Spyware Man-in- the- Middle Attack DoS Attack DNS Amplification Credential Dumping Amazon WS Attacks Supply Chain Attack Malicious Powershell Spear Phishing Social Engineering Attack Phishing Payloads Pass the Hash Crypto Jacking Attack Meltdown & Spectre Attack Shadow IT Masquerade Attack Typo Squatting Open Redirection Drive-by Download Attack Zero- Day Exploit Brute Force Attack Simjacking Account Takeover Compromised Credentials Bill Fraud Whale Phishing SQL Injection Privileged User Compromise Advanced Persistent Threat Cloud Cryptomining Watering Hole Attack Malware Network Sniffing Macro Viruses Web Session Cookie Theft IoT Threats Cross- Site Scripting Ransomware Application Access Token Insider Threat Spyware Man-in- the- Middle Attack DoS Attack DNS Amplification Credential Dumping Amazon WS Attacks Supply Chain Attack Malicious Powershell Spear Phishing Social Engineering Attack Phishing Payloads Pass the Hash Crypto Jacking Attack Meltdown & Spectre Attack Shadow IT Masquerade Attack Typo Squatting Open Redirection Drive-by Download Attack Zero- Day Exploit Brute Force Attack Simjacking Account Takeover Compromised Credentials Bill Fraud Whale Phishing SQL Injection Privileged User Compromise Advanced Persistent Threat Cloud Cryptomining Watering Hole Attack Malware Network Sniffing Macro Viruses Web Session Cookie Theft IoT Threats Cross- Site Scripting Ransomware Application Access Token Insider Threat
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Spyware
Man-in-the-Middle Attack
DoS Attack
DNS Amplification
Credential Dumping
Amazon WS Attacks
Supply Chain Attack
Malicious Powershell
Spear Phishing
Social Engineering Attack
Phishing Payloads
Pass the Hash
Crypto Jacking Attack
Meltdown & Spectre Attack
Shadow IT
Masquerade Attack
Typo Squatting
Open Redirection
Drive-by Download Attack
Zero-Day Exploit
Brute Force Attack
Simjacking
Account Takeover
Compromised Credentials
Bill Fraud
Whale Phishing
SQL Injection
Privileged User Compromise
Advanced Persistent Threat
Cloud Cryptomining
Watering Hole Attack
Malware
Network Sniffing
Macro Viruses
Web Session Cookie Theft
IoT Threats
Cross-Site Scripting
Ransomware
Application Access Token
Insider Threat