Open Redirection Spyware DNS Amplification Cloud Cryptomining Social Engineering Attack Amazon WS Attacks Ransomware Brute Force Attack Account Takeover Shadow IT Insider Threat Drive-by Download Attack Masquerade Attack Typo Squatting Macro Viruses Meltdown & Spectre Attack Web Session Cookie Theft Whale Phishing SQL Injection Bill Fraud Watering Hole Attack Spear Phishing DoS Attack Network Sniffing Privileged User Compromise Credential Dumping IoT Threats Simjacking Crypto Jacking Attack Zero- Day Exploit Phishing Payloads Cross- Site Scripting Supply Chain Attack Malware Man-in- the- Middle Attack Application Access Token Advanced Persistent Threat Pass the Hash Malicious Powershell Compromised Credentials Open Redirection Spyware DNS Amplification Cloud Cryptomining Social Engineering Attack Amazon WS Attacks Ransomware Brute Force Attack Account Takeover Shadow IT Insider Threat Drive-by Download Attack Masquerade Attack Typo Squatting Macro Viruses Meltdown & Spectre Attack Web Session Cookie Theft Whale Phishing SQL Injection Bill Fraud Watering Hole Attack Spear Phishing DoS Attack Network Sniffing Privileged User Compromise Credential Dumping IoT Threats Simjacking Crypto Jacking Attack Zero- Day Exploit Phishing Payloads Cross- Site Scripting Supply Chain Attack Malware Man-in- the- Middle Attack Application Access Token Advanced Persistent Threat Pass the Hash Malicious Powershell Compromised Credentials
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Open Redirection
Spyware
DNS Amplification
Cloud Cryptomining
Social Engineering Attack
Amazon WS Attacks
Ransomware
Brute Force Attack
Account Takeover
Shadow IT
Insider Threat
Drive-by Download Attack
Masquerade Attack
Typo Squatting
Macro Viruses
Meltdown & Spectre Attack
Web Session Cookie Theft
Whale Phishing
SQL Injection
Bill Fraud
Watering Hole Attack
Spear Phishing
DoS Attack
Network Sniffing
Privileged User Compromise
Credential Dumping
IoT Threats
Simjacking
Crypto Jacking Attack
Zero-Day Exploit
Phishing Payloads
Cross-Site Scripting
Supply Chain Attack
Malware
Man-in-the-Middle Attack
Application Access Token
Advanced Persistent Threat
Pass the Hash
Malicious Powershell
Compromised Credentials