ApplicationAccessTokenBruteForceAttackRansomwareMasqueradeAttackCompromisedCredentialsSupplyChainAttackCloudCryptominingCredentialDumpingSQLInjectionSocialEngineeringAttackDrive-byDownloadAttackIoTThreatsInsiderThreatPhishingPayloadsPrivilegedUserCompromiseWebSessionCookieTheftPasstheHashAccountTakeoverOpenRedirectionMeltdown& SpectreAttackSimjackingWateringHoleAttackCryptoJackingAttackMaliciousPowershellNetworkSniffingMan-in-the-MiddleAttackSpearPhishingCross-SiteScriptingAmazonWSAttacksTypoSquattingDoSAttackMalwareSpywareWhalePhishingZero-DayExploitDNSAmplificationAdvancedPersistentThreatShadowITMacroVirusesBillFraudApplicationAccessTokenBruteForceAttackRansomwareMasqueradeAttackCompromisedCredentialsSupplyChainAttackCloudCryptominingCredentialDumpingSQLInjectionSocialEngineeringAttackDrive-byDownloadAttackIoTThreatsInsiderThreatPhishingPayloadsPrivilegedUserCompromiseWebSessionCookieTheftPasstheHashAccountTakeoverOpenRedirectionMeltdown& SpectreAttackSimjackingWateringHoleAttackCryptoJackingAttackMaliciousPowershellNetworkSniffingMan-in-the-MiddleAttackSpearPhishingCross-SiteScriptingAmazonWSAttacksTypoSquattingDoSAttackMalwareSpywareWhalePhishingZero-DayExploitDNSAmplificationAdvancedPersistentThreatShadowITMacroVirusesBillFraud

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Application Access Token
  2. Brute Force Attack
  3. Ransomware
  4. Masquerade Attack
  5. Compromised Credentials
  6. Supply Chain Attack
  7. Cloud Cryptomining
  8. Credential Dumping
  9. SQL Injection
  10. Social Engineering Attack
  11. Drive-by Download Attack
  12. IoT Threats
  13. Insider Threat
  14. Phishing Payloads
  15. Privileged User Compromise
  16. Web Session Cookie Theft
  17. Pass the Hash
  18. Account Takeover
  19. Open Redirection
  20. Meltdown & Spectre Attack
  21. Simjacking
  22. Watering Hole Attack
  23. Crypto Jacking Attack
  24. Malicious Powershell
  25. Network Sniffing
  26. Man-in-the-Middle Attack
  27. Spear Phishing
  28. Cross-Site Scripting
  29. Amazon WS Attacks
  30. Typo Squatting
  31. DoS Attack
  32. Malware
  33. Spyware
  34. Whale Phishing
  35. Zero-Day Exploit
  36. DNS Amplification
  37. Advanced Persistent Threat
  38. Shadow IT
  39. Macro Viruses
  40. Bill Fraud