PrivilegedUserCompromiseOpenRedirectionCross-SiteScriptingAmazonWSAttacksDrive-byDownloadAttackMaliciousPowershellIoTThreatsDoSAttackApplicationAccessTokenSpearPhishingTypoSquattingMeltdown& SpectreAttackInsiderThreatSupplyChainAttackAccountTakeoverBillFraudMasqueradeAttackNetworkSniffingSpywareCryptoJackingAttackSocialEngineeringAttackAdvancedPersistentThreatWhalePhishingWebSessionCookieTheftDNSAmplificationPasstheHashCredentialDumpingMacroVirusesBruteForceAttackWateringHoleAttackCloudCryptominingSQLInjectionShadowITMan-in-the-MiddleAttackRansomwareSimjackingCompromisedCredentialsPhishingPayloadsZero-DayExploitMalwarePrivilegedUserCompromiseOpenRedirectionCross-SiteScriptingAmazonWSAttacksDrive-byDownloadAttackMaliciousPowershellIoTThreatsDoSAttackApplicationAccessTokenSpearPhishingTypoSquattingMeltdown& SpectreAttackInsiderThreatSupplyChainAttackAccountTakeoverBillFraudMasqueradeAttackNetworkSniffingSpywareCryptoJackingAttackSocialEngineeringAttackAdvancedPersistentThreatWhalePhishingWebSessionCookieTheftDNSAmplificationPasstheHashCredentialDumpingMacroVirusesBruteForceAttackWateringHoleAttackCloudCryptominingSQLInjectionShadowITMan-in-the-MiddleAttackRansomwareSimjackingCompromisedCredentialsPhishingPayloadsZero-DayExploitMalware

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Privileged User Compromise
  2. Open Redirection
  3. Cross-Site Scripting
  4. Amazon WS Attacks
  5. Drive-by Download Attack
  6. Malicious Powershell
  7. IoT Threats
  8. DoS Attack
  9. Application Access Token
  10. Spear Phishing
  11. Typo Squatting
  12. Meltdown & Spectre Attack
  13. Insider Threat
  14. Supply Chain Attack
  15. Account Takeover
  16. Bill Fraud
  17. Masquerade Attack
  18. Network Sniffing
  19. Spyware
  20. Crypto Jacking Attack
  21. Social Engineering Attack
  22. Advanced Persistent Threat
  23. Whale Phishing
  24. Web Session Cookie Theft
  25. DNS Amplification
  26. Pass the Hash
  27. Credential Dumping
  28. Macro Viruses
  29. Brute Force Attack
  30. Watering Hole Attack
  31. Cloud Cryptomining
  32. SQL Injection
  33. Shadow IT
  34. Man-in-the-Middle Attack
  35. Ransomware
  36. Simjacking
  37. Compromised Credentials
  38. Phishing Payloads
  39. Zero-Day Exploit
  40. Malware