Spyware SQL Injection Spear Phishing Open Redirection Supply Chain Attack Credential Dumping IoT Threats Man-in- the- Middle Attack Whale Phishing Bill Fraud Advanced Persistent Threat Cloud Cryptomining Malware DNS Amplification Pass the Hash Application Access Token Typo Squatting Social Engineering Attack Malicious Powershell Drive-by Download Attack Shadow IT Ransomware Cross- Site Scripting Meltdown & Spectre Attack DoS Attack Masquerade Attack Web Session Cookie Theft Account Takeover Network Sniffing Zero- Day Exploit Phishing Payloads Crypto Jacking Attack Brute Force Attack Watering Hole Attack Privileged User Compromise Amazon WS Attacks Compromised Credentials Macro Viruses Insider Threat Simjacking Spyware SQL Injection Spear Phishing Open Redirection Supply Chain Attack Credential Dumping IoT Threats Man-in- the- Middle Attack Whale Phishing Bill Fraud Advanced Persistent Threat Cloud Cryptomining Malware DNS Amplification Pass the Hash Application Access Token Typo Squatting Social Engineering Attack Malicious Powershell Drive-by Download Attack Shadow IT Ransomware Cross- Site Scripting Meltdown & Spectre Attack DoS Attack Masquerade Attack Web Session Cookie Theft Account Takeover Network Sniffing Zero- Day Exploit Phishing Payloads Crypto Jacking Attack Brute Force Attack Watering Hole Attack Privileged User Compromise Amazon WS Attacks Compromised Credentials Macro Viruses Insider Threat Simjacking
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Spyware
SQL Injection
Spear Phishing
Open Redirection
Supply Chain Attack
Credential Dumping
IoT Threats
Man-in-the-Middle Attack
Whale Phishing
Bill Fraud
Advanced Persistent Threat
Cloud Cryptomining
Malware
DNS Amplification
Pass the Hash
Application Access Token
Typo Squatting
Social Engineering Attack
Malicious Powershell
Drive-by Download Attack
Shadow IT
Ransomware
Cross-Site Scripting
Meltdown & Spectre Attack
DoS Attack
Masquerade Attack
Web Session Cookie Theft
Account Takeover
Network Sniffing
Zero-Day Exploit
Phishing Payloads
Crypto Jacking Attack
Brute Force Attack
Watering Hole Attack
Privileged User Compromise
Amazon WS Attacks
Compromised Credentials
Macro Viruses
Insider Threat
Simjacking