Cloud Cryptomining Application Access Token Shadow IT Social Engineering Attack Simjacking Brute Force Attack Web Session Cookie Theft Privileged User Compromise Spear Phishing Credential Dumping Open Redirection Whale Phishing DNS Amplification Ransomware Meltdown & Spectre Attack Man-in- the- Middle Attack Compromised Credentials Malicious Powershell SQL Injection Crypto Jacking Attack Drive-by Download Attack Watering Hole Attack Spyware Insider Threat Pass the Hash Malware Supply Chain Attack Cross- Site Scripting Bill Fraud Network Sniffing Phishing Payloads Typo Squatting DoS Attack Zero- Day Exploit Amazon WS Attacks Macro Viruses Masquerade Attack IoT Threats Advanced Persistent Threat Account Takeover Cloud Cryptomining Application Access Token Shadow IT Social Engineering Attack Simjacking Brute Force Attack Web Session Cookie Theft Privileged User Compromise Spear Phishing Credential Dumping Open Redirection Whale Phishing DNS Amplification Ransomware Meltdown & Spectre Attack Man-in- the- Middle Attack Compromised Credentials Malicious Powershell SQL Injection Crypto Jacking Attack Drive-by Download Attack Watering Hole Attack Spyware Insider Threat Pass the Hash Malware Supply Chain Attack Cross- Site Scripting Bill Fraud Network Sniffing Phishing Payloads Typo Squatting DoS Attack Zero- Day Exploit Amazon WS Attacks Macro Viruses Masquerade Attack IoT Threats Advanced Persistent Threat Account Takeover
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Cloud Cryptomining
Application Access Token
Shadow IT
Social Engineering Attack
Simjacking
Brute Force Attack
Web Session Cookie Theft
Privileged User Compromise
Spear Phishing
Credential Dumping
Open Redirection
Whale Phishing
DNS Amplification
Ransomware
Meltdown & Spectre Attack
Man-in-the-Middle Attack
Compromised Credentials
Malicious Powershell
SQL Injection
Crypto Jacking Attack
Drive-by Download Attack
Watering Hole Attack
Spyware
Insider Threat
Pass the Hash
Malware
Supply Chain Attack
Cross-Site Scripting
Bill Fraud
Network Sniffing
Phishing Payloads
Typo Squatting
DoS Attack
Zero-Day Exploit
Amazon WS Attacks
Macro Viruses
Masquerade Attack
IoT Threats
Advanced Persistent Threat
Account Takeover