Phishing Watering Hole Attack Application Access Token Infrastructure Attacks Bill Fraud Spear Phishing Cross- Site Scripting Masquerade Attack Web Session Cookie Theft Credential Reuse Attack IoT Threats Shadow IT Zero- Day Exploit Phishing Payloads Cryptojacking Attack Meltdown & Spectre Attack Cloud Cryptomining Man-in- the- Middle Attack Brute Force Attack Malware Whale Phishing Privileged User Compromise Supply Chain Attack Pass the Hash SQL Injection Open Redirection Credential Dumping Ransomware Simjacking Network Sniffing Social Engineering Attack Spyware Insider Threat DNS Tunneling Business Email Compromise DoS Attack Drive-by Download Attack Amazon WS Attacks Typo Squatting Account Takeover DNS Hijacking Compromised Credentials Malicious Powershell Macro Viruses Command and Control Attack DNS Amplification Advanced Persistent Threat Phishing Watering Hole Attack Application Access Token Infrastructure Attacks Bill Fraud Spear Phishing Cross- Site Scripting Masquerade Attack Web Session Cookie Theft Credential Reuse Attack IoT Threats Shadow IT Zero- Day Exploit Phishing Payloads Cryptojacking Attack Meltdown & Spectre Attack Cloud Cryptomining Man-in- the- Middle Attack Brute Force Attack Malware Whale Phishing Privileged User Compromise Supply Chain Attack Pass the Hash SQL Injection Open Redirection Credential Dumping Ransomware Simjacking Network Sniffing Social Engineering Attack Spyware Insider Threat DNS Tunneling Business Email Compromise DoS Attack Drive-by Download Attack Amazon WS Attacks Typo Squatting Account Takeover DNS Hijacking Compromised Credentials Malicious Powershell Macro Viruses Command and Control Attack DNS Amplification Advanced Persistent Threat
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Phishing
Watering Hole Attack
Application Access Token
Infrastructure Attacks
Bill Fraud
Spear Phishing
Cross-Site Scripting
Masquerade Attack
Web Session Cookie Theft
Credential Reuse Attack
IoT Threats
Shadow IT
Zero-Day Exploit
Phishing Payloads
Cryptojacking Attack
Meltdown & Spectre Attack
Cloud Cryptomining
Man-in-the-Middle Attack
Brute Force Attack
Malware
Whale Phishing
Privileged User Compromise
Supply Chain Attack
Pass the Hash
SQL Injection
Open Redirection
Credential Dumping
Ransomware
Simjacking
Network Sniffing
Social Engineering Attack
Spyware
Insider Threat
DNS Tunneling
Business Email Compromise
DoS Attack
Drive-by Download Attack
Amazon WS Attacks
Typo Squatting
Account Takeover
DNS Hijacking
Compromised Credentials
Malicious Powershell
Macro Viruses
Command and Control Attack
DNS Amplification
Advanced Persistent Threat