SimjackingMeltdown& SpectreAttackDNSAmplificationNetworkSniffingPasstheHashShadowITWebSessionCookieTheftWhalePhishingBruteForceAttackMaliciousPowershellDrive-byDownloadAttackDoSAttackCloudCryptominingMan-in-the-MiddleAttackWateringHoleAttackSpywareInsiderThreatMacroVirusesZero-DayExploitAdvancedPersistentThreatMasqueradeAttackPhishingPayloadsPrivilegedUserCompromiseRansomwareTypoSquattingSupplyChainAttackCredentialDumpingCryptoJackingAttackAccountTakeoverAmazonWSAttacksMalwareSpearPhishingOpenRedirectionBillFraudIoTThreatsApplicationAccessTokenCross-SiteScriptingCompromisedCredentialsSocialEngineeringAttackSQLInjectionSimjackingMeltdown& SpectreAttackDNSAmplificationNetworkSniffingPasstheHashShadowITWebSessionCookieTheftWhalePhishingBruteForceAttackMaliciousPowershellDrive-byDownloadAttackDoSAttackCloudCryptominingMan-in-the-MiddleAttackWateringHoleAttackSpywareInsiderThreatMacroVirusesZero-DayExploitAdvancedPersistentThreatMasqueradeAttackPhishingPayloadsPrivilegedUserCompromiseRansomwareTypoSquattingSupplyChainAttackCredentialDumpingCryptoJackingAttackAccountTakeoverAmazonWSAttacksMalwareSpearPhishingOpenRedirectionBillFraudIoTThreatsApplicationAccessTokenCross-SiteScriptingCompromisedCredentialsSocialEngineeringAttackSQLInjection

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Simjacking
  2. Meltdown & Spectre Attack
  3. DNS Amplification
  4. Network Sniffing
  5. Pass the Hash
  6. Shadow IT
  7. Web Session Cookie Theft
  8. Whale Phishing
  9. Brute Force Attack
  10. Malicious Powershell
  11. Drive-by Download Attack
  12. DoS Attack
  13. Cloud Cryptomining
  14. Man-in-the-Middle Attack
  15. Watering Hole Attack
  16. Spyware
  17. Insider Threat
  18. Macro Viruses
  19. Zero-Day Exploit
  20. Advanced Persistent Threat
  21. Masquerade Attack
  22. Phishing Payloads
  23. Privileged User Compromise
  24. Ransomware
  25. Typo Squatting
  26. Supply Chain Attack
  27. Credential Dumping
  28. Crypto Jacking Attack
  29. Account Takeover
  30. Amazon WS Attacks
  31. Malware
  32. Spear Phishing
  33. Open Redirection
  34. Bill Fraud
  35. IoT Threats
  36. Application Access Token
  37. Cross-Site Scripting
  38. Compromised Credentials
  39. Social Engineering Attack
  40. SQL Injection