Web Session Cookie Theft Shadow IT Amazon WS Attacks Brute Force Attack Phishing Payloads Typo Squatting Spyware Advanced Persistent Threat Simjacking Malware Watering Hole Attack Ransomware Cross- Site Scripting Meltdown & Spectre Attack Zero- Day Exploit Compromised Credentials Network Sniffing DoS Attack Macro Viruses Credential Dumping SQL Injection DNS Amplification Social Engineering Attack Whale Phishing Open Redirection Insider Threat Supply Chain Attack Masquerade Attack Crypto Jacking Attack IoT Threats Application Access Token Spear Phishing Drive-by Download Attack Malicious Powershell Man-in- the- Middle Attack Bill Fraud Cloud Cryptomining Pass the Hash Account Takeover Privileged User Compromise Web Session Cookie Theft Shadow IT Amazon WS Attacks Brute Force Attack Phishing Payloads Typo Squatting Spyware Advanced Persistent Threat Simjacking Malware Watering Hole Attack Ransomware Cross- Site Scripting Meltdown & Spectre Attack Zero- Day Exploit Compromised Credentials Network Sniffing DoS Attack Macro Viruses Credential Dumping SQL Injection DNS Amplification Social Engineering Attack Whale Phishing Open Redirection Insider Threat Supply Chain Attack Masquerade Attack Crypto Jacking Attack IoT Threats Application Access Token Spear Phishing Drive-by Download Attack Malicious Powershell Man-in- the- Middle Attack Bill Fraud Cloud Cryptomining Pass the Hash Account Takeover Privileged User Compromise
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Web Session Cookie Theft
Shadow IT
Amazon WS Attacks
Brute Force Attack
Phishing Payloads
Typo Squatting
Spyware
Advanced Persistent Threat
Simjacking
Malware
Watering Hole Attack
Ransomware
Cross-Site Scripting
Meltdown & Spectre Attack
Zero-Day Exploit
Compromised Credentials
Network Sniffing
DoS Attack
Macro Viruses
Credential Dumping
SQL Injection
DNS Amplification
Social Engineering Attack
Whale Phishing
Open Redirection
Insider Threat
Supply Chain Attack
Masquerade Attack
Crypto Jacking Attack
IoT Threats
Application Access Token
Spear Phishing
Drive-by Download Attack
Malicious Powershell
Man-in-the-Middle Attack
Bill Fraud
Cloud Cryptomining
Pass the Hash
Account Takeover
Privileged User Compromise