Malicious Powershell Compromised Credentials Brute Force Attack Watering Hole Attack Simjacking Amazon WS Attacks Macro Viruses Application Access Token Social Engineering Attack Drive-by Download Attack Account Takeover Phishing Payloads Crypto Jacking Attack Zero- Day Exploit Shadow IT Man-in- the- Middle Attack Ransomware Malware Web Session Cookie Theft Spyware Masquerade Attack Pass the Hash Open Redirection Spear Phishing Privileged User Compromise Cross- Site Scripting Advanced Persistent Threat Cloud Cryptomining IoT Threats DNS Amplification Whale Phishing Supply Chain Attack Network Sniffing Typo Squatting DoS Attack Meltdown & Spectre Attack Credential Dumping SQL Injection Bill Fraud Insider Threat Malicious Powershell Compromised Credentials Brute Force Attack Watering Hole Attack Simjacking Amazon WS Attacks Macro Viruses Application Access Token Social Engineering Attack Drive-by Download Attack Account Takeover Phishing Payloads Crypto Jacking Attack Zero- Day Exploit Shadow IT Man-in- the- Middle Attack Ransomware Malware Web Session Cookie Theft Spyware Masquerade Attack Pass the Hash Open Redirection Spear Phishing Privileged User Compromise Cross- Site Scripting Advanced Persistent Threat Cloud Cryptomining IoT Threats DNS Amplification Whale Phishing Supply Chain Attack Network Sniffing Typo Squatting DoS Attack Meltdown & Spectre Attack Credential Dumping SQL Injection Bill Fraud Insider Threat
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Malicious Powershell
Compromised Credentials
Brute Force Attack
Watering Hole Attack
Simjacking
Amazon WS Attacks
Macro Viruses
Application Access Token
Social Engineering Attack
Drive-by Download Attack
Account Takeover
Phishing Payloads
Crypto Jacking Attack
Zero-Day Exploit
Shadow IT
Man-in-the-Middle Attack
Ransomware
Malware
Web Session Cookie Theft
Spyware
Masquerade Attack
Pass the Hash
Open Redirection
Spear Phishing
Privileged User Compromise
Cross-Site Scripting
Advanced Persistent Threat
Cloud Cryptomining
IoT Threats
DNS Amplification
Whale Phishing
Supply Chain Attack
Network Sniffing
Typo Squatting
DoS Attack
Meltdown & Spectre Attack
Credential Dumping
SQL Injection
Bill Fraud
Insider Threat