CredentialDumpingDoSAttackDNSAmplificationSpywareAmazonWSAttacksMalwareNetworkSniffingMacroVirusesCryptoJackingAttackCross-SiteScriptingSupplyChainAttackTypoSquattingCompromisedCredentialsApplicationAccessTokenAdvancedPersistentThreatBruteForceAttackDrive-byDownloadAttackZero-DayExploitPhishingPayloadsAccountTakeoverCloudCryptominingWebSessionCookieTheftOpenRedirectionSimjackingSocialEngineeringAttackBillFraudIoTThreatsMaliciousPowershellMeltdown& SpectreAttackSpearPhishingMasqueradeAttackShadowITRansomwareSQLInjectionInsiderThreatWateringHoleAttackMan-in-the-MiddleAttackPasstheHashPrivilegedUserCompromiseWhalePhishingCredentialDumpingDoSAttackDNSAmplificationSpywareAmazonWSAttacksMalwareNetworkSniffingMacroVirusesCryptoJackingAttackCross-SiteScriptingSupplyChainAttackTypoSquattingCompromisedCredentialsApplicationAccessTokenAdvancedPersistentThreatBruteForceAttackDrive-byDownloadAttackZero-DayExploitPhishingPayloadsAccountTakeoverCloudCryptominingWebSessionCookieTheftOpenRedirectionSimjackingSocialEngineeringAttackBillFraudIoTThreatsMaliciousPowershellMeltdown& SpectreAttackSpearPhishingMasqueradeAttackShadowITRansomwareSQLInjectionInsiderThreatWateringHoleAttackMan-in-the-MiddleAttackPasstheHashPrivilegedUserCompromiseWhalePhishing

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Credential Dumping
  2. DoS Attack
  3. DNS Amplification
  4. Spyware
  5. Amazon WS Attacks
  6. Malware
  7. Network Sniffing
  8. Macro Viruses
  9. Crypto Jacking Attack
  10. Cross-Site Scripting
  11. Supply Chain Attack
  12. Typo Squatting
  13. Compromised Credentials
  14. Application Access Token
  15. Advanced Persistent Threat
  16. Brute Force Attack
  17. Drive-by Download Attack
  18. Zero-Day Exploit
  19. Phishing Payloads
  20. Account Takeover
  21. Cloud Cryptomining
  22. Web Session Cookie Theft
  23. Open Redirection
  24. Simjacking
  25. Social Engineering Attack
  26. Bill Fraud
  27. IoT Threats
  28. Malicious Powershell
  29. Meltdown & Spectre Attack
  30. Spear Phishing
  31. Masquerade Attack
  32. Shadow IT
  33. Ransomware
  34. SQL Injection
  35. Insider Threat
  36. Watering Hole Attack
  37. Man-in-the-Middle Attack
  38. Pass the Hash
  39. Privileged User Compromise
  40. Whale Phishing