CloudCryptominingApplicationAccessTokenShadowITSocialEngineeringAttackSimjackingBruteForceAttackWebSessionCookieTheftPrivilegedUserCompromiseSpearPhishingCredentialDumpingOpenRedirectionWhalePhishingDNSAmplificationRansomwareMeltdown& SpectreAttackMan-in-the-MiddleAttackCompromisedCredentialsMaliciousPowershellSQLInjectionCryptoJackingAttackDrive-byDownloadAttackWateringHoleAttackSpywareInsiderThreatPasstheHashMalwareSupplyChainAttackCross-SiteScriptingBillFraudNetworkSniffingPhishingPayloadsTypoSquattingDoSAttackZero-DayExploitAmazonWSAttacksMacroVirusesMasqueradeAttackIoTThreatsAdvancedPersistentThreatAccountTakeoverCloudCryptominingApplicationAccessTokenShadowITSocialEngineeringAttackSimjackingBruteForceAttackWebSessionCookieTheftPrivilegedUserCompromiseSpearPhishingCredentialDumpingOpenRedirectionWhalePhishingDNSAmplificationRansomwareMeltdown& SpectreAttackMan-in-the-MiddleAttackCompromisedCredentialsMaliciousPowershellSQLInjectionCryptoJackingAttackDrive-byDownloadAttackWateringHoleAttackSpywareInsiderThreatPasstheHashMalwareSupplyChainAttackCross-SiteScriptingBillFraudNetworkSniffingPhishingPayloadsTypoSquattingDoSAttackZero-DayExploitAmazonWSAttacksMacroVirusesMasqueradeAttackIoTThreatsAdvancedPersistentThreatAccountTakeover

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Cloud Cryptomining
  2. Application Access Token
  3. Shadow IT
  4. Social Engineering Attack
  5. Simjacking
  6. Brute Force Attack
  7. Web Session Cookie Theft
  8. Privileged User Compromise
  9. Spear Phishing
  10. Credential Dumping
  11. Open Redirection
  12. Whale Phishing
  13. DNS Amplification
  14. Ransomware
  15. Meltdown & Spectre Attack
  16. Man-in-the-Middle Attack
  17. Compromised Credentials
  18. Malicious Powershell
  19. SQL Injection
  20. Crypto Jacking Attack
  21. Drive-by Download Attack
  22. Watering Hole Attack
  23. Spyware
  24. Insider Threat
  25. Pass the Hash
  26. Malware
  27. Supply Chain Attack
  28. Cross-Site Scripting
  29. Bill Fraud
  30. Network Sniffing
  31. Phishing Payloads
  32. Typo Squatting
  33. DoS Attack
  34. Zero-Day Exploit
  35. Amazon WS Attacks
  36. Macro Viruses
  37. Masquerade Attack
  38. IoT Threats
  39. Advanced Persistent Threat
  40. Account Takeover