Credential Dumping DoS Attack DNS Amplification Spyware Amazon WS Attacks Malware Network Sniffing Macro Viruses Crypto Jacking Attack Cross- Site Scripting Supply Chain Attack Typo Squatting Compromised Credentials Application Access Token Advanced Persistent Threat Brute Force Attack Drive-by Download Attack Zero- Day Exploit Phishing Payloads Account Takeover Cloud Cryptomining Web Session Cookie Theft Open Redirection Simjacking Social Engineering Attack Bill Fraud IoT Threats Malicious Powershell Meltdown & Spectre Attack Spear Phishing Masquerade Attack Shadow IT Ransomware SQL Injection Insider Threat Watering Hole Attack Man-in- the- Middle Attack Pass the Hash Privileged User Compromise Whale Phishing Credential Dumping DoS Attack DNS Amplification Spyware Amazon WS Attacks Malware Network Sniffing Macro Viruses Crypto Jacking Attack Cross- Site Scripting Supply Chain Attack Typo Squatting Compromised Credentials Application Access Token Advanced Persistent Threat Brute Force Attack Drive-by Download Attack Zero- Day Exploit Phishing Payloads Account Takeover Cloud Cryptomining Web Session Cookie Theft Open Redirection Simjacking Social Engineering Attack Bill Fraud IoT Threats Malicious Powershell Meltdown & Spectre Attack Spear Phishing Masquerade Attack Shadow IT Ransomware SQL Injection Insider Threat Watering Hole Attack Man-in- the- Middle Attack Pass the Hash Privileged User Compromise Whale Phishing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Credential Dumping
DoS Attack
DNS Amplification
Spyware
Amazon WS Attacks
Malware
Network Sniffing
Macro Viruses
Crypto Jacking Attack
Cross-Site Scripting
Supply Chain Attack
Typo Squatting
Compromised Credentials
Application Access Token
Advanced Persistent Threat
Brute Force Attack
Drive-by Download Attack
Zero-Day Exploit
Phishing Payloads
Account Takeover
Cloud Cryptomining
Web Session Cookie Theft
Open Redirection
Simjacking
Social Engineering Attack
Bill Fraud
IoT Threats
Malicious Powershell
Meltdown & Spectre Attack
Spear Phishing
Masquerade Attack
Shadow IT
Ransomware
SQL Injection
Insider Threat
Watering Hole Attack
Man-in-the-Middle Attack
Pass the Hash
Privileged User Compromise
Whale Phishing