Meltdown & Spectre Attack Man-in- the- Middle Attack Open Redirection Cross- Site Scripting Phishing Payloads Crypto Jacking Attack Brute Force Attack Social Engineering Attack Bill Fraud Masquerade Attack Application Access Token Spyware Account Takeover Whale Phishing Typo Squatting SQL Injection Zero- Day Exploit DoS Attack Drive-by Download Attack Network Sniffing Shadow IT DNS Amplification IoT Threats Ransomware Credential Dumping Spear Phishing Amazon WS Attacks Insider Threat Compromised Credentials Pass the Hash Macro Viruses Malware Malicious Powershell Privileged User Compromise Supply Chain Attack Web Session Cookie Theft Advanced Persistent Threat Watering Hole Attack Cloud Cryptomining Simjacking Meltdown & Spectre Attack Man-in- the- Middle Attack Open Redirection Cross- Site Scripting Phishing Payloads Crypto Jacking Attack Brute Force Attack Social Engineering Attack Bill Fraud Masquerade Attack Application Access Token Spyware Account Takeover Whale Phishing Typo Squatting SQL Injection Zero- Day Exploit DoS Attack Drive-by Download Attack Network Sniffing Shadow IT DNS Amplification IoT Threats Ransomware Credential Dumping Spear Phishing Amazon WS Attacks Insider Threat Compromised Credentials Pass the Hash Macro Viruses Malware Malicious Powershell Privileged User Compromise Supply Chain Attack Web Session Cookie Theft Advanced Persistent Threat Watering Hole Attack Cloud Cryptomining Simjacking
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Meltdown & Spectre Attack
Man-in-the-Middle Attack
Open Redirection
Cross-Site Scripting
Phishing Payloads
Crypto Jacking Attack
Brute Force Attack
Social Engineering Attack
Bill Fraud
Masquerade Attack
Application Access Token
Spyware
Account Takeover
Whale Phishing
Typo Squatting
SQL Injection
Zero-Day Exploit
DoS Attack
Drive-by Download Attack
Network Sniffing
Shadow IT
DNS Amplification
IoT Threats
Ransomware
Credential Dumping
Spear Phishing
Amazon WS Attacks
Insider Threat
Compromised Credentials
Pass the Hash
Macro Viruses
Malware
Malicious Powershell
Privileged User Compromise
Supply Chain Attack
Web Session Cookie Theft
Advanced Persistent Threat
Watering Hole Attack
Cloud Cryptomining
Simjacking