DoS Attack DNS Hijacking Phishing Amazon WS Attacks Spyware DNS Tunneling Social Engineering Attack Bill Fraud Malicious Powershell Open Redirection Credential Dumping Drive-by Download Attack Malware Compromised Credentials Man-in- the- Middle Attack Infrastructure Attacks Macro Viruses Web Session Cookie Theft Account Takeover Cross- Site Scripting Pass the Hash Supply Chain Attack IoT Threats Watering Hole Attack Masquerade Attack Privileged User Compromise Phishing Payloads Shadow IT Ransomware Cryptojacking Attack Advanced Persistent Threat Whale Phishing Network Sniffing Insider Threat Cloud Cryptomining SQL Injection Simjacking Business Email Compromise Meltdown & Spectre Attack DNS Amplification Spear Phishing Command and Control Attack Brute Force Attack Zero- Day Exploit Credential Reuse Attack Typo Squatting Application Access Token DoS Attack DNS Hijacking Phishing Amazon WS Attacks Spyware DNS Tunneling Social Engineering Attack Bill Fraud Malicious Powershell Open Redirection Credential Dumping Drive-by Download Attack Malware Compromised Credentials Man-in- the- Middle Attack Infrastructure Attacks Macro Viruses Web Session Cookie Theft Account Takeover Cross- Site Scripting Pass the Hash Supply Chain Attack IoT Threats Watering Hole Attack Masquerade Attack Privileged User Compromise Phishing Payloads Shadow IT Ransomware Cryptojacking Attack Advanced Persistent Threat Whale Phishing Network Sniffing Insider Threat Cloud Cryptomining SQL Injection Simjacking Business Email Compromise Meltdown & Spectre Attack DNS Amplification Spear Phishing Command and Control Attack Brute Force Attack Zero- Day Exploit Credential Reuse Attack Typo Squatting Application Access Token
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
DoS Attack
DNS Hijacking
Phishing
Amazon WS Attacks
Spyware
DNS Tunneling
Social Engineering Attack
Bill Fraud
Malicious Powershell
Open Redirection
Credential Dumping
Drive-by Download Attack
Malware
Compromised Credentials
Man-in-the-Middle Attack
Infrastructure Attacks
Macro Viruses
Web Session Cookie Theft
Account Takeover
Cross-Site Scripting
Pass the Hash
Supply Chain Attack
IoT Threats
Watering Hole Attack
Masquerade Attack
Privileged User Compromise
Phishing Payloads
Shadow IT
Ransomware
Cryptojacking Attack
Advanced Persistent Threat
Whale Phishing
Network Sniffing
Insider Threat
Cloud Cryptomining
SQL Injection
Simjacking
Business Email Compromise
Meltdown & Spectre Attack
DNS Amplification
Spear Phishing
Command and Control Attack
Brute Force Attack
Zero-Day Exploit
Credential Reuse Attack
Typo Squatting
Application Access Token