Simjacking Supply Chain Attack Pass the Hash Spear Phishing Web Session Cookie Theft Account Takeover DNS Amplification Application Access Token Malware Whale Phishing Shadow IT Insider Threat Watering Hole Attack Brute Force Attack IoT Threats Phishing Payloads Meltdown & Spectre Attack SQL Injection Open Redirection Network Sniffing Advanced Persistent Threat DoS Attack Spyware Compromised Credentials Ransomware Zero- Day Exploit Credential Dumping Cross- Site Scripting Malicious Powershell Drive-by Download Attack Cloud Cryptomining Privileged User Compromise Crypto Jacking Attack Masquerade Attack Macro Viruses Social Engineering Attack Bill Fraud Man-in- the- Middle Attack Typo Squatting Amazon WS Attacks Simjacking Supply Chain Attack Pass the Hash Spear Phishing Web Session Cookie Theft Account Takeover DNS Amplification Application Access Token Malware Whale Phishing Shadow IT Insider Threat Watering Hole Attack Brute Force Attack IoT Threats Phishing Payloads Meltdown & Spectre Attack SQL Injection Open Redirection Network Sniffing Advanced Persistent Threat DoS Attack Spyware Compromised Credentials Ransomware Zero- Day Exploit Credential Dumping Cross- Site Scripting Malicious Powershell Drive-by Download Attack Cloud Cryptomining Privileged User Compromise Crypto Jacking Attack Masquerade Attack Macro Viruses Social Engineering Attack Bill Fraud Man-in- the- Middle Attack Typo Squatting Amazon WS Attacks
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Simjacking
Supply Chain Attack
Pass the Hash
Spear Phishing
Web Session Cookie Theft
Account Takeover
DNS Amplification
Application Access Token
Malware
Whale Phishing
Shadow IT
Insider Threat
Watering Hole Attack
Brute Force Attack
IoT Threats
Phishing Payloads
Meltdown & Spectre Attack
SQL Injection
Open Redirection
Network Sniffing
Advanced Persistent Threat
DoS Attack
Spyware
Compromised Credentials
Ransomware
Zero-Day Exploit
Credential Dumping
Cross-Site Scripting
Malicious Powershell
Drive-by Download Attack
Cloud Cryptomining
Privileged User Compromise
Crypto Jacking Attack
Masquerade Attack
Macro Viruses
Social Engineering Attack
Bill Fraud
Man-in-the-Middle Attack
Typo Squatting
Amazon WS Attacks