PasstheHashDoSAttackInsiderThreatWateringHoleAttackDNSAmplificationNetworkSniffingMalwareMan-in-the-MiddleAttackBruteForceAttackSpywareCryptoJackingAttackAdvancedPersistentThreatSpearPhishingAmazonWSAttacksAccountTakeoverSupplyChainAttackCross-SiteScriptingMaliciousPowershellMeltdown& SpectreAttackSQLInjectionIoTThreatsPrivilegedUserCompromiseShadowITApplicationAccessTokenRansomwareWhalePhishingCloudCryptominingCredentialDumpingSocialEngineeringAttackMasqueradeAttackDrive-byDownloadAttackZero-DayExploitSimjackingOpenRedirectionBillFraudTypoSquattingCompromisedCredentialsMacroVirusesPhishingPayloadsWebSessionCookieTheftPasstheHashDoSAttackInsiderThreatWateringHoleAttackDNSAmplificationNetworkSniffingMalwareMan-in-the-MiddleAttackBruteForceAttackSpywareCryptoJackingAttackAdvancedPersistentThreatSpearPhishingAmazonWSAttacksAccountTakeoverSupplyChainAttackCross-SiteScriptingMaliciousPowershellMeltdown& SpectreAttackSQLInjectionIoTThreatsPrivilegedUserCompromiseShadowITApplicationAccessTokenRansomwareWhalePhishingCloudCryptominingCredentialDumpingSocialEngineeringAttackMasqueradeAttackDrive-byDownloadAttackZero-DayExploitSimjackingOpenRedirectionBillFraudTypoSquattingCompromisedCredentialsMacroVirusesPhishingPayloadsWebSessionCookieTheft

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Pass the Hash
  2. DoS Attack
  3. Insider Threat
  4. Watering Hole Attack
  5. DNS Amplification
  6. Network Sniffing
  7. Malware
  8. Man-in-the-Middle Attack
  9. Brute Force Attack
  10. Spyware
  11. Crypto Jacking Attack
  12. Advanced Persistent Threat
  13. Spear Phishing
  14. Amazon WS Attacks
  15. Account Takeover
  16. Supply Chain Attack
  17. Cross-Site Scripting
  18. Malicious Powershell
  19. Meltdown & Spectre Attack
  20. SQL Injection
  21. IoT Threats
  22. Privileged User Compromise
  23. Shadow IT
  24. Application Access Token
  25. Ransomware
  26. Whale Phishing
  27. Cloud Cryptomining
  28. Credential Dumping
  29. Social Engineering Attack
  30. Masquerade Attack
  31. Drive-by Download Attack
  32. Zero-Day Exploit
  33. Simjacking
  34. Open Redirection
  35. Bill Fraud
  36. Typo Squatting
  37. Compromised Credentials
  38. Macro Viruses
  39. Phishing Payloads
  40. Web Session Cookie Theft