Brute Force Attack Social Engineering Attack DNS Amplification Bill Fraud Spyware Open Redirection IoT Threats Phishing Payloads Application Access Token Account Takeover Insider Threat Web Session Cookie Theft Pass the Hash Drive-by Download Attack Zero- Day Exploit Amazon WS Attacks Malicious Powershell Privileged User Compromise Network Sniffing Simjacking Masquerade Attack Credential Dumping Man-in- the- Middle Attack SQL Injection Spear Phishing Ransomware Cross- Site Scripting Supply Chain Attack Meltdown & Spectre Attack Malware DoS Attack Cloud Cryptomining Shadow IT Crypto Jacking Attack Whale Phishing Macro Viruses Advanced Persistent Threat Typo Squatting Watering Hole Attack Compromised Credentials Brute Force Attack Social Engineering Attack DNS Amplification Bill Fraud Spyware Open Redirection IoT Threats Phishing Payloads Application Access Token Account Takeover Insider Threat Web Session Cookie Theft Pass the Hash Drive-by Download Attack Zero- Day Exploit Amazon WS Attacks Malicious Powershell Privileged User Compromise Network Sniffing Simjacking Masquerade Attack Credential Dumping Man-in- the- Middle Attack SQL Injection Spear Phishing Ransomware Cross- Site Scripting Supply Chain Attack Meltdown & Spectre Attack Malware DoS Attack Cloud Cryptomining Shadow IT Crypto Jacking Attack Whale Phishing Macro Viruses Advanced Persistent Threat Typo Squatting Watering Hole Attack Compromised Credentials
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Brute Force Attack
Social Engineering Attack
DNS Amplification
Bill Fraud
Spyware
Open Redirection
IoT Threats
Phishing Payloads
Application Access Token
Account Takeover
Insider Threat
Web Session Cookie Theft
Pass the Hash
Drive-by Download Attack
Zero-Day Exploit
Amazon WS Attacks
Malicious Powershell
Privileged User Compromise
Network Sniffing
Simjacking
Masquerade Attack
Credential Dumping
Man-in-the-Middle Attack
SQL Injection
Spear Phishing
Ransomware
Cross-Site Scripting
Supply Chain Attack
Meltdown & Spectre Attack
Malware
DoS Attack
Cloud Cryptomining
Shadow IT
Crypto Jacking Attack
Whale Phishing
Macro Viruses
Advanced Persistent Threat
Typo Squatting
Watering Hole Attack
Compromised Credentials