SpearPhishingBruteForceAttackWhalePhishingSupplyChainAttackWateringHoleAttackTypoSquattingAccountTakeoverCredentialDumpingRansomwareApplicationAccessTokenPrivilegedUserCompromiseCompromisedCredentialsOpenRedirectionDrive-byDownloadAttackDNSAmplificationMalwareCross-SiteScriptingWebSessionCookieTheftZero-DayExploitMan-in-the-MiddleAttackNetworkSniffingMasqueradeAttackSocialEngineeringAttackAdvancedPersistentThreatIoTThreatsInsiderThreatSQLInjectionPasstheHashCryptoJackingAttackSpywareAmazonWSAttacksShadowITPhishingPayloadsMaliciousPowershellBillFraudMeltdown& SpectreAttackMacroVirusesDoSAttackCloudCryptominingSimjackingSpearPhishingBruteForceAttackWhalePhishingSupplyChainAttackWateringHoleAttackTypoSquattingAccountTakeoverCredentialDumpingRansomwareApplicationAccessTokenPrivilegedUserCompromiseCompromisedCredentialsOpenRedirectionDrive-byDownloadAttackDNSAmplificationMalwareCross-SiteScriptingWebSessionCookieTheftZero-DayExploitMan-in-the-MiddleAttackNetworkSniffingMasqueradeAttackSocialEngineeringAttackAdvancedPersistentThreatIoTThreatsInsiderThreatSQLInjectionPasstheHashCryptoJackingAttackSpywareAmazonWSAttacksShadowITPhishingPayloadsMaliciousPowershellBillFraudMeltdown& SpectreAttackMacroVirusesDoSAttackCloudCryptominingSimjacking

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Spear Phishing
  2. Brute Force Attack
  3. Whale Phishing
  4. Supply Chain Attack
  5. Watering Hole Attack
  6. Typo Squatting
  7. Account Takeover
  8. Credential Dumping
  9. Ransomware
  10. Application Access Token
  11. Privileged User Compromise
  12. Compromised Credentials
  13. Open Redirection
  14. Drive-by Download Attack
  15. DNS Amplification
  16. Malware
  17. Cross-Site Scripting
  18. Web Session Cookie Theft
  19. Zero-Day Exploit
  20. Man-in-the-Middle Attack
  21. Network Sniffing
  22. Masquerade Attack
  23. Social Engineering Attack
  24. Advanced Persistent Threat
  25. IoT Threats
  26. Insider Threat
  27. SQL Injection
  28. Pass the Hash
  29. Crypto Jacking Attack
  30. Spyware
  31. Amazon WS Attacks
  32. Shadow IT
  33. Phishing Payloads
  34. Malicious Powershell
  35. Bill Fraud
  36. Meltdown & Spectre Attack
  37. Macro Viruses
  38. DoS Attack
  39. Cloud Cryptomining
  40. Simjacking