DNS Amplification Shadow IT Credential Dumping Spyware DoS Attack Privileged User Compromise Malicious Powershell Brute Force Attack Open Redirection Bill Fraud Pass the Hash Masquerade Attack Supply Chain Attack Ransomware Insider Threat IoT Threats Watering Hole Attack Phishing Payloads Web Session Cookie Theft Application Access Token Typo Squatting Cloud Cryptomining Compromised Credentials Cross- Site Scripting Crypto Jacking Attack Man-in- the- Middle Attack Meltdown & Spectre Attack Macro Viruses Simjacking SQL Injection Spear Phishing Malware Zero- Day Exploit Advanced Persistent Threat Network Sniffing Whale Phishing Social Engineering Attack Account Takeover Amazon WS Attacks Drive-by Download Attack DNS Amplification Shadow IT Credential Dumping Spyware DoS Attack Privileged User Compromise Malicious Powershell Brute Force Attack Open Redirection Bill Fraud Pass the Hash Masquerade Attack Supply Chain Attack Ransomware Insider Threat IoT Threats Watering Hole Attack Phishing Payloads Web Session Cookie Theft Application Access Token Typo Squatting Cloud Cryptomining Compromised Credentials Cross- Site Scripting Crypto Jacking Attack Man-in- the- Middle Attack Meltdown & Spectre Attack Macro Viruses Simjacking SQL Injection Spear Phishing Malware Zero- Day Exploit Advanced Persistent Threat Network Sniffing Whale Phishing Social Engineering Attack Account Takeover Amazon WS Attacks Drive-by Download Attack
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
DNS Amplification
Shadow IT
Credential Dumping
Spyware
DoS Attack
Privileged User Compromise
Malicious Powershell
Brute Force Attack
Open Redirection
Bill Fraud
Pass the Hash
Masquerade Attack
Supply Chain Attack
Ransomware
Insider Threat
IoT Threats
Watering Hole Attack
Phishing Payloads
Web Session Cookie Theft
Application Access Token
Typo Squatting
Cloud Cryptomining
Compromised Credentials
Cross-Site Scripting
Crypto Jacking Attack
Man-in-the-Middle Attack
Meltdown & Spectre Attack
Macro Viruses
Simjacking
SQL Injection
Spear Phishing
Malware
Zero-Day Exploit
Advanced Persistent Threat
Network Sniffing
Whale Phishing
Social Engineering Attack
Account Takeover
Amazon WS Attacks
Drive-by Download Attack