Crypto Jacking Attack Man-in- the- Middle Attack Meltdown & Spectre Attack Advanced Persistent Threat Whale Phishing Spyware Simjacking Malware Macro Viruses Web Session Cookie Theft Credential Dumping Application Access Token Cross- Site Scripting Insider Threat Phishing Payloads Watering Hole Attack Pass the Hash DNS Amplification Drive-by Download Attack Brute Force Attack Supply Chain Attack Cloud Cryptomining Amazon WS Attacks Open Redirection Typo Squatting SQL Injection DoS Attack Social Engineering Attack Spear Phishing Bill Fraud Privileged User Compromise Account Takeover IoT Threats Compromised Credentials Shadow IT Zero- Day Exploit Malicious Powershell Masquerade Attack Network Sniffing Ransomware Crypto Jacking Attack Man-in- the- Middle Attack Meltdown & Spectre Attack Advanced Persistent Threat Whale Phishing Spyware Simjacking Malware Macro Viruses Web Session Cookie Theft Credential Dumping Application Access Token Cross- Site Scripting Insider Threat Phishing Payloads Watering Hole Attack Pass the Hash DNS Amplification Drive-by Download Attack Brute Force Attack Supply Chain Attack Cloud Cryptomining Amazon WS Attacks Open Redirection Typo Squatting SQL Injection DoS Attack Social Engineering Attack Spear Phishing Bill Fraud Privileged User Compromise Account Takeover IoT Threats Compromised Credentials Shadow IT Zero- Day Exploit Malicious Powershell Masquerade Attack Network Sniffing Ransomware
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Crypto Jacking Attack
Man-in-the-Middle Attack
Meltdown & Spectre Attack
Advanced Persistent Threat
Whale Phishing
Spyware
Simjacking
Malware
Macro Viruses
Web Session Cookie Theft
Credential Dumping
Application Access Token
Cross-Site Scripting
Insider Threat
Phishing Payloads
Watering Hole Attack
Pass the Hash
DNS Amplification
Drive-by Download Attack
Brute Force Attack
Supply Chain Attack
Cloud Cryptomining
Amazon WS Attacks
Open Redirection
Typo Squatting
SQL Injection
DoS Attack
Social Engineering Attack
Spear Phishing
Bill Fraud
Privileged User Compromise
Account Takeover
IoT Threats
Compromised Credentials
Shadow IT
Zero-Day Exploit
Malicious Powershell
Masquerade Attack
Network Sniffing
Ransomware