BruteForceAttackSocialEngineeringAttackDNSAmplificationBillFraudSpywareOpenRedirectionIoTThreatsPhishingPayloadsApplicationAccessTokenAccountTakeoverInsiderThreatWebSessionCookieTheftPasstheHashDrive-byDownloadAttackZero-DayExploitAmazonWSAttacksMaliciousPowershellPrivilegedUserCompromiseNetworkSniffingSimjackingMasqueradeAttackCredentialDumpingMan-in-the-MiddleAttackSQLInjectionSpearPhishingRansomwareCross-SiteScriptingSupplyChainAttackMeltdown& SpectreAttackMalwareDoSAttackCloudCryptominingShadowITCryptoJackingAttackWhalePhishingMacroVirusesAdvancedPersistentThreatTypoSquattingWateringHoleAttackCompromisedCredentialsBruteForceAttackSocialEngineeringAttackDNSAmplificationBillFraudSpywareOpenRedirectionIoTThreatsPhishingPayloadsApplicationAccessTokenAccountTakeoverInsiderThreatWebSessionCookieTheftPasstheHashDrive-byDownloadAttackZero-DayExploitAmazonWSAttacksMaliciousPowershellPrivilegedUserCompromiseNetworkSniffingSimjackingMasqueradeAttackCredentialDumpingMan-in-the-MiddleAttackSQLInjectionSpearPhishingRansomwareCross-SiteScriptingSupplyChainAttackMeltdown& SpectreAttackMalwareDoSAttackCloudCryptominingShadowITCryptoJackingAttackWhalePhishingMacroVirusesAdvancedPersistentThreatTypoSquattingWateringHoleAttackCompromisedCredentials

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Brute Force Attack
  2. Social Engineering Attack
  3. DNS Amplification
  4. Bill Fraud
  5. Spyware
  6. Open Redirection
  7. IoT Threats
  8. Phishing Payloads
  9. Application Access Token
  10. Account Takeover
  11. Insider Threat
  12. Web Session Cookie Theft
  13. Pass the Hash
  14. Drive-by Download Attack
  15. Zero-Day Exploit
  16. Amazon WS Attacks
  17. Malicious Powershell
  18. Privileged User Compromise
  19. Network Sniffing
  20. Simjacking
  21. Masquerade Attack
  22. Credential Dumping
  23. Man-in-the-Middle Attack
  24. SQL Injection
  25. Spear Phishing
  26. Ransomware
  27. Cross-Site Scripting
  28. Supply Chain Attack
  29. Meltdown & Spectre Attack
  30. Malware
  31. DoS Attack
  32. Cloud Cryptomining
  33. Shadow IT
  34. Crypto Jacking Attack
  35. Whale Phishing
  36. Macro Viruses
  37. Advanced Persistent Threat
  38. Typo Squatting
  39. Watering Hole Attack
  40. Compromised Credentials