Application Access Token Brute Force Attack Ransomware Masquerade Attack Compromised Credentials Supply Chain Attack Cloud Cryptomining Credential Dumping SQL Injection Social Engineering Attack Drive-by Download Attack IoT Threats Insider Threat Phishing Payloads Privileged User Compromise Web Session Cookie Theft Pass the Hash Account Takeover Open Redirection Meltdown & Spectre Attack Simjacking Watering Hole Attack Crypto Jacking Attack Malicious Powershell Network Sniffing Man-in- the- Middle Attack Spear Phishing Cross- Site Scripting Amazon WS Attacks Typo Squatting DoS Attack Malware Spyware Whale Phishing Zero- Day Exploit DNS Amplification Advanced Persistent Threat Shadow IT Macro Viruses Bill Fraud Application Access Token Brute Force Attack Ransomware Masquerade Attack Compromised Credentials Supply Chain Attack Cloud Cryptomining Credential Dumping SQL Injection Social Engineering Attack Drive-by Download Attack IoT Threats Insider Threat Phishing Payloads Privileged User Compromise Web Session Cookie Theft Pass the Hash Account Takeover Open Redirection Meltdown & Spectre Attack Simjacking Watering Hole Attack Crypto Jacking Attack Malicious Powershell Network Sniffing Man-in- the- Middle Attack Spear Phishing Cross- Site Scripting Amazon WS Attacks Typo Squatting DoS Attack Malware Spyware Whale Phishing Zero- Day Exploit DNS Amplification Advanced Persistent Threat Shadow IT Macro Viruses Bill Fraud
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Application Access Token
Brute Force Attack
Ransomware
Masquerade Attack
Compromised Credentials
Supply Chain Attack
Cloud Cryptomining
Credential Dumping
SQL Injection
Social Engineering Attack
Drive-by Download Attack
IoT Threats
Insider Threat
Phishing Payloads
Privileged User Compromise
Web Session Cookie Theft
Pass the Hash
Account Takeover
Open Redirection
Meltdown & Spectre Attack
Simjacking
Watering Hole Attack
Crypto Jacking Attack
Malicious Powershell
Network Sniffing
Man-in-the-Middle Attack
Spear Phishing
Cross-Site Scripting
Amazon WS Attacks
Typo Squatting
DoS Attack
Malware
Spyware
Whale Phishing
Zero-Day Exploit
DNS Amplification
Advanced Persistent Threat
Shadow IT
Macro Viruses
Bill Fraud