Bill Fraud Drive-by Download Attack Application Access Token Spear Phishing Cross- Site Scripting SQL Injection Network Sniffing Web Session Cookie Theft Credential Dumping Compromised Credentials Brute Force Attack Privileged User Compromise Typo Squatting Social Engineering Attack Watering Hole Attack Whale Phishing Macro Viruses Cloud Cryptomining Malicious Powershell DoS Attack Pass the Hash Crypto Jacking Attack Shadow IT Phishing Payloads Simjacking Meltdown & Spectre Attack Advanced Persistent Threat Man-in- the- Middle Attack IoT Threats Supply Chain Attack Insider Threat Masquerade Attack DNS Amplification Malware Open Redirection Amazon WS Attacks Account Takeover Spyware Ransomware Zero- Day Exploit Bill Fraud Drive-by Download Attack Application Access Token Spear Phishing Cross- Site Scripting SQL Injection Network Sniffing Web Session Cookie Theft Credential Dumping Compromised Credentials Brute Force Attack Privileged User Compromise Typo Squatting Social Engineering Attack Watering Hole Attack Whale Phishing Macro Viruses Cloud Cryptomining Malicious Powershell DoS Attack Pass the Hash Crypto Jacking Attack Shadow IT Phishing Payloads Simjacking Meltdown & Spectre Attack Advanced Persistent Threat Man-in- the- Middle Attack IoT Threats Supply Chain Attack Insider Threat Masquerade Attack DNS Amplification Malware Open Redirection Amazon WS Attacks Account Takeover Spyware Ransomware Zero- Day Exploit
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Bill Fraud
Drive-by Download Attack
Application Access Token
Spear Phishing
Cross-Site Scripting
SQL Injection
Network Sniffing
Web Session Cookie Theft
Credential Dumping
Compromised Credentials
Brute Force Attack
Privileged User Compromise
Typo Squatting
Social Engineering Attack
Watering Hole Attack
Whale Phishing
Macro Viruses
Cloud Cryptomining
Malicious Powershell
DoS Attack
Pass the Hash
Crypto Jacking Attack
Shadow IT
Phishing Payloads
Simjacking
Meltdown & Spectre Attack
Advanced Persistent Threat
Man-in-the-Middle Attack
IoT Threats
Supply Chain Attack
Insider Threat
Masquerade Attack
DNS Amplification
Malware
Open Redirection
Amazon WS Attacks
Account Takeover
Spyware
Ransomware
Zero-Day Exploit