BillFraudDrive-byDownloadAttackApplicationAccessTokenSpearPhishingCross-SiteScriptingSQLInjectionNetworkSniffingWebSessionCookieTheftCredentialDumpingCompromisedCredentialsBruteForceAttackPrivilegedUserCompromiseTypoSquattingSocialEngineeringAttackWateringHoleAttackWhalePhishingMacroVirusesCloudCryptominingMaliciousPowershellDoSAttackPasstheHashCryptoJackingAttackShadowITPhishingPayloadsSimjackingMeltdown& SpectreAttackAdvancedPersistentThreatMan-in-the-MiddleAttackIoTThreatsSupplyChainAttackInsiderThreatMasqueradeAttackDNSAmplificationMalwareOpenRedirectionAmazonWSAttacksAccountTakeoverSpywareRansomwareZero-DayExploitBillFraudDrive-byDownloadAttackApplicationAccessTokenSpearPhishingCross-SiteScriptingSQLInjectionNetworkSniffingWebSessionCookieTheftCredentialDumpingCompromisedCredentialsBruteForceAttackPrivilegedUserCompromiseTypoSquattingSocialEngineeringAttackWateringHoleAttackWhalePhishingMacroVirusesCloudCryptominingMaliciousPowershellDoSAttackPasstheHashCryptoJackingAttackShadowITPhishingPayloadsSimjackingMeltdown& SpectreAttackAdvancedPersistentThreatMan-in-the-MiddleAttackIoTThreatsSupplyChainAttackInsiderThreatMasqueradeAttackDNSAmplificationMalwareOpenRedirectionAmazonWSAttacksAccountTakeoverSpywareRansomwareZero-DayExploit

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Bill Fraud
  2. Drive-by Download Attack
  3. Application Access Token
  4. Spear Phishing
  5. Cross-Site Scripting
  6. SQL Injection
  7. Network Sniffing
  8. Web Session Cookie Theft
  9. Credential Dumping
  10. Compromised Credentials
  11. Brute Force Attack
  12. Privileged User Compromise
  13. Typo Squatting
  14. Social Engineering Attack
  15. Watering Hole Attack
  16. Whale Phishing
  17. Macro Viruses
  18. Cloud Cryptomining
  19. Malicious Powershell
  20. DoS Attack
  21. Pass the Hash
  22. Crypto Jacking Attack
  23. Shadow IT
  24. Phishing Payloads
  25. Simjacking
  26. Meltdown & Spectre Attack
  27. Advanced Persistent Threat
  28. Man-in-the-Middle Attack
  29. IoT Threats
  30. Supply Chain Attack
  31. Insider Threat
  32. Masquerade Attack
  33. DNS Amplification
  34. Malware
  35. Open Redirection
  36. Amazon WS Attacks
  37. Account Takeover
  38. Spyware
  39. Ransomware
  40. Zero-Day Exploit