Meltdown& SpectreAttackMan-in-the-MiddleAttackOpenRedirectionCross-SiteScriptingPhishingPayloadsCryptoJackingAttackBruteForceAttackSocialEngineeringAttackBillFraudMasqueradeAttackApplicationAccessTokenSpywareAccountTakeoverWhalePhishingTypoSquattingSQLInjectionZero-DayExploitDoSAttackDrive-byDownloadAttackNetworkSniffingShadowITDNSAmplificationIoTThreatsRansomwareCredentialDumpingSpearPhishingAmazonWSAttacksInsiderThreatCompromisedCredentialsPasstheHashMacroVirusesMalwareMaliciousPowershellPrivilegedUserCompromiseSupplyChainAttackWebSessionCookieTheftAdvancedPersistentThreatWateringHoleAttackCloudCryptominingSimjackingMeltdown& SpectreAttackMan-in-the-MiddleAttackOpenRedirectionCross-SiteScriptingPhishingPayloadsCryptoJackingAttackBruteForceAttackSocialEngineeringAttackBillFraudMasqueradeAttackApplicationAccessTokenSpywareAccountTakeoverWhalePhishingTypoSquattingSQLInjectionZero-DayExploitDoSAttackDrive-byDownloadAttackNetworkSniffingShadowITDNSAmplificationIoTThreatsRansomwareCredentialDumpingSpearPhishingAmazonWSAttacksInsiderThreatCompromisedCredentialsPasstheHashMacroVirusesMalwareMaliciousPowershellPrivilegedUserCompromiseSupplyChainAttackWebSessionCookieTheftAdvancedPersistentThreatWateringHoleAttackCloudCryptominingSimjacking

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Meltdown & Spectre Attack
  2. Man-in-the-Middle Attack
  3. Open Redirection
  4. Cross-Site Scripting
  5. Phishing Payloads
  6. Crypto Jacking Attack
  7. Brute Force Attack
  8. Social Engineering Attack
  9. Bill Fraud
  10. Masquerade Attack
  11. Application Access Token
  12. Spyware
  13. Account Takeover
  14. Whale Phishing
  15. Typo Squatting
  16. SQL Injection
  17. Zero-Day Exploit
  18. DoS Attack
  19. Drive-by Download Attack
  20. Network Sniffing
  21. Shadow IT
  22. DNS Amplification
  23. IoT Threats
  24. Ransomware
  25. Credential Dumping
  26. Spear Phishing
  27. Amazon WS Attacks
  28. Insider Threat
  29. Compromised Credentials
  30. Pass the Hash
  31. Macro Viruses
  32. Malware
  33. Malicious Powershell
  34. Privileged User Compromise
  35. Supply Chain Attack
  36. Web Session Cookie Theft
  37. Advanced Persistent Threat
  38. Watering Hole Attack
  39. Cloud Cryptomining
  40. Simjacking