SpywareAccountTakeoverMasqueradeAttackCompromisedCredentialsPasstheHashSocialEngineeringAttackShadowITRansomwareNetworkSniffingSupplyChainAttackOpenRedirectionDrive-byDownloadAttackCryptojackingAttackIoTThreatsInsiderThreatMan-in-the-MiddleAttackWebSessionCookieTheftCredentialReuseAttackZero-DayExploitDNSAmplificationDNSTunnelingCross-SiteScriptingMacroVirusesTypoSquattingMaliciousPowershellSpearPhishingSQLInjectionMalwareInfrastructureAttacksBusinessEmailCompromiseSimjackingPhishingPayloadsWhalePhishingAmazonWSAttacksMeltdown& SpectreAttackPrivilegedUserCompromiseBillFraudCloudCryptominingCommandandControlAttackApplicationAccessTokenDoSAttackPhishingWateringHoleAttackAdvancedPersistentThreatDNSHijackingCredentialDumpingBruteForceAttackSpywareAccountTakeoverMasqueradeAttackCompromisedCredentialsPasstheHashSocialEngineeringAttackShadowITRansomwareNetworkSniffingSupplyChainAttackOpenRedirectionDrive-byDownloadAttackCryptojackingAttackIoTThreatsInsiderThreatMan-in-the-MiddleAttackWebSessionCookieTheftCredentialReuseAttackZero-DayExploitDNSAmplificationDNSTunnelingCross-SiteScriptingMacroVirusesTypoSquattingMaliciousPowershellSpearPhishingSQLInjectionMalwareInfrastructureAttacksBusinessEmailCompromiseSimjackingPhishingPayloadsWhalePhishingAmazonWSAttacksMeltdown& SpectreAttackPrivilegedUserCompromiseBillFraudCloudCryptominingCommandandControlAttackApplicationAccessTokenDoSAttackPhishingWateringHoleAttackAdvancedPersistentThreatDNSHijackingCredentialDumpingBruteForceAttack

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
  1. Spyware
  2. Account Takeover
  3. Masquerade Attack
  4. Compromised Credentials
  5. Pass the Hash
  6. Social Engineering Attack
  7. Shadow IT
  8. Ransomware
  9. Network Sniffing
  10. Supply Chain Attack
  11. Open Redirection
  12. Drive-by Download Attack
  13. Cryptojacking Attack
  14. IoT Threats
  15. Insider Threat
  16. Man-in-the-Middle Attack
  17. Web Session Cookie Theft
  18. Credential Reuse Attack
  19. Zero-Day Exploit
  20. DNS Amplification
  21. DNS Tunneling
  22. Cross-Site Scripting
  23. Macro Viruses
  24. Typo Squatting
  25. Malicious Powershell
  26. Spear Phishing
  27. SQL Injection
  28. Malware
  29. Infrastructure Attacks
  30. Business Email Compromise
  31. Simjacking
  32. Phishing Payloads
  33. Whale Phishing
  34. Amazon WS Attacks
  35. Meltdown & Spectre Attack
  36. Privileged User Compromise
  37. Bill Fraud
  38. Cloud Cryptomining
  39. Command and Control Attack
  40. Application Access Token
  41. DoS Attack
  42. Phishing
  43. Watering Hole Attack
  44. Advanced Persistent Threat
  45. DNS Hijacking
  46. Credential Dumping
  47. Brute Force Attack