Brute Force Attack Typo Squatting Amazon WS Attacks Cloud Cryptomining Insider Threat Application Access Token Watering Hole Attack Spear Phishing Crypto Jacking Attack Malware Compromised Credentials Whale Phishing SQL Injection Network Sniffing Meltdown & Spectre Attack Zero- Day Exploit Open Redirection Spyware Account Takeover Privileged User Compromise Social Engineering Attack Man-in- the- Middle Attack Malicious Powershell IoT Threats Supply Chain Attack Ransomware DoS Attack Pass the Hash Credential Dumping Macro Viruses Cross- Site Scripting DNS Amplification Shadow IT Phishing Payloads Masquerade Attack Drive-by Download Attack Web Session Cookie Theft Bill Fraud Simjacking Advanced Persistent Threat Brute Force Attack Typo Squatting Amazon WS Attacks Cloud Cryptomining Insider Threat Application Access Token Watering Hole Attack Spear Phishing Crypto Jacking Attack Malware Compromised Credentials Whale Phishing SQL Injection Network Sniffing Meltdown & Spectre Attack Zero- Day Exploit Open Redirection Spyware Account Takeover Privileged User Compromise Social Engineering Attack Man-in- the- Middle Attack Malicious Powershell IoT Threats Supply Chain Attack Ransomware DoS Attack Pass the Hash Credential Dumping Macro Viruses Cross- Site Scripting DNS Amplification Shadow IT Phishing Payloads Masquerade Attack Drive-by Download Attack Web Session Cookie Theft Bill Fraud Simjacking Advanced Persistent Threat
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Brute Force Attack
Typo Squatting
Amazon WS Attacks
Cloud Cryptomining
Insider Threat
Application Access Token
Watering Hole Attack
Spear Phishing
Crypto Jacking Attack
Malware
Compromised Credentials
Whale Phishing
SQL Injection
Network Sniffing
Meltdown & Spectre Attack
Zero-Day Exploit
Open Redirection
Spyware
Account Takeover
Privileged User Compromise
Social Engineering Attack
Man-in-the-Middle Attack
Malicious Powershell
IoT Threats
Supply Chain Attack
Ransomware
DoS Attack
Pass the Hash
Credential Dumping
Macro Viruses
Cross-Site Scripting
DNS Amplification
Shadow IT
Phishing Payloads
Masquerade Attack
Drive-by Download Attack
Web Session Cookie Theft
Bill Fraud
Simjacking
Advanced Persistent Threat