Whale Phishing Watering Hole Attack IoT Threats Open Redirection Privileged User Compromise Supply Chain Attack Insider Threat Phishing Payloads Masquerade Attack Brute Force Attack Drive-by Download Attack Spear Phishing Cloud Cryptomining Social Engineering Attack DNS Amplification Account Takeover DoS Attack Spyware Compromised Credentials Pass the Hash Advanced Persistent Threat Macro Viruses Credential Dumping Application Access Token Meltdown & Spectre Attack SQL Injection Amazon WS Attacks Cross- Site Scripting Ransomware Network Sniffing Crypto Jacking Attack Simjacking Shadow IT Zero- Day Exploit Malicious Powershell Web Session Cookie Theft Bill Fraud Malware Typo Squatting Man-in- the- Middle Attack Whale Phishing Watering Hole Attack IoT Threats Open Redirection Privileged User Compromise Supply Chain Attack Insider Threat Phishing Payloads Masquerade Attack Brute Force Attack Drive-by Download Attack Spear Phishing Cloud Cryptomining Social Engineering Attack DNS Amplification Account Takeover DoS Attack Spyware Compromised Credentials Pass the Hash Advanced Persistent Threat Macro Viruses Credential Dumping Application Access Token Meltdown & Spectre Attack SQL Injection Amazon WS Attacks Cross- Site Scripting Ransomware Network Sniffing Crypto Jacking Attack Simjacking Shadow IT Zero- Day Exploit Malicious Powershell Web Session Cookie Theft Bill Fraud Malware Typo Squatting Man-in- the- Middle Attack
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Whale Phishing
Watering Hole Attack
IoT Threats
Open Redirection
Privileged User Compromise
Supply Chain Attack
Insider Threat
Phishing Payloads
Masquerade Attack
Brute Force Attack
Drive-by Download Attack
Spear Phishing
Cloud Cryptomining
Social Engineering Attack
DNS Amplification
Account Takeover
DoS Attack
Spyware
Compromised Credentials
Pass the Hash
Advanced Persistent Threat
Macro Viruses
Credential Dumping
Application Access Token
Meltdown & Spectre Attack
SQL Injection
Amazon WS Attacks
Cross-Site Scripting
Ransomware
Network Sniffing
Crypto Jacking Attack
Simjacking
Shadow IT
Zero-Day Exploit
Malicious Powershell
Web Session Cookie Theft
Bill Fraud
Malware
Typo Squatting
Man-in-the-Middle Attack