Web Session Cookie Theft Network Sniffing DoS Attack Masquerade Attack Compromised Credentials IoT Threats Open Redirection Drive-by Download Attack Ransomware Spyware Man-in- the- Middle Attack Cross- Site Scripting Cloud Cryptomining Malicious Powershell DNS Amplification Pass the Hash Bill Fraud Malware Watering Hole Attack Application Access Token Social Engineering Attack Typo Squatting Meltdown & Spectre Attack Phishing Payloads Amazon WS Attacks Credential Dumping Privileged User Compromise Shadow IT Crypto Jacking Attack Whale Phishing Spear Phishing Macro Viruses Zero- Day Exploit Simjacking Brute Force Attack Insider Threat SQL Injection Supply Chain Attack Account Takeover Advanced Persistent Threat Web Session Cookie Theft Network Sniffing DoS Attack Masquerade Attack Compromised Credentials IoT Threats Open Redirection Drive-by Download Attack Ransomware Spyware Man-in- the- Middle Attack Cross- Site Scripting Cloud Cryptomining Malicious Powershell DNS Amplification Pass the Hash Bill Fraud Malware Watering Hole Attack Application Access Token Social Engineering Attack Typo Squatting Meltdown & Spectre Attack Phishing Payloads Amazon WS Attacks Credential Dumping Privileged User Compromise Shadow IT Crypto Jacking Attack Whale Phishing Spear Phishing Macro Viruses Zero- Day Exploit Simjacking Brute Force Attack Insider Threat SQL Injection Supply Chain Attack Account Takeover Advanced Persistent Threat
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Web Session Cookie Theft
Network Sniffing
DoS Attack
Masquerade Attack
Compromised Credentials
IoT Threats
Open Redirection
Drive-by Download Attack
Ransomware
Spyware
Man-in-the-Middle Attack
Cross-Site Scripting
Cloud Cryptomining
Malicious Powershell
DNS Amplification
Pass the Hash
Bill Fraud
Malware
Watering Hole Attack
Application Access Token
Social Engineering Attack
Typo Squatting
Meltdown & Spectre Attack
Phishing Payloads
Amazon WS Attacks
Credential Dumping
Privileged User Compromise
Shadow IT
Crypto Jacking Attack
Whale Phishing
Spear Phishing
Macro Viruses
Zero-Day Exploit
Simjacking
Brute Force Attack
Insider Threat
SQL Injection
Supply Chain Attack
Account Takeover
Advanced Persistent Threat