SpywareSQLInjectionSpearPhishingOpenRedirectionSupplyChainAttackCredentialDumpingIoTThreatsMan-in-the-MiddleAttackWhalePhishingBillFraudAdvancedPersistentThreatCloudCryptominingMalwareDNSAmplificationPasstheHashApplicationAccessTokenTypoSquattingSocialEngineeringAttackMaliciousPowershellDrive-byDownloadAttackShadowITRansomwareCross-SiteScriptingMeltdown& SpectreAttackDoSAttackMasqueradeAttackWebSessionCookieTheftAccountTakeoverNetworkSniffingZero-DayExploitPhishingPayloadsCryptoJackingAttackBruteForceAttackWateringHoleAttackPrivilegedUserCompromiseAmazonWSAttacksCompromisedCredentialsMacroVirusesInsiderThreatSimjackingSpywareSQLInjectionSpearPhishingOpenRedirectionSupplyChainAttackCredentialDumpingIoTThreatsMan-in-the-MiddleAttackWhalePhishingBillFraudAdvancedPersistentThreatCloudCryptominingMalwareDNSAmplificationPasstheHashApplicationAccessTokenTypoSquattingSocialEngineeringAttackMaliciousPowershellDrive-byDownloadAttackShadowITRansomwareCross-SiteScriptingMeltdown& SpectreAttackDoSAttackMasqueradeAttackWebSessionCookieTheftAccountTakeoverNetworkSniffingZero-DayExploitPhishingPayloadsCryptoJackingAttackBruteForceAttackWateringHoleAttackPrivilegedUserCompromiseAmazonWSAttacksCompromisedCredentialsMacroVirusesInsiderThreatSimjacking

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Spyware
  2. SQL Injection
  3. Spear Phishing
  4. Open Redirection
  5. Supply Chain Attack
  6. Credential Dumping
  7. IoT Threats
  8. Man-in-the-Middle Attack
  9. Whale Phishing
  10. Bill Fraud
  11. Advanced Persistent Threat
  12. Cloud Cryptomining
  13. Malware
  14. DNS Amplification
  15. Pass the Hash
  16. Application Access Token
  17. Typo Squatting
  18. Social Engineering Attack
  19. Malicious Powershell
  20. Drive-by Download Attack
  21. Shadow IT
  22. Ransomware
  23. Cross-Site Scripting
  24. Meltdown & Spectre Attack
  25. DoS Attack
  26. Masquerade Attack
  27. Web Session Cookie Theft
  28. Account Takeover
  29. Network Sniffing
  30. Zero-Day Exploit
  31. Phishing Payloads
  32. Crypto Jacking Attack
  33. Brute Force Attack
  34. Watering Hole Attack
  35. Privileged User Compromise
  36. Amazon WS Attacks
  37. Compromised Credentials
  38. Macro Viruses
  39. Insider Threat
  40. Simjacking