IoT Threats Whale Phishing Macro Viruses Application Access Token Open Redirection Privileged User Compromise Man-in- the- Middle Attack Ransomware Phishing Payloads Supply Chain Attack Advanced Persistent Threat Insider Threat Cross- Site Scripting DoS Attack Crypto Jacking Attack Typo Squatting Bill Fraud Credential Dumping Malicious Powershell Network Sniffing Meltdown & Spectre Attack Simjacking Drive-by Download Attack Account Takeover Zero- Day Exploit Cloud Cryptomining Masquerade Attack Compromised Credentials SQL Injection Brute Force Attack Spear Phishing Pass the Hash DNS Amplification Malware Web Session Cookie Theft Social Engineering Attack Spyware Watering Hole Attack Amazon WS Attacks Shadow IT IoT Threats Whale Phishing Macro Viruses Application Access Token Open Redirection Privileged User Compromise Man-in- the- Middle Attack Ransomware Phishing Payloads Supply Chain Attack Advanced Persistent Threat Insider Threat Cross- Site Scripting DoS Attack Crypto Jacking Attack Typo Squatting Bill Fraud Credential Dumping Malicious Powershell Network Sniffing Meltdown & Spectre Attack Simjacking Drive-by Download Attack Account Takeover Zero- Day Exploit Cloud Cryptomining Masquerade Attack Compromised Credentials SQL Injection Brute Force Attack Spear Phishing Pass the Hash DNS Amplification Malware Web Session Cookie Theft Social Engineering Attack Spyware Watering Hole Attack Amazon WS Attacks Shadow IT
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
IoT Threats
Whale Phishing
Macro Viruses
Application Access Token
Open Redirection
Privileged User Compromise
Man-in-the-Middle Attack
Ransomware
Phishing Payloads
Supply Chain Attack
Advanced Persistent Threat
Insider Threat
Cross-Site Scripting
DoS Attack
Crypto Jacking Attack
Typo Squatting
Bill Fraud
Credential Dumping
Malicious Powershell
Network Sniffing
Meltdown & Spectre Attack
Simjacking
Drive-by Download Attack
Account Takeover
Zero-Day Exploit
Cloud Cryptomining
Masquerade Attack
Compromised Credentials
SQL Injection
Brute Force Attack
Spear Phishing
Pass the Hash
DNS Amplification
Malware
Web Session Cookie Theft
Social Engineering Attack
Spyware
Watering Hole Attack
Amazon WS Attacks
Shadow IT