Compromised Credentials Watering Hole Attack Bill Fraud SQL Injection Simjacking Application Access Token Social Engineering Attack Shadow IT Amazon WS Attacks Whale Phishing DNS Amplification Privileged User Compromise Phishing Payloads Supply Chain Attack Spear Phishing Drive-by Download Attack Cloud Cryptomining Ransomware Account Takeover Insider Threat Brute Force Attack Malicious Powershell DoS Attack Masquerade Attack Cross- Site Scripting Pass the Hash Macro Viruses Meltdown & Spectre Attack Man-in- the- Middle Attack Malware Zero- Day Exploit Web Session Cookie Theft Open Redirection Typo Squatting Spyware IoT Threats Advanced Persistent Threat Network Sniffing Crypto Jacking Attack Credential Dumping Compromised Credentials Watering Hole Attack Bill Fraud SQL Injection Simjacking Application Access Token Social Engineering Attack Shadow IT Amazon WS Attacks Whale Phishing DNS Amplification Privileged User Compromise Phishing Payloads Supply Chain Attack Spear Phishing Drive-by Download Attack Cloud Cryptomining Ransomware Account Takeover Insider Threat Brute Force Attack Malicious Powershell DoS Attack Masquerade Attack Cross- Site Scripting Pass the Hash Macro Viruses Meltdown & Spectre Attack Man-in- the- Middle Attack Malware Zero- Day Exploit Web Session Cookie Theft Open Redirection Typo Squatting Spyware IoT Threats Advanced Persistent Threat Network Sniffing Crypto Jacking Attack Credential Dumping
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Compromised Credentials
Watering Hole Attack
Bill Fraud
SQL Injection
Simjacking
Application Access Token
Social Engineering Attack
Shadow IT
Amazon WS Attacks
Whale Phishing
DNS Amplification
Privileged User Compromise
Phishing Payloads
Supply Chain Attack
Spear Phishing
Drive-by Download Attack
Cloud Cryptomining
Ransomware
Account Takeover
Insider Threat
Brute Force Attack
Malicious Powershell
DoS Attack
Masquerade Attack
Cross-Site Scripting
Pass the Hash
Macro Viruses
Meltdown & Spectre Attack
Man-in-the-Middle Attack
Malware
Zero-Day Exploit
Web Session Cookie Theft
Open Redirection
Typo Squatting
Spyware
IoT Threats
Advanced Persistent Threat
Network Sniffing
Crypto Jacking Attack
Credential Dumping