WebSessionCookieTheftShadowITAmazonWSAttacksBruteForceAttackPhishingPayloadsTypoSquattingSpywareAdvancedPersistentThreatSimjackingMalwareWateringHoleAttackRansomwareCross-SiteScriptingMeltdown& SpectreAttackZero-DayExploitCompromisedCredentialsNetworkSniffingDoSAttackMacroVirusesCredentialDumpingSQLInjectionDNSAmplificationSocialEngineeringAttackWhalePhishingOpenRedirectionInsiderThreatSupplyChainAttackMasqueradeAttackCryptoJackingAttackIoTThreatsApplicationAccessTokenSpearPhishingDrive-byDownloadAttackMaliciousPowershellMan-in-the-MiddleAttackBillFraudCloudCryptominingPasstheHashAccountTakeoverPrivilegedUserCompromiseWebSessionCookieTheftShadowITAmazonWSAttacksBruteForceAttackPhishingPayloadsTypoSquattingSpywareAdvancedPersistentThreatSimjackingMalwareWateringHoleAttackRansomwareCross-SiteScriptingMeltdown& SpectreAttackZero-DayExploitCompromisedCredentialsNetworkSniffingDoSAttackMacroVirusesCredentialDumpingSQLInjectionDNSAmplificationSocialEngineeringAttackWhalePhishingOpenRedirectionInsiderThreatSupplyChainAttackMasqueradeAttackCryptoJackingAttackIoTThreatsApplicationAccessTokenSpearPhishingDrive-byDownloadAttackMaliciousPowershellMan-in-the-MiddleAttackBillFraudCloudCryptominingPasstheHashAccountTakeoverPrivilegedUserCompromise

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Web Session Cookie Theft
  2. Shadow IT
  3. Amazon WS Attacks
  4. Brute Force Attack
  5. Phishing Payloads
  6. Typo Squatting
  7. Spyware
  8. Advanced Persistent Threat
  9. Simjacking
  10. Malware
  11. Watering Hole Attack
  12. Ransomware
  13. Cross-Site Scripting
  14. Meltdown & Spectre Attack
  15. Zero-Day Exploit
  16. Compromised Credentials
  17. Network Sniffing
  18. DoS Attack
  19. Macro Viruses
  20. Credential Dumping
  21. SQL Injection
  22. DNS Amplification
  23. Social Engineering Attack
  24. Whale Phishing
  25. Open Redirection
  26. Insider Threat
  27. Supply Chain Attack
  28. Masquerade Attack
  29. Crypto Jacking Attack
  30. IoT Threats
  31. Application Access Token
  32. Spear Phishing
  33. Drive-by Download Attack
  34. Malicious Powershell
  35. Man-in-the-Middle Attack
  36. Bill Fraud
  37. Cloud Cryptomining
  38. Pass the Hash
  39. Account Takeover
  40. Privileged User Compromise