Typo Squatting Spear Phishing IoT Threats Amazon WS Attacks Privileged User Compromise Phishing Payloads Ransomware Brute Force Attack Crypto Jacking Attack Cloud Cryptomining DNS Amplification DoS Attack Masquerade Attack SQL Injection Supply Chain Attack Malicious Powershell Man-in- the- Middle Attack Advanced Persistent Threat Macro Viruses Spyware Shadow IT Insider Threat Compromised Credentials Social Engineering Attack Pass the Hash Account Takeover Web Session Cookie Theft Cross- Site Scripting Malware Whale Phishing Meltdown & Spectre Attack Watering Hole Attack Credential Dumping Bill Fraud Network Sniffing Simjacking Zero- Day Exploit Open Redirection Drive-by Download Attack Application Access Token Typo Squatting Spear Phishing IoT Threats Amazon WS Attacks Privileged User Compromise Phishing Payloads Ransomware Brute Force Attack Crypto Jacking Attack Cloud Cryptomining DNS Amplification DoS Attack Masquerade Attack SQL Injection Supply Chain Attack Malicious Powershell Man-in- the- Middle Attack Advanced Persistent Threat Macro Viruses Spyware Shadow IT Insider Threat Compromised Credentials Social Engineering Attack Pass the Hash Account Takeover Web Session Cookie Theft Cross- Site Scripting Malware Whale Phishing Meltdown & Spectre Attack Watering Hole Attack Credential Dumping Bill Fraud Network Sniffing Simjacking Zero- Day Exploit Open Redirection Drive-by Download Attack Application Access Token
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Typo Squatting
Spear Phishing
IoT Threats
Amazon WS Attacks
Privileged User Compromise
Phishing Payloads
Ransomware
Brute Force Attack
Crypto Jacking Attack
Cloud Cryptomining
DNS Amplification
DoS Attack
Masquerade Attack
SQL Injection
Supply Chain Attack
Malicious Powershell
Man-in-the-Middle Attack
Advanced Persistent Threat
Macro Viruses
Spyware
Shadow IT
Insider Threat
Compromised Credentials
Social Engineering Attack
Pass the Hash
Account Takeover
Web Session Cookie Theft
Cross-Site Scripting
Malware
Whale Phishing
Meltdown & Spectre Attack
Watering Hole Attack
Credential Dumping
Bill Fraud
Network Sniffing
Simjacking
Zero-Day Exploit
Open Redirection
Drive-by Download Attack
Application Access Token