Privileged User Compromise Open Redirection Cross- Site Scripting Amazon WS Attacks Drive-by Download Attack Malicious Powershell IoT Threats DoS Attack Application Access Token Spear Phishing Typo Squatting Meltdown & Spectre Attack Insider Threat Supply Chain Attack Account Takeover Bill Fraud Masquerade Attack Network Sniffing Spyware Crypto Jacking Attack Social Engineering Attack Advanced Persistent Threat Whale Phishing Web Session Cookie Theft DNS Amplification Pass the Hash Credential Dumping Macro Viruses Brute Force Attack Watering Hole Attack Cloud Cryptomining SQL Injection Shadow IT Man-in- the- Middle Attack Ransomware Simjacking Compromised Credentials Phishing Payloads Zero- Day Exploit Malware Privileged User Compromise Open Redirection Cross- Site Scripting Amazon WS Attacks Drive-by Download Attack Malicious Powershell IoT Threats DoS Attack Application Access Token Spear Phishing Typo Squatting Meltdown & Spectre Attack Insider Threat Supply Chain Attack Account Takeover Bill Fraud Masquerade Attack Network Sniffing Spyware Crypto Jacking Attack Social Engineering Attack Advanced Persistent Threat Whale Phishing Web Session Cookie Theft DNS Amplification Pass the Hash Credential Dumping Macro Viruses Brute Force Attack Watering Hole Attack Cloud Cryptomining SQL Injection Shadow IT Man-in- the- Middle Attack Ransomware Simjacking Compromised Credentials Phishing Payloads Zero- Day Exploit Malware
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Privileged User Compromise
Open Redirection
Cross-Site Scripting
Amazon WS Attacks
Drive-by Download Attack
Malicious Powershell
IoT Threats
DoS Attack
Application Access Token
Spear Phishing
Typo Squatting
Meltdown & Spectre Attack
Insider Threat
Supply Chain Attack
Account Takeover
Bill Fraud
Masquerade Attack
Network Sniffing
Spyware
Crypto Jacking Attack
Social Engineering Attack
Advanced Persistent Threat
Whale Phishing
Web Session Cookie Theft
DNS Amplification
Pass the Hash
Credential Dumping
Macro Viruses
Brute Force Attack
Watering Hole Attack
Cloud Cryptomining
SQL Injection
Shadow IT
Man-in-the-Middle Attack
Ransomware
Simjacking
Compromised Credentials
Phishing Payloads
Zero-Day Exploit
Malware