Spear Phishing Shadow IT Privileged User Compromise Pass the Hash Macro Viruses Bill Fraud Web Session Cookie Theft Watering Hole Attack Phishing Payloads Account Takeover Crypto Jacking Attack Zero- Day Exploit IoT Threats Simjacking Cloud Cryptomining Credential Dumping Man-in- the- Middle Attack Malicious Powershell Malware Compromised Credentials Social Engineering Attack Typo Squatting Drive-by Download Attack Open Redirection Ransomware Cross- Site Scripting Masquerade Attack DoS Attack Spyware DNS Amplification Application Access Token Insider Threat Advanced Persistent Threat SQL Injection Brute Force Attack Supply Chain Attack Network Sniffing Amazon WS Attacks Meltdown & Spectre Attack Whale Phishing Spear Phishing Shadow IT Privileged User Compromise Pass the Hash Macro Viruses Bill Fraud Web Session Cookie Theft Watering Hole Attack Phishing Payloads Account Takeover Crypto Jacking Attack Zero- Day Exploit IoT Threats Simjacking Cloud Cryptomining Credential Dumping Man-in- the- Middle Attack Malicious Powershell Malware Compromised Credentials Social Engineering Attack Typo Squatting Drive-by Download Attack Open Redirection Ransomware Cross- Site Scripting Masquerade Attack DoS Attack Spyware DNS Amplification Application Access Token Insider Threat Advanced Persistent Threat SQL Injection Brute Force Attack Supply Chain Attack Network Sniffing Amazon WS Attacks Meltdown & Spectre Attack Whale Phishing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Spear Phishing
Shadow IT
Privileged User Compromise
Pass the Hash
Macro Viruses
Bill Fraud
Web Session Cookie Theft
Watering Hole Attack
Phishing Payloads
Account Takeover
Crypto Jacking Attack
Zero-Day Exploit
IoT Threats
Simjacking
Cloud Cryptomining
Credential Dumping
Man-in-the-Middle Attack
Malicious Powershell
Malware
Compromised Credentials
Social Engineering Attack
Typo Squatting
Drive-by Download Attack
Open Redirection
Ransomware
Cross-Site Scripting
Masquerade Attack
DoS Attack
Spyware
DNS Amplification
Application Access Token
Insider Threat
Advanced Persistent Threat
SQL Injection
Brute Force Attack
Supply Chain Attack
Network Sniffing
Amazon WS Attacks
Meltdown & Spectre Attack
Whale Phishing