Simjacking Meltdown & Spectre Attack DNS Amplification Network Sniffing Pass the Hash Shadow IT Web Session Cookie Theft Whale Phishing Brute Force Attack Malicious Powershell Drive-by Download Attack DoS Attack Cloud Cryptomining Man-in- the- Middle Attack Watering Hole Attack Spyware Insider Threat Macro Viruses Zero- Day Exploit Advanced Persistent Threat Masquerade Attack Phishing Payloads Privileged User Compromise Ransomware Typo Squatting Supply Chain Attack Credential Dumping Crypto Jacking Attack Account Takeover Amazon WS Attacks Malware Spear Phishing Open Redirection Bill Fraud IoT Threats Application Access Token Cross- Site Scripting Compromised Credentials Social Engineering Attack SQL Injection Simjacking Meltdown & Spectre Attack DNS Amplification Network Sniffing Pass the Hash Shadow IT Web Session Cookie Theft Whale Phishing Brute Force Attack Malicious Powershell Drive-by Download Attack DoS Attack Cloud Cryptomining Man-in- the- Middle Attack Watering Hole Attack Spyware Insider Threat Macro Viruses Zero- Day Exploit Advanced Persistent Threat Masquerade Attack Phishing Payloads Privileged User Compromise Ransomware Typo Squatting Supply Chain Attack Credential Dumping Crypto Jacking Attack Account Takeover Amazon WS Attacks Malware Spear Phishing Open Redirection Bill Fraud IoT Threats Application Access Token Cross- Site Scripting Compromised Credentials Social Engineering Attack SQL Injection
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Simjacking
Meltdown & Spectre Attack
DNS Amplification
Network Sniffing
Pass the Hash
Shadow IT
Web Session Cookie Theft
Whale Phishing
Brute Force Attack
Malicious Powershell
Drive-by Download Attack
DoS Attack
Cloud Cryptomining
Man-in-the-Middle Attack
Watering Hole Attack
Spyware
Insider Threat
Macro Viruses
Zero-Day Exploit
Advanced Persistent Threat
Masquerade Attack
Phishing Payloads
Privileged User Compromise
Ransomware
Typo Squatting
Supply Chain Attack
Credential Dumping
Crypto Jacking Attack
Account Takeover
Amazon WS Attacks
Malware
Spear Phishing
Open Redirection
Bill Fraud
IoT Threats
Application Access Token
Cross-Site Scripting
Compromised Credentials
Social Engineering Attack
SQL Injection