Spear Phishing Insider Threat Meltdown & Spectre Attack Web Session Cookie Theft Simjacking Crypto Jacking Attack Ransomware Whale Phishing Drive-by Download Attack Zero- Day Exploit Credential Dumping Pass the Hash Advanced Persistent Threat Watering Hole Attack Application Access Token Network Sniffing Account Takeover Open Redirection Typo Squatting Privileged User Compromise DNS Amplification Supply Chain Attack Spyware Macro Viruses Masquerade Attack Malicious Powershell Phishing Payloads DoS Attack SQL Injection Bill Fraud Brute Force Attack Man-in- the- Middle Attack Amazon WS Attacks IoT Threats Cross- Site Scripting Shadow IT Cloud Cryptomining Social Engineering Attack Malware Compromised Credentials Spear Phishing Insider Threat Meltdown & Spectre Attack Web Session Cookie Theft Simjacking Crypto Jacking Attack Ransomware Whale Phishing Drive-by Download Attack Zero- Day Exploit Credential Dumping Pass the Hash Advanced Persistent Threat Watering Hole Attack Application Access Token Network Sniffing Account Takeover Open Redirection Typo Squatting Privileged User Compromise DNS Amplification Supply Chain Attack Spyware Macro Viruses Masquerade Attack Malicious Powershell Phishing Payloads DoS Attack SQL Injection Bill Fraud Brute Force Attack Man-in- the- Middle Attack Amazon WS Attacks IoT Threats Cross- Site Scripting Shadow IT Cloud Cryptomining Social Engineering Attack Malware Compromised Credentials
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Spear Phishing
Insider Threat
Meltdown & Spectre Attack
Web Session Cookie Theft
Simjacking
Crypto Jacking Attack
Ransomware
Whale Phishing
Drive-by Download Attack
Zero-Day Exploit
Credential Dumping
Pass the Hash
Advanced Persistent Threat
Watering Hole Attack
Application Access Token
Network Sniffing
Account Takeover
Open Redirection
Typo Squatting
Privileged User Compromise
DNS Amplification
Supply Chain Attack
Spyware
Macro Viruses
Masquerade Attack
Malicious Powershell
Phishing Payloads
DoS Attack
SQL Injection
Bill Fraud
Brute Force Attack
Man-in-the-Middle Attack
Amazon WS Attacks
IoT Threats
Cross-Site Scripting
Shadow IT
Cloud Cryptomining
Social Engineering Attack
Malware
Compromised Credentials