IoT Threats Compromised Credentials Malicious Powershell Macro Viruses Advanced Persistent Threat DoS Attack Insider Threat Supply Chain Attack Cross- Site Scripting Whale Phishing Brute Force Attack Network Sniffing Privileged User Compromise Ransomware Typo Squatting Application Access Token DNS Amplification Spyware Bill Fraud Spear Phishing Amazon WS Attacks Account Takeover Simjacking Man-in- the- Middle Attack Cloud Cryptomining Open Redirection Social Engineering Attack Credential Dumping Meltdown & Spectre Attack Phishing Payloads Pass the Hash Malware Shadow IT SQL Injection Drive-by Download Attack Crypto Jacking Attack Masquerade Attack Watering Hole Attack Zero- Day Exploit Web Session Cookie Theft IoT Threats Compromised Credentials Malicious Powershell Macro Viruses Advanced Persistent Threat DoS Attack Insider Threat Supply Chain Attack Cross- Site Scripting Whale Phishing Brute Force Attack Network Sniffing Privileged User Compromise Ransomware Typo Squatting Application Access Token DNS Amplification Spyware Bill Fraud Spear Phishing Amazon WS Attacks Account Takeover Simjacking Man-in- the- Middle Attack Cloud Cryptomining Open Redirection Social Engineering Attack Credential Dumping Meltdown & Spectre Attack Phishing Payloads Pass the Hash Malware Shadow IT SQL Injection Drive-by Download Attack Crypto Jacking Attack Masquerade Attack Watering Hole Attack Zero- Day Exploit Web Session Cookie Theft
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
IoT Threats
Compromised Credentials
Malicious Powershell
Macro Viruses
Advanced Persistent Threat
DoS Attack
Insider Threat
Supply Chain Attack
Cross-Site Scripting
Whale Phishing
Brute Force Attack
Network Sniffing
Privileged User Compromise
Ransomware
Typo Squatting
Application Access Token
DNS Amplification
Spyware
Bill Fraud
Spear Phishing
Amazon WS Attacks
Account Takeover
Simjacking
Man-in-the-Middle Attack
Cloud Cryptomining
Open Redirection
Social Engineering Attack
Credential Dumping
Meltdown & Spectre Attack
Phishing Payloads
Pass the Hash
Malware
Shadow IT
SQL Injection
Drive-by Download Attack
Crypto Jacking Attack
Masquerade Attack
Watering Hole Attack
Zero-Day Exploit
Web Session Cookie Theft