Application Access Token Simjacking Supply Chain Attack Watering Hole Attack Malicious Powershell Network Sniffing Crypto Jacking Attack Open Redirection Masquerade Attack IoT Threats Web Session Cookie Theft Macro Viruses Brute Force Attack Compromised Credentials DNS Amplification Shadow IT Amazon WS Attacks Spyware Whale Phishing Spear Phishing Bill Fraud DoS Attack Man-in- the- Middle Attack Typo Squatting SQL Injection Account Takeover Malware Drive-by Download Attack Privileged User Compromise Credential Dumping Cloud Cryptomining Zero- Day Exploit Pass the Hash Cross- Site Scripting Meltdown & Spectre Attack Advanced Persistent Threat Ransomware Insider Threat Social Engineering Attack Phishing Payloads Application Access Token Simjacking Supply Chain Attack Watering Hole Attack Malicious Powershell Network Sniffing Crypto Jacking Attack Open Redirection Masquerade Attack IoT Threats Web Session Cookie Theft Macro Viruses Brute Force Attack Compromised Credentials DNS Amplification Shadow IT Amazon WS Attacks Spyware Whale Phishing Spear Phishing Bill Fraud DoS Attack Man-in- the- Middle Attack Typo Squatting SQL Injection Account Takeover Malware Drive-by Download Attack Privileged User Compromise Credential Dumping Cloud Cryptomining Zero- Day Exploit Pass the Hash Cross- Site Scripting Meltdown & Spectre Attack Advanced Persistent Threat Ransomware Insider Threat Social Engineering Attack Phishing Payloads
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Application Access Token
Simjacking
Supply Chain Attack
Watering Hole Attack
Malicious Powershell
Network Sniffing
Crypto Jacking Attack
Open Redirection
Masquerade Attack
IoT Threats
Web Session Cookie Theft
Macro Viruses
Brute Force Attack
Compromised Credentials
DNS Amplification
Shadow IT
Amazon WS Attacks
Spyware
Whale Phishing
Spear Phishing
Bill Fraud
DoS Attack
Man-in-the-Middle Attack
Typo Squatting
SQL Injection
Account Takeover
Malware
Drive-by Download Attack
Privileged User Compromise
Credential Dumping
Cloud Cryptomining
Zero-Day Exploit
Pass the Hash
Cross-Site Scripting
Meltdown & Spectre Attack
Advanced Persistent Threat
Ransomware
Insider Threat
Social Engineering Attack
Phishing Payloads