IoTThreatsWhalePhishingMacroVirusesApplicationAccessTokenOpenRedirectionPrivilegedUserCompromiseMan-in-the-MiddleAttackRansomwarePhishingPayloadsSupplyChainAttackAdvancedPersistentThreatInsiderThreatCross-SiteScriptingDoSAttackCryptoJackingAttackTypoSquattingBillFraudCredentialDumpingMaliciousPowershellNetworkSniffingMeltdown& SpectreAttackSimjackingDrive-byDownloadAttackAccountTakeoverZero-DayExploitCloudCryptominingMasqueradeAttackCompromisedCredentialsSQLInjectionBruteForceAttackSpearPhishingPasstheHashDNSAmplificationMalwareWebSessionCookieTheftSocialEngineeringAttackSpywareWateringHoleAttackAmazonWSAttacksShadowITIoTThreatsWhalePhishingMacroVirusesApplicationAccessTokenOpenRedirectionPrivilegedUserCompromiseMan-in-the-MiddleAttackRansomwarePhishingPayloadsSupplyChainAttackAdvancedPersistentThreatInsiderThreatCross-SiteScriptingDoSAttackCryptoJackingAttackTypoSquattingBillFraudCredentialDumpingMaliciousPowershellNetworkSniffingMeltdown& SpectreAttackSimjackingDrive-byDownloadAttackAccountTakeoverZero-DayExploitCloudCryptominingMasqueradeAttackCompromisedCredentialsSQLInjectionBruteForceAttackSpearPhishingPasstheHashDNSAmplificationMalwareWebSessionCookieTheftSocialEngineeringAttackSpywareWateringHoleAttackAmazonWSAttacksShadowIT

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. IoT Threats
  2. Whale Phishing
  3. Macro Viruses
  4. Application Access Token
  5. Open Redirection
  6. Privileged User Compromise
  7. Man-in-the-Middle Attack
  8. Ransomware
  9. Phishing Payloads
  10. Supply Chain Attack
  11. Advanced Persistent Threat
  12. Insider Threat
  13. Cross-Site Scripting
  14. DoS Attack
  15. Crypto Jacking Attack
  16. Typo Squatting
  17. Bill Fraud
  18. Credential Dumping
  19. Malicious Powershell
  20. Network Sniffing
  21. Meltdown & Spectre Attack
  22. Simjacking
  23. Drive-by Download Attack
  24. Account Takeover
  25. Zero-Day Exploit
  26. Cloud Cryptomining
  27. Masquerade Attack
  28. Compromised Credentials
  29. SQL Injection
  30. Brute Force Attack
  31. Spear Phishing
  32. Pass the Hash
  33. DNS Amplification
  34. Malware
  35. Web Session Cookie Theft
  36. Social Engineering Attack
  37. Spyware
  38. Watering Hole Attack
  39. Amazon WS Attacks
  40. Shadow IT