OpenRedirectionSpywareDNSAmplificationCloudCryptominingSocialEngineeringAttackAmazonWSAttacksRansomwareBruteForceAttackAccountTakeoverShadowITInsiderThreatDrive-byDownloadAttackMasqueradeAttackTypoSquattingMacroVirusesMeltdown& SpectreAttackWebSessionCookieTheftWhalePhishingSQLInjectionBillFraudWateringHoleAttackSpearPhishingDoSAttackNetworkSniffingPrivilegedUserCompromiseCredentialDumpingIoTThreatsSimjackingCryptoJackingAttackZero-DayExploitPhishingPayloadsCross-SiteScriptingSupplyChainAttackMalwareMan-in-the-MiddleAttackApplicationAccessTokenAdvancedPersistentThreatPasstheHashMaliciousPowershellCompromisedCredentialsOpenRedirectionSpywareDNSAmplificationCloudCryptominingSocialEngineeringAttackAmazonWSAttacksRansomwareBruteForceAttackAccountTakeoverShadowITInsiderThreatDrive-byDownloadAttackMasqueradeAttackTypoSquattingMacroVirusesMeltdown& SpectreAttackWebSessionCookieTheftWhalePhishingSQLInjectionBillFraudWateringHoleAttackSpearPhishingDoSAttackNetworkSniffingPrivilegedUserCompromiseCredentialDumpingIoTThreatsSimjackingCryptoJackingAttackZero-DayExploitPhishingPayloadsCross-SiteScriptingSupplyChainAttackMalwareMan-in-the-MiddleAttackApplicationAccessTokenAdvancedPersistentThreatPasstheHashMaliciousPowershellCompromisedCredentials

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Open Redirection
  2. Spyware
  3. DNS Amplification
  4. Cloud Cryptomining
  5. Social Engineering Attack
  6. Amazon WS Attacks
  7. Ransomware
  8. Brute Force Attack
  9. Account Takeover
  10. Shadow IT
  11. Insider Threat
  12. Drive-by Download Attack
  13. Masquerade Attack
  14. Typo Squatting
  15. Macro Viruses
  16. Meltdown & Spectre Attack
  17. Web Session Cookie Theft
  18. Whale Phishing
  19. SQL Injection
  20. Bill Fraud
  21. Watering Hole Attack
  22. Spear Phishing
  23. DoS Attack
  24. Network Sniffing
  25. Privileged User Compromise
  26. Credential Dumping
  27. IoT Threats
  28. Simjacking
  29. Crypto Jacking Attack
  30. Zero-Day Exploit
  31. Phishing Payloads
  32. Cross-Site Scripting
  33. Supply Chain Attack
  34. Malware
  35. Man-in-the-Middle Attack
  36. Application Access Token
  37. Advanced Persistent Threat
  38. Pass the Hash
  39. Malicious Powershell
  40. Compromised Credentials