross-SiteScriptingMasqueradeAttackWebSessionCookieTheftCredentialReuseAttackIoTThreatsShadowITZero-DayExploitPhishingPayloadsCryptojackingAttackMeltdown& SpectreAttackCloudCryptominingMan-in-the-MiddleAttackBruteForceAttackMalwareWhalePhishingPrivilegedUserCompromiseSupplyChainAttackPasstheHashSQLInjectionOpenRedirectionCredentialDumpingRansomwareSimjackingNetworkSniffingSocialEngineeringAttackSpywareInsiderThreatDNSTunnelingBusinessEmailCompromiseDoSAttackDrive-byDownloadAttackAmazonWSAttacksTypoSquattingAccountTakeoverDNSHijackingCompromisedCredentialsMaliciousPowershellMacroVirusesCommandandControlAttackDNSAmplificationAdvancedPersistentThreat

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
  1. Phishing
  2. Watering Hole Attack
  3. Application Access Token
  4. Infrastructure Attacks
  5. Bill Fraud
  6. Spear Phishing
  7. Cross-Site Scripting
  8. Masquerade Attack
  9. Web Session Cookie Theft
  10. Credential Reuse Attack
  11. IoT Threats
  12. Shadow IT
  13. Zero-Day Exploit
  14. Phishing Payloads
  15. Cryptojacking Attack
  16. Meltdown & Spectre Attack
  17. Cloud Cryptomining
  18. Man-in-the-Middle Attack
  19. Brute Force Attack
  20. Malware
  21. Whale Phishing
  22. Privileged User Compromise
  23. Supply Chain Attack
  24. Pass the Hash
  25. SQL Injection
  26. Open Redirection
  27. Credential Dumping
  28. Ransomware
  29. Simjacking
  30. Network Sniffing
  31. Social Engineering Attack
  32. Spyware
  33. Insider Threat
  34. DNS Tunneling
  35. Business Email Compromise
  36. DoS Attack
  37. Drive-by Download Attack
  38. Amazon WS Attacks
  39. Typo Squatting
  40. Account Takeover
  41. DNS Hijacking
  42. Compromised Credentials
  43. Malicious Powershell
  44. Macro Viruses
  45. Command and Control Attack
  46. DNS Amplification
  47. Advanced Persistent Threat