Zero- Day Exploit Shadow IT IoT Threats Open Redirection Drive-by Download Attack Macro Viruses Watering Hole Attack Application Access Token Pass the Hash Spyware Man-in- the- Middle Attack DNS Amplification Insider Threat Cloud Cryptomining Amazon WS Attacks DoS Attack Typo Squatting Advanced Persistent Threat Simjacking Brute Force Attack Malicious Powershell Cross- Site Scripting Ransomware Spear Phishing Social Engineering Attack Bill Fraud Malware Compromised Credentials Privileged User Compromise Web Session Cookie Theft Credential Dumping SQL Injection Phishing Payloads Crypto Jacking Attack Supply Chain Attack Whale Phishing Masquerade Attack Meltdown & Spectre Attack Account Takeover Network Sniffing Zero- Day Exploit Shadow IT IoT Threats Open Redirection Drive-by Download Attack Macro Viruses Watering Hole Attack Application Access Token Pass the Hash Spyware Man-in- the- Middle Attack DNS Amplification Insider Threat Cloud Cryptomining Amazon WS Attacks DoS Attack Typo Squatting Advanced Persistent Threat Simjacking Brute Force Attack Malicious Powershell Cross- Site Scripting Ransomware Spear Phishing Social Engineering Attack Bill Fraud Malware Compromised Credentials Privileged User Compromise Web Session Cookie Theft Credential Dumping SQL Injection Phishing Payloads Crypto Jacking Attack Supply Chain Attack Whale Phishing Masquerade Attack Meltdown & Spectre Attack Account Takeover Network Sniffing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Zero-Day Exploit
Shadow IT
IoT Threats
Open Redirection
Drive-by Download Attack
Macro Viruses
Watering Hole Attack
Application Access Token
Pass the Hash
Spyware
Man-in-the-Middle Attack
DNS Amplification
Insider Threat
Cloud Cryptomining
Amazon WS Attacks
DoS Attack
Typo Squatting
Advanced Persistent Threat
Simjacking
Brute Force Attack
Malicious Powershell
Cross-Site Scripting
Ransomware
Spear Phishing
Social Engineering Attack
Bill Fraud
Malware
Compromised Credentials
Privileged User Compromise
Web Session Cookie Theft
Credential Dumping
SQL Injection
Phishing Payloads
Crypto Jacking Attack
Supply Chain Attack
Whale Phishing
Masquerade Attack
Meltdown & Spectre Attack
Account Takeover
Network Sniffing