Phishing Privileged User Compromise Drive-by Download Attack Typo Squatting Spyware Bill Fraud Shadow IT Compromised Credentials Infrastructure Attacks IoT Threats Account Takeover Business Email Compromise Command and Control Attack Man-in- the- Middle Attack Malicious Powershell Malware Whale Phishing Credential Reuse Attack DNS Hijacking Advanced Persistent Threat Simjacking Spear Phishing Phishing Payloads Supply Chain Attack Open Redirection DNS Tunneling Credential Dumping Watering Hole Attack Cryptojacking Attack Meltdown & Spectre Attack Brute Force Attack Masquerade Attack DNS Amplification Cloud Cryptomining Web Session Cookie Theft Insider Threat Cross- Site Scripting Macro Viruses Zero- Day Exploit SQL Injection Pass the Hash Ransomware Amazon WS Attacks DoS Attack Network Sniffing Social Engineering Attack Application Access Token Phishing Privileged User Compromise Drive-by Download Attack Typo Squatting Spyware Bill Fraud Shadow IT Compromised Credentials Infrastructure Attacks IoT Threats Account Takeover Business Email Compromise Command and Control Attack Man-in- the- Middle Attack Malicious Powershell Malware Whale Phishing Credential Reuse Attack DNS Hijacking Advanced Persistent Threat Simjacking Spear Phishing Phishing Payloads Supply Chain Attack Open Redirection DNS Tunneling Credential Dumping Watering Hole Attack Cryptojacking Attack Meltdown & Spectre Attack Brute Force Attack Masquerade Attack DNS Amplification Cloud Cryptomining Web Session Cookie Theft Insider Threat Cross- Site Scripting Macro Viruses Zero- Day Exploit SQL Injection Pass the Hash Ransomware Amazon WS Attacks DoS Attack Network Sniffing Social Engineering Attack Application Access Token
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Phishing
Privileged User Compromise
Drive-by Download Attack
Typo Squatting
Spyware
Bill Fraud
Shadow IT
Compromised Credentials
Infrastructure Attacks
IoT Threats
Account Takeover
Business Email Compromise
Command and Control Attack
Man-in-the-Middle Attack
Malicious Powershell
Malware
Whale Phishing
Credential Reuse Attack
DNS Hijacking
Advanced Persistent Threat
Simjacking
Spear Phishing
Phishing Payloads
Supply Chain Attack
Open Redirection
DNS Tunneling
Credential Dumping
Watering Hole Attack
Cryptojacking Attack
Meltdown & Spectre Attack
Brute Force Attack
Masquerade Attack
DNS Amplification
Cloud Cryptomining
Web Session Cookie Theft
Insider Threat
Cross-Site Scripting
Macro Viruses
Zero-Day Exploit
SQL Injection
Pass the Hash
Ransomware
Amazon WS Attacks
DoS Attack
Network Sniffing
Social Engineering Attack
Application Access Token