Insider Threat DNS Amplification IoT Threats Whale Phishing Open Redirection Pass the Hash Malware Man-in- the- Middle Attack Watering Hole Attack Macro Viruses Zero- Day Exploit Masquerade Attack Privileged User Compromise Brute Force Attack Meltdown & Spectre Attack Cross- Site Scripting Phishing Payloads Crypto Jacking Attack Supply Chain Attack DoS Attack Social Engineering Attack Typo Squatting Simjacking Advanced Persistent Threat SQL Injection Amazon WS Attacks Account Takeover Credential Dumping Network Sniffing Ransomware Web Session Cookie Theft Spyware Compromised Credentials Spear Phishing Cloud Cryptomining Application Access Token Shadow IT Drive-by Download Attack Malicious Powershell Bill Fraud Insider Threat DNS Amplification IoT Threats Whale Phishing Open Redirection Pass the Hash Malware Man-in- the- Middle Attack Watering Hole Attack Macro Viruses Zero- Day Exploit Masquerade Attack Privileged User Compromise Brute Force Attack Meltdown & Spectre Attack Cross- Site Scripting Phishing Payloads Crypto Jacking Attack Supply Chain Attack DoS Attack Social Engineering Attack Typo Squatting Simjacking Advanced Persistent Threat SQL Injection Amazon WS Attacks Account Takeover Credential Dumping Network Sniffing Ransomware Web Session Cookie Theft Spyware Compromised Credentials Spear Phishing Cloud Cryptomining Application Access Token Shadow IT Drive-by Download Attack Malicious Powershell Bill Fraud
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Insider Threat
DNS Amplification
IoT Threats
Whale Phishing
Open Redirection
Pass the Hash
Malware
Man-in-the-Middle Attack
Watering Hole Attack
Macro Viruses
Zero-Day Exploit
Masquerade Attack
Privileged User Compromise
Brute Force Attack
Meltdown & Spectre Attack
Cross-Site Scripting
Phishing Payloads
Crypto Jacking Attack
Supply Chain Attack
DoS Attack
Social Engineering Attack
Typo Squatting
Simjacking
Advanced Persistent Threat
SQL Injection
Amazon WS Attacks
Account Takeover
Credential Dumping
Network Sniffing
Ransomware
Web Session Cookie Theft
Spyware
Compromised Credentials
Spear Phishing
Cloud Cryptomining
Application Access Token
Shadow IT
Drive-by Download Attack
Malicious Powershell
Bill Fraud