BruteForceAttackTypoSquattingAmazonWSAttacksCloudCryptominingInsiderThreatApplicationAccessTokenWateringHoleAttackSpearPhishingCryptoJackingAttackMalwareCompromisedCredentialsWhalePhishingSQLInjectionNetworkSniffingMeltdown& SpectreAttackZero-DayExploitOpenRedirectionSpywareAccountTakeoverPrivilegedUserCompromiseSocialEngineeringAttackMan-in-the-MiddleAttackMaliciousPowershellIoTThreatsSupplyChainAttackRansomwareDoSAttackPasstheHashCredentialDumpingMacroVirusesCross-SiteScriptingDNSAmplificationShadowITPhishingPayloadsMasqueradeAttackDrive-byDownloadAttackWebSessionCookieTheftBillFraudSimjackingAdvancedPersistentThreatBruteForceAttackTypoSquattingAmazonWSAttacksCloudCryptominingInsiderThreatApplicationAccessTokenWateringHoleAttackSpearPhishingCryptoJackingAttackMalwareCompromisedCredentialsWhalePhishingSQLInjectionNetworkSniffingMeltdown& SpectreAttackZero-DayExploitOpenRedirectionSpywareAccountTakeoverPrivilegedUserCompromiseSocialEngineeringAttackMan-in-the-MiddleAttackMaliciousPowershellIoTThreatsSupplyChainAttackRansomwareDoSAttackPasstheHashCredentialDumpingMacroVirusesCross-SiteScriptingDNSAmplificationShadowITPhishingPayloadsMasqueradeAttackDrive-byDownloadAttackWebSessionCookieTheftBillFraudSimjackingAdvancedPersistentThreat

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Brute Force Attack
  2. Typo Squatting
  3. Amazon WS Attacks
  4. Cloud Cryptomining
  5. Insider Threat
  6. Application Access Token
  7. Watering Hole Attack
  8. Spear Phishing
  9. Crypto Jacking Attack
  10. Malware
  11. Compromised Credentials
  12. Whale Phishing
  13. SQL Injection
  14. Network Sniffing
  15. Meltdown & Spectre Attack
  16. Zero-Day Exploit
  17. Open Redirection
  18. Spyware
  19. Account Takeover
  20. Privileged User Compromise
  21. Social Engineering Attack
  22. Man-in-the-Middle Attack
  23. Malicious Powershell
  24. IoT Threats
  25. Supply Chain Attack
  26. Ransomware
  27. DoS Attack
  28. Pass the Hash
  29. Credential Dumping
  30. Macro Viruses
  31. Cross-Site Scripting
  32. DNS Amplification
  33. Shadow IT
  34. Phishing Payloads
  35. Masquerade Attack
  36. Drive-by Download Attack
  37. Web Session Cookie Theft
  38. Bill Fraud
  39. Simjacking
  40. Advanced Persistent Threat