WebSessionCookieTheftNetworkSniffingDoSAttackMasqueradeAttackCompromisedCredentialsIoTThreatsOpenRedirectionDrive-byDownloadAttackRansomwareSpywareMan-in-the-MiddleAttackCross-SiteScriptingCloudCryptominingMaliciousPowershellDNSAmplificationPasstheHashBillFraudMalwareWateringHoleAttackApplicationAccessTokenSocialEngineeringAttackTypoSquattingMeltdown& SpectreAttackPhishingPayloadsAmazonWSAttacksCredentialDumpingPrivilegedUserCompromiseShadowITCryptoJackingAttackWhalePhishingSpearPhishingMacroVirusesZero-DayExploitSimjackingBruteForceAttackInsiderThreatSQLInjectionSupplyChainAttackAccountTakeoverAdvancedPersistentThreatWebSessionCookieTheftNetworkSniffingDoSAttackMasqueradeAttackCompromisedCredentialsIoTThreatsOpenRedirectionDrive-byDownloadAttackRansomwareSpywareMan-in-the-MiddleAttackCross-SiteScriptingCloudCryptominingMaliciousPowershellDNSAmplificationPasstheHashBillFraudMalwareWateringHoleAttackApplicationAccessTokenSocialEngineeringAttackTypoSquattingMeltdown& SpectreAttackPhishingPayloadsAmazonWSAttacksCredentialDumpingPrivilegedUserCompromiseShadowITCryptoJackingAttackWhalePhishingSpearPhishingMacroVirusesZero-DayExploitSimjackingBruteForceAttackInsiderThreatSQLInjectionSupplyChainAttackAccountTakeoverAdvancedPersistentThreat

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Web Session Cookie Theft
  2. Network Sniffing
  3. DoS Attack
  4. Masquerade Attack
  5. Compromised Credentials
  6. IoT Threats
  7. Open Redirection
  8. Drive-by Download Attack
  9. Ransomware
  10. Spyware
  11. Man-in-the-Middle Attack
  12. Cross-Site Scripting
  13. Cloud Cryptomining
  14. Malicious Powershell
  15. DNS Amplification
  16. Pass the Hash
  17. Bill Fraud
  18. Malware
  19. Watering Hole Attack
  20. Application Access Token
  21. Social Engineering Attack
  22. Typo Squatting
  23. Meltdown & Spectre Attack
  24. Phishing Payloads
  25. Amazon WS Attacks
  26. Credential Dumping
  27. Privileged User Compromise
  28. Shadow IT
  29. Crypto Jacking Attack
  30. Whale Phishing
  31. Spear Phishing
  32. Macro Viruses
  33. Zero-Day Exploit
  34. Simjacking
  35. Brute Force Attack
  36. Insider Threat
  37. SQL Injection
  38. Supply Chain Attack
  39. Account Takeover
  40. Advanced Persistent Threat