Phishing Malicious Powershell Pass the Hash SQL Injection Bill Fraud Cryptojacking Attack DNS Hijacking Privileged User Compromise Cross- Site Scripting Social Engineering Attack Masquerade Attack Malware Whale Phishing DoS Attack Infrastructure Attacks Open Redirection Amazon WS Attacks Command and Control Attack Supply Chain Attack DNS Tunneling Credential Dumping Account Takeover DNS Amplification Macro Viruses Credential Reuse Attack Simjacking Business Email Compromise Brute Force Attack Network Sniffing Typo Squatting Watering Hole Attack Insider Threat Spyware Spear Phishing Shadow IT Application Access Token Drive-by Download Attack Zero- Day Exploit Compromised Credentials Cloud Cryptomining Web Session Cookie Theft Phishing Payloads IoT Threats Meltdown & Spectre Attack Advanced Persistent Threat Man-in- the- Middle Attack Ransomware Phishing Malicious Powershell Pass the Hash SQL Injection Bill Fraud Cryptojacking Attack DNS Hijacking Privileged User Compromise Cross- Site Scripting Social Engineering Attack Masquerade Attack Malware Whale Phishing DoS Attack Infrastructure Attacks Open Redirection Amazon WS Attacks Command and Control Attack Supply Chain Attack DNS Tunneling Credential Dumping Account Takeover DNS Amplification Macro Viruses Credential Reuse Attack Simjacking Business Email Compromise Brute Force Attack Network Sniffing Typo Squatting Watering Hole Attack Insider Threat Spyware Spear Phishing Shadow IT Application Access Token Drive-by Download Attack Zero- Day Exploit Compromised Credentials Cloud Cryptomining Web Session Cookie Theft Phishing Payloads IoT Threats Meltdown & Spectre Attack Advanced Persistent Threat Man-in- the- Middle Attack Ransomware
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Phishing
Malicious Powershell
Pass the Hash
SQL Injection
Bill Fraud
Cryptojacking Attack
DNS Hijacking
Privileged User Compromise
Cross-Site Scripting
Social Engineering Attack
Masquerade Attack
Malware
Whale Phishing
DoS Attack
Infrastructure Attacks
Open Redirection
Amazon WS Attacks
Command and Control Attack
Supply Chain Attack
DNS Tunneling
Credential Dumping
Account Takeover
DNS Amplification
Macro Viruses
Credential Reuse Attack
Simjacking
Business Email Compromise
Brute Force Attack
Network Sniffing
Typo Squatting
Watering Hole Attack
Insider Threat
Spyware
Spear Phishing
Shadow IT
Application Access Token
Drive-by Download Attack
Zero-Day Exploit
Compromised Credentials
Cloud Cryptomining
Web Session Cookie Theft
Phishing Payloads
IoT Threats
Meltdown & Spectre Attack
Advanced Persistent Threat
Man-in-the-Middle Attack
Ransomware