CryptoJackingAttackMan-in-the-MiddleAttackMeltdown& SpectreAttackAdvancedPersistentThreatWhalePhishingSpywareSimjackingMalwareMacroVirusesWebSessionCookieTheftCredentialDumpingApplicationAccessTokenCross-SiteScriptingInsiderThreatPhishingPayloadsWateringHoleAttackPasstheHashDNSAmplificationDrive-byDownloadAttackBruteForceAttackSupplyChainAttackCloudCryptominingAmazonWSAttacksOpenRedirectionTypoSquattingSQLInjectionDoSAttackSocialEngineeringAttackSpearPhishingBillFraudPrivilegedUserCompromiseAccountTakeoverIoTThreatsCompromisedCredentialsShadowITZero-DayExploitMaliciousPowershellMasqueradeAttackNetworkSniffingRansomwareCryptoJackingAttackMan-in-the-MiddleAttackMeltdown& SpectreAttackAdvancedPersistentThreatWhalePhishingSpywareSimjackingMalwareMacroVirusesWebSessionCookieTheftCredentialDumpingApplicationAccessTokenCross-SiteScriptingInsiderThreatPhishingPayloadsWateringHoleAttackPasstheHashDNSAmplificationDrive-byDownloadAttackBruteForceAttackSupplyChainAttackCloudCryptominingAmazonWSAttacksOpenRedirectionTypoSquattingSQLInjectionDoSAttackSocialEngineeringAttackSpearPhishingBillFraudPrivilegedUserCompromiseAccountTakeoverIoTThreatsCompromisedCredentialsShadowITZero-DayExploitMaliciousPowershellMasqueradeAttackNetworkSniffingRansomware

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Crypto Jacking Attack
  2. Man-in-the-Middle Attack
  3. Meltdown & Spectre Attack
  4. Advanced Persistent Threat
  5. Whale Phishing
  6. Spyware
  7. Simjacking
  8. Malware
  9. Macro Viruses
  10. Web Session Cookie Theft
  11. Credential Dumping
  12. Application Access Token
  13. Cross-Site Scripting
  14. Insider Threat
  15. Phishing Payloads
  16. Watering Hole Attack
  17. Pass the Hash
  18. DNS Amplification
  19. Drive-by Download Attack
  20. Brute Force Attack
  21. Supply Chain Attack
  22. Cloud Cryptomining
  23. Amazon WS Attacks
  24. Open Redirection
  25. Typo Squatting
  26. SQL Injection
  27. DoS Attack
  28. Social Engineering Attack
  29. Spear Phishing
  30. Bill Fraud
  31. Privileged User Compromise
  32. Account Takeover
  33. IoT Threats
  34. Compromised Credentials
  35. Shadow IT
  36. Zero-Day Exploit
  37. Malicious Powershell
  38. Masquerade Attack
  39. Network Sniffing
  40. Ransomware