DNSAmplificationShadowITCredentialDumpingSpywareDoSAttackPrivilegedUserCompromiseMaliciousPowershellBruteForceAttackOpenRedirectionBillFraudPasstheHashMasqueradeAttackSupplyChainAttackRansomwareInsiderThreatIoTThreatsWateringHoleAttackPhishingPayloadsWebSessionCookieTheftApplicationAccessTokenTypoSquattingCloudCryptominingCompromisedCredentialsCross-SiteScriptingCryptoJackingAttackMan-in-the-MiddleAttackMeltdown& SpectreAttackMacroVirusesSimjackingSQLInjectionSpearPhishingMalwareZero-DayExploitAdvancedPersistentThreatNetworkSniffingWhalePhishingSocialEngineeringAttackAccountTakeoverAmazonWSAttacksDrive-byDownloadAttackDNSAmplificationShadowITCredentialDumpingSpywareDoSAttackPrivilegedUserCompromiseMaliciousPowershellBruteForceAttackOpenRedirectionBillFraudPasstheHashMasqueradeAttackSupplyChainAttackRansomwareInsiderThreatIoTThreatsWateringHoleAttackPhishingPayloadsWebSessionCookieTheftApplicationAccessTokenTypoSquattingCloudCryptominingCompromisedCredentialsCross-SiteScriptingCryptoJackingAttackMan-in-the-MiddleAttackMeltdown& SpectreAttackMacroVirusesSimjackingSQLInjectionSpearPhishingMalwareZero-DayExploitAdvancedPersistentThreatNetworkSniffingWhalePhishingSocialEngineeringAttackAccountTakeoverAmazonWSAttacksDrive-byDownloadAttack

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. DNS Amplification
  2. Shadow IT
  3. Credential Dumping
  4. Spyware
  5. DoS Attack
  6. Privileged User Compromise
  7. Malicious Powershell
  8. Brute Force Attack
  9. Open Redirection
  10. Bill Fraud
  11. Pass the Hash
  12. Masquerade Attack
  13. Supply Chain Attack
  14. Ransomware
  15. Insider Threat
  16. IoT Threats
  17. Watering Hole Attack
  18. Phishing Payloads
  19. Web Session Cookie Theft
  20. Application Access Token
  21. Typo Squatting
  22. Cloud Cryptomining
  23. Compromised Credentials
  24. Cross-Site Scripting
  25. Crypto Jacking Attack
  26. Man-in-the-Middle Attack
  27. Meltdown & Spectre Attack
  28. Macro Viruses
  29. Simjacking
  30. SQL Injection
  31. Spear Phishing
  32. Malware
  33. Zero-Day Exploit
  34. Advanced Persistent Threat
  35. Network Sniffing
  36. Whale Phishing
  37. Social Engineering Attack
  38. Account Takeover
  39. Amazon WS Attacks
  40. Drive-by Download Attack