SpearPhishingInsiderThreatMeltdown& SpectreAttackWebSessionCookieTheftSimjackingCryptoJackingAttackRansomwareWhalePhishingDrive-byDownloadAttackZero-DayExploitCredentialDumpingPasstheHashAdvancedPersistentThreatWateringHoleAttackApplicationAccessTokenNetworkSniffingAccountTakeoverOpenRedirectionTypoSquattingPrivilegedUserCompromiseDNSAmplificationSupplyChainAttackSpywareMacroVirusesMasqueradeAttackMaliciousPowershellPhishingPayloadsDoSAttackSQLInjectionBillFraudBruteForceAttackMan-in-the-MiddleAttackAmazonWSAttacksIoTThreatsCross-SiteScriptingShadowITCloudCryptominingSocialEngineeringAttackMalwareCompromisedCredentialsSpearPhishingInsiderThreatMeltdown& SpectreAttackWebSessionCookieTheftSimjackingCryptoJackingAttackRansomwareWhalePhishingDrive-byDownloadAttackZero-DayExploitCredentialDumpingPasstheHashAdvancedPersistentThreatWateringHoleAttackApplicationAccessTokenNetworkSniffingAccountTakeoverOpenRedirectionTypoSquattingPrivilegedUserCompromiseDNSAmplificationSupplyChainAttackSpywareMacroVirusesMasqueradeAttackMaliciousPowershellPhishingPayloadsDoSAttackSQLInjectionBillFraudBruteForceAttackMan-in-the-MiddleAttackAmazonWSAttacksIoTThreatsCross-SiteScriptingShadowITCloudCryptominingSocialEngineeringAttackMalwareCompromisedCredentials

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Spear Phishing
  2. Insider Threat
  3. Meltdown & Spectre Attack
  4. Web Session Cookie Theft
  5. Simjacking
  6. Crypto Jacking Attack
  7. Ransomware
  8. Whale Phishing
  9. Drive-by Download Attack
  10. Zero-Day Exploit
  11. Credential Dumping
  12. Pass the Hash
  13. Advanced Persistent Threat
  14. Watering Hole Attack
  15. Application Access Token
  16. Network Sniffing
  17. Account Takeover
  18. Open Redirection
  19. Typo Squatting
  20. Privileged User Compromise
  21. DNS Amplification
  22. Supply Chain Attack
  23. Spyware
  24. Macro Viruses
  25. Masquerade Attack
  26. Malicious Powershell
  27. Phishing Payloads
  28. DoS Attack
  29. SQL Injection
  30. Bill Fraud
  31. Brute Force Attack
  32. Man-in-the-Middle Attack
  33. Amazon WS Attacks
  34. IoT Threats
  35. Cross-Site Scripting
  36. Shadow IT
  37. Cloud Cryptomining
  38. Social Engineering Attack
  39. Malware
  40. Compromised Credentials