Zero-DayExploitShadowITIoTThreatsOpenRedirectionDrive-byDownloadAttackMacroVirusesWateringHoleAttackApplicationAccessTokenPasstheHashSpywareMan-in-the-MiddleAttackDNSAmplificationInsiderThreatCloudCryptominingAmazonWSAttacksDoSAttackTypoSquattingAdvancedPersistentThreatSimjackingBruteForceAttackMaliciousPowershellCross-SiteScriptingRansomwareSpearPhishingSocialEngineeringAttackBillFraudMalwareCompromisedCredentialsPrivilegedUserCompromiseWebSessionCookieTheftCredentialDumpingSQLInjectionPhishingPayloadsCryptoJackingAttackSupplyChainAttackWhalePhishingMasqueradeAttackMeltdown& SpectreAttackAccountTakeoverNetworkSniffingZero-DayExploitShadowITIoTThreatsOpenRedirectionDrive-byDownloadAttackMacroVirusesWateringHoleAttackApplicationAccessTokenPasstheHashSpywareMan-in-the-MiddleAttackDNSAmplificationInsiderThreatCloudCryptominingAmazonWSAttacksDoSAttackTypoSquattingAdvancedPersistentThreatSimjackingBruteForceAttackMaliciousPowershellCross-SiteScriptingRansomwareSpearPhishingSocialEngineeringAttackBillFraudMalwareCompromisedCredentialsPrivilegedUserCompromiseWebSessionCookieTheftCredentialDumpingSQLInjectionPhishingPayloadsCryptoJackingAttackSupplyChainAttackWhalePhishingMasqueradeAttackMeltdown& SpectreAttackAccountTakeoverNetworkSniffing

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Zero-Day Exploit
  2. Shadow IT
  3. IoT Threats
  4. Open Redirection
  5. Drive-by Download Attack
  6. Macro Viruses
  7. Watering Hole Attack
  8. Application Access Token
  9. Pass the Hash
  10. Spyware
  11. Man-in-the-Middle Attack
  12. DNS Amplification
  13. Insider Threat
  14. Cloud Cryptomining
  15. Amazon WS Attacks
  16. DoS Attack
  17. Typo Squatting
  18. Advanced Persistent Threat
  19. Simjacking
  20. Brute Force Attack
  21. Malicious Powershell
  22. Cross-Site Scripting
  23. Ransomware
  24. Spear Phishing
  25. Social Engineering Attack
  26. Bill Fraud
  27. Malware
  28. Compromised Credentials
  29. Privileged User Compromise
  30. Web Session Cookie Theft
  31. Credential Dumping
  32. SQL Injection
  33. Phishing Payloads
  34. Crypto Jacking Attack
  35. Supply Chain Attack
  36. Whale Phishing
  37. Masquerade Attack
  38. Meltdown & Spectre Attack
  39. Account Takeover
  40. Network Sniffing