SimjackingSupplyChainAttackPasstheHashSpearPhishingWebSessionCookieTheftAccountTakeoverDNSAmplificationApplicationAccessTokenMalwareWhalePhishingShadowITInsiderThreatWateringHoleAttackBruteForceAttackIoTThreatsPhishingPayloadsMeltdown& SpectreAttackSQLInjectionOpenRedirectionNetworkSniffingAdvancedPersistentThreatDoSAttackSpywareCompromisedCredentialsRansomwareZero-DayExploitCredentialDumpingCross-SiteScriptingMaliciousPowershellDrive-byDownloadAttackCloudCryptominingPrivilegedUserCompromiseCryptoJackingAttackMasqueradeAttackMacroVirusesSocialEngineeringAttackBillFraudMan-in-the-MiddleAttackTypoSquattingAmazonWSAttacksSimjackingSupplyChainAttackPasstheHashSpearPhishingWebSessionCookieTheftAccountTakeoverDNSAmplificationApplicationAccessTokenMalwareWhalePhishingShadowITInsiderThreatWateringHoleAttackBruteForceAttackIoTThreatsPhishingPayloadsMeltdown& SpectreAttackSQLInjectionOpenRedirectionNetworkSniffingAdvancedPersistentThreatDoSAttackSpywareCompromisedCredentialsRansomwareZero-DayExploitCredentialDumpingCross-SiteScriptingMaliciousPowershellDrive-byDownloadAttackCloudCryptominingPrivilegedUserCompromiseCryptoJackingAttackMasqueradeAttackMacroVirusesSocialEngineeringAttackBillFraudMan-in-the-MiddleAttackTypoSquattingAmazonWSAttacks

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Simjacking
  2. Supply Chain Attack
  3. Pass the Hash
  4. Spear Phishing
  5. Web Session Cookie Theft
  6. Account Takeover
  7. DNS Amplification
  8. Application Access Token
  9. Malware
  10. Whale Phishing
  11. Shadow IT
  12. Insider Threat
  13. Watering Hole Attack
  14. Brute Force Attack
  15. IoT Threats
  16. Phishing Payloads
  17. Meltdown & Spectre Attack
  18. SQL Injection
  19. Open Redirection
  20. Network Sniffing
  21. Advanced Persistent Threat
  22. DoS Attack
  23. Spyware
  24. Compromised Credentials
  25. Ransomware
  26. Zero-Day Exploit
  27. Credential Dumping
  28. Cross-Site Scripting
  29. Malicious Powershell
  30. Drive-by Download Attack
  31. Cloud Cryptomining
  32. Privileged User Compromise
  33. Crypto Jacking Attack
  34. Masquerade Attack
  35. Macro Viruses
  36. Social Engineering Attack
  37. Bill Fraud
  38. Man-in-the-Middle Attack
  39. Typo Squatting
  40. Amazon WS Attacks