Account Takeover Supply Chain Attack Typo Squatting Macro Viruses Drive-by Download Attack Cloud Cryptomining Bill Fraud Malicious Powershell IoT Threats Application Access Token Whale Phishing Compromised Credentials Spyware Cross- Site Scripting Advanced Persistent Threat Simjacking Watering Hole Attack Amazon WS Attacks Phishing Payloads Privileged User Compromise Zero- Day Exploit Meltdown & Spectre Attack Man-in- the- Middle Attack Shadow IT Social Engineering Attack Insider Threat Spear Phishing Brute Force Attack DNS Amplification Malware Masquerade Attack Network Sniffing Open Redirection Crypto Jacking Attack Pass the Hash Web Session Cookie Theft Credential Dumping SQL Injection DoS Attack Ransomware Account Takeover Supply Chain Attack Typo Squatting Macro Viruses Drive-by Download Attack Cloud Cryptomining Bill Fraud Malicious Powershell IoT Threats Application Access Token Whale Phishing Compromised Credentials Spyware Cross- Site Scripting Advanced Persistent Threat Simjacking Watering Hole Attack Amazon WS Attacks Phishing Payloads Privileged User Compromise Zero- Day Exploit Meltdown & Spectre Attack Man-in- the- Middle Attack Shadow IT Social Engineering Attack Insider Threat Spear Phishing Brute Force Attack DNS Amplification Malware Masquerade Attack Network Sniffing Open Redirection Crypto Jacking Attack Pass the Hash Web Session Cookie Theft Credential Dumping SQL Injection DoS Attack Ransomware
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Account Takeover
Supply Chain Attack
Typo Squatting
Macro Viruses
Drive-by Download Attack
Cloud Cryptomining
Bill Fraud
Malicious Powershell
IoT Threats
Application Access Token
Whale Phishing
Compromised Credentials
Spyware
Cross-Site Scripting
Advanced Persistent Threat
Simjacking
Watering Hole Attack
Amazon WS Attacks
Phishing Payloads
Privileged User Compromise
Zero-Day Exploit
Meltdown & Spectre Attack
Man-in-the-Middle Attack
Shadow IT
Social Engineering Attack
Insider Threat
Spear Phishing
Brute Force Attack
DNS Amplification
Malware
Masquerade Attack
Network Sniffing
Open Redirection
Crypto Jacking Attack
Pass the Hash
Web Session Cookie Theft
Credential Dumping
SQL Injection
DoS Attack
Ransomware