InsiderThreatDNSAmplificationIoTThreatsWhalePhishingOpenRedirectionPasstheHashMalwareMan-in-the-MiddleAttackWateringHoleAttackMacroVirusesZero-DayExploitMasqueradeAttackPrivilegedUserCompromiseBruteForceAttackMeltdown& SpectreAttackCross-SiteScriptingPhishingPayloadsCryptoJackingAttackSupplyChainAttackDoSAttackSocialEngineeringAttackTypoSquattingSimjackingAdvancedPersistentThreatSQLInjectionAmazonWSAttacksAccountTakeoverCredentialDumpingNetworkSniffingRansomwareWebSessionCookieTheftSpywareCompromisedCredentialsSpearPhishingCloudCryptominingApplicationAccessTokenShadowITDrive-byDownloadAttackMaliciousPowershellBillFraudInsiderThreatDNSAmplificationIoTThreatsWhalePhishingOpenRedirectionPasstheHashMalwareMan-in-the-MiddleAttackWateringHoleAttackMacroVirusesZero-DayExploitMasqueradeAttackPrivilegedUserCompromiseBruteForceAttackMeltdown& SpectreAttackCross-SiteScriptingPhishingPayloadsCryptoJackingAttackSupplyChainAttackDoSAttackSocialEngineeringAttackTypoSquattingSimjackingAdvancedPersistentThreatSQLInjectionAmazonWSAttacksAccountTakeoverCredentialDumpingNetworkSniffingRansomwareWebSessionCookieTheftSpywareCompromisedCredentialsSpearPhishingCloudCryptominingApplicationAccessTokenShadowITDrive-byDownloadAttackMaliciousPowershellBillFraud

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Insider Threat
  2. DNS Amplification
  3. IoT Threats
  4. Whale Phishing
  5. Open Redirection
  6. Pass the Hash
  7. Malware
  8. Man-in-the-Middle Attack
  9. Watering Hole Attack
  10. Macro Viruses
  11. Zero-Day Exploit
  12. Masquerade Attack
  13. Privileged User Compromise
  14. Brute Force Attack
  15. Meltdown & Spectre Attack
  16. Cross-Site Scripting
  17. Phishing Payloads
  18. Crypto Jacking Attack
  19. Supply Chain Attack
  20. DoS Attack
  21. Social Engineering Attack
  22. Typo Squatting
  23. Simjacking
  24. Advanced Persistent Threat
  25. SQL Injection
  26. Amazon WS Attacks
  27. Account Takeover
  28. Credential Dumping
  29. Network Sniffing
  30. Ransomware
  31. Web Session Cookie Theft
  32. Spyware
  33. Compromised Credentials
  34. Spear Phishing
  35. Cloud Cryptomining
  36. Application Access Token
  37. Shadow IT
  38. Drive-by Download Attack
  39. Malicious Powershell
  40. Bill Fraud