Spear Phishing Brute Force Attack Whale Phishing Supply Chain Attack Watering Hole Attack Typo Squatting Account Takeover Credential Dumping Ransomware Application Access Token Privileged User Compromise Compromised Credentials Open Redirection Drive-by Download Attack DNS Amplification Malware Cross- Site Scripting Web Session Cookie Theft Zero- Day Exploit Man-in- the- Middle Attack Network Sniffing Masquerade Attack Social Engineering Attack Advanced Persistent Threat IoT Threats Insider Threat SQL Injection Pass the Hash Crypto Jacking Attack Spyware Amazon WS Attacks Shadow IT Phishing Payloads Malicious Powershell Bill Fraud Meltdown & Spectre Attack Macro Viruses DoS Attack Cloud Cryptomining Simjacking Spear Phishing Brute Force Attack Whale Phishing Supply Chain Attack Watering Hole Attack Typo Squatting Account Takeover Credential Dumping Ransomware Application Access Token Privileged User Compromise Compromised Credentials Open Redirection Drive-by Download Attack DNS Amplification Malware Cross- Site Scripting Web Session Cookie Theft Zero- Day Exploit Man-in- the- Middle Attack Network Sniffing Masquerade Attack Social Engineering Attack Advanced Persistent Threat IoT Threats Insider Threat SQL Injection Pass the Hash Crypto Jacking Attack Spyware Amazon WS Attacks Shadow IT Phishing Payloads Malicious Powershell Bill Fraud Meltdown & Spectre Attack Macro Viruses DoS Attack Cloud Cryptomining Simjacking
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Spear Phishing
Brute Force Attack
Whale Phishing
Supply Chain Attack
Watering Hole Attack
Typo Squatting
Account Takeover
Credential Dumping
Ransomware
Application Access Token
Privileged User Compromise
Compromised Credentials
Open Redirection
Drive-by Download Attack
DNS Amplification
Malware
Cross-Site Scripting
Web Session Cookie Theft
Zero-Day Exploit
Man-in-the-Middle Attack
Network Sniffing
Masquerade Attack
Social Engineering Attack
Advanced Persistent Threat
IoT Threats
Insider Threat
SQL Injection
Pass the Hash
Crypto Jacking Attack
Spyware
Amazon WS Attacks
Shadow IT
Phishing Payloads
Malicious Powershell
Bill Fraud
Meltdown & Spectre Attack
Macro Viruses
DoS Attack
Cloud Cryptomining
Simjacking