Pass the Hash DoS Attack Insider Threat Watering Hole Attack DNS Amplification Network Sniffing Malware Man-in- the- Middle Attack Brute Force Attack Spyware Crypto Jacking Attack Advanced Persistent Threat Spear Phishing Amazon WS Attacks Account Takeover Supply Chain Attack Cross- Site Scripting Malicious Powershell Meltdown & Spectre Attack SQL Injection IoT Threats Privileged User Compromise Shadow IT Application Access Token Ransomware Whale Phishing Cloud Cryptomining Credential Dumping Social Engineering Attack Masquerade Attack Drive-by Download Attack Zero- Day Exploit Simjacking Open Redirection Bill Fraud Typo Squatting Compromised Credentials Macro Viruses Phishing Payloads Web Session Cookie Theft Pass the Hash DoS Attack Insider Threat Watering Hole Attack DNS Amplification Network Sniffing Malware Man-in- the- Middle Attack Brute Force Attack Spyware Crypto Jacking Attack Advanced Persistent Threat Spear Phishing Amazon WS Attacks Account Takeover Supply Chain Attack Cross- Site Scripting Malicious Powershell Meltdown & Spectre Attack SQL Injection IoT Threats Privileged User Compromise Shadow IT Application Access Token Ransomware Whale Phishing Cloud Cryptomining Credential Dumping Social Engineering Attack Masquerade Attack Drive-by Download Attack Zero- Day Exploit Simjacking Open Redirection Bill Fraud Typo Squatting Compromised Credentials Macro Viruses Phishing Payloads Web Session Cookie Theft
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Pass the Hash
DoS Attack
Insider Threat
Watering Hole Attack
DNS Amplification
Network Sniffing
Malware
Man-in-the-Middle Attack
Brute Force Attack
Spyware
Crypto Jacking Attack
Advanced Persistent Threat
Spear Phishing
Amazon WS Attacks
Account Takeover
Supply Chain Attack
Cross-Site Scripting
Malicious Powershell
Meltdown & Spectre Attack
SQL Injection
IoT Threats
Privileged User Compromise
Shadow IT
Application Access Token
Ransomware
Whale Phishing
Cloud Cryptomining
Credential Dumping
Social Engineering Attack
Masquerade Attack
Drive-by Download Attack
Zero-Day Exploit
Simjacking
Open Redirection
Bill Fraud
Typo Squatting
Compromised Credentials
Macro Viruses
Phishing Payloads
Web Session Cookie Theft