MaliciousPowershellCompromisedCredentialsBruteForceAttackWateringHoleAttackSimjackingAmazonWSAttacksMacroVirusesApplicationAccessTokenSocialEngineeringAttackDrive-byDownloadAttackAccountTakeoverPhishingPayloadsCryptoJackingAttackZero-DayExploitShadowITMan-in-the-MiddleAttackRansomwareMalwareWebSessionCookieTheftSpywareMasqueradeAttackPasstheHashOpenRedirectionSpearPhishingPrivilegedUserCompromiseCross-SiteScriptingAdvancedPersistentThreatCloudCryptominingIoTThreatsDNSAmplificationWhalePhishingSupplyChainAttackNetworkSniffingTypoSquattingDoSAttackMeltdown& SpectreAttackCredentialDumpingSQLInjectionBillFraudInsiderThreatMaliciousPowershellCompromisedCredentialsBruteForceAttackWateringHoleAttackSimjackingAmazonWSAttacksMacroVirusesApplicationAccessTokenSocialEngineeringAttackDrive-byDownloadAttackAccountTakeoverPhishingPayloadsCryptoJackingAttackZero-DayExploitShadowITMan-in-the-MiddleAttackRansomwareMalwareWebSessionCookieTheftSpywareMasqueradeAttackPasstheHashOpenRedirectionSpearPhishingPrivilegedUserCompromiseCross-SiteScriptingAdvancedPersistentThreatCloudCryptominingIoTThreatsDNSAmplificationWhalePhishingSupplyChainAttackNetworkSniffingTypoSquattingDoSAttackMeltdown& SpectreAttackCredentialDumpingSQLInjectionBillFraudInsiderThreat

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Malicious Powershell
  2. Compromised Credentials
  3. Brute Force Attack
  4. Watering Hole Attack
  5. Simjacking
  6. Amazon WS Attacks
  7. Macro Viruses
  8. Application Access Token
  9. Social Engineering Attack
  10. Drive-by Download Attack
  11. Account Takeover
  12. Phishing Payloads
  13. Crypto Jacking Attack
  14. Zero-Day Exploit
  15. Shadow IT
  16. Man-in-the-Middle Attack
  17. Ransomware
  18. Malware
  19. Web Session Cookie Theft
  20. Spyware
  21. Masquerade Attack
  22. Pass the Hash
  23. Open Redirection
  24. Spear Phishing
  25. Privileged User Compromise
  26. Cross-Site Scripting
  27. Advanced Persistent Threat
  28. Cloud Cryptomining
  29. IoT Threats
  30. DNS Amplification
  31. Whale Phishing
  32. Supply Chain Attack
  33. Network Sniffing
  34. Typo Squatting
  35. DoS Attack
  36. Meltdown & Spectre Attack
  37. Credential Dumping
  38. SQL Injection
  39. Bill Fraud
  40. Insider Threat