IoTThreatsCompromisedCredentialsMaliciousPowershellMacroVirusesAdvancedPersistentThreatDoSAttackInsiderThreatSupplyChainAttackCross-SiteScriptingWhalePhishingBruteForceAttackNetworkSniffingPrivilegedUserCompromiseRansomwareTypoSquattingApplicationAccessTokenDNSAmplificationSpywareBillFraudSpearPhishingAmazonWSAttacksAccountTakeoverSimjackingMan-in-the-MiddleAttackCloudCryptominingOpenRedirectionSocialEngineeringAttackCredentialDumpingMeltdown& SpectreAttackPhishingPayloadsPasstheHashMalwareShadowITSQLInjectionDrive-byDownloadAttackCryptoJackingAttackMasqueradeAttackWateringHoleAttackZero-DayExploitWebSessionCookieTheftIoTThreatsCompromisedCredentialsMaliciousPowershellMacroVirusesAdvancedPersistentThreatDoSAttackInsiderThreatSupplyChainAttackCross-SiteScriptingWhalePhishingBruteForceAttackNetworkSniffingPrivilegedUserCompromiseRansomwareTypoSquattingApplicationAccessTokenDNSAmplificationSpywareBillFraudSpearPhishingAmazonWSAttacksAccountTakeoverSimjackingMan-in-the-MiddleAttackCloudCryptominingOpenRedirectionSocialEngineeringAttackCredentialDumpingMeltdown& SpectreAttackPhishingPayloadsPasstheHashMalwareShadowITSQLInjectionDrive-byDownloadAttackCryptoJackingAttackMasqueradeAttackWateringHoleAttackZero-DayExploitWebSessionCookieTheft

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. IoT Threats
  2. Compromised Credentials
  3. Malicious Powershell
  4. Macro Viruses
  5. Advanced Persistent Threat
  6. DoS Attack
  7. Insider Threat
  8. Supply Chain Attack
  9. Cross-Site Scripting
  10. Whale Phishing
  11. Brute Force Attack
  12. Network Sniffing
  13. Privileged User Compromise
  14. Ransomware
  15. Typo Squatting
  16. Application Access Token
  17. DNS Amplification
  18. Spyware
  19. Bill Fraud
  20. Spear Phishing
  21. Amazon WS Attacks
  22. Account Takeover
  23. Simjacking
  24. Man-in-the-Middle Attack
  25. Cloud Cryptomining
  26. Open Redirection
  27. Social Engineering Attack
  28. Credential Dumping
  29. Meltdown & Spectre Attack
  30. Phishing Payloads
  31. Pass the Hash
  32. Malware
  33. Shadow IT
  34. SQL Injection
  35. Drive-by Download Attack
  36. Crypto Jacking Attack
  37. Masquerade Attack
  38. Watering Hole Attack
  39. Zero-Day Exploit
  40. Web Session Cookie Theft