AmazonWSAttacksCompromisedCredentialsMacroVirusesDNSAmplificationDrive-byDownloadAttackDoSAttackZero-DayExploitWebSessionCookieTheftSimjackingWateringHoleAttackCryptoJackingAttackAdvancedPersistentThreatCloudCryptominingWhalePhishingCross-SiteScriptingMaliciousPowershellBruteForceAttackSpywareSupplyChainAttackMasqueradeAttackOpenRedirectionAccountTakeoverApplicationAccessTokenNetworkSniffingShadowITInsiderThreatMeltdown& SpectreAttackCredentialDumpingRansomwareMan-in-the-MiddleAttackPhishingPayloadsSQLInjectionSpearPhishingSocialEngineeringAttackTypoSquattingBillFraudIoTThreatsPasstheHashMalwarePrivilegedUserCompromiseAmazonWSAttacksCompromisedCredentialsMacroVirusesDNSAmplificationDrive-byDownloadAttackDoSAttackZero-DayExploitWebSessionCookieTheftSimjackingWateringHoleAttackCryptoJackingAttackAdvancedPersistentThreatCloudCryptominingWhalePhishingCross-SiteScriptingMaliciousPowershellBruteForceAttackSpywareSupplyChainAttackMasqueradeAttackOpenRedirectionAccountTakeoverApplicationAccessTokenNetworkSniffingShadowITInsiderThreatMeltdown& SpectreAttackCredentialDumpingRansomwareMan-in-the-MiddleAttackPhishingPayloadsSQLInjectionSpearPhishingSocialEngineeringAttackTypoSquattingBillFraudIoTThreatsPasstheHashMalwarePrivilegedUserCompromise

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Amazon WS Attacks
  2. Compromised Credentials
  3. Macro Viruses
  4. DNS Amplification
  5. Drive-by Download Attack
  6. DoS Attack
  7. Zero-Day Exploit
  8. Web Session Cookie Theft
  9. Simjacking
  10. Watering Hole Attack
  11. Crypto Jacking Attack
  12. Advanced Persistent Threat
  13. Cloud Cryptomining
  14. Whale Phishing
  15. Cross-Site Scripting
  16. Malicious Powershell
  17. Brute Force Attack
  18. Spyware
  19. Supply Chain Attack
  20. Masquerade Attack
  21. Open Redirection
  22. Account Takeover
  23. Application Access Token
  24. Network Sniffing
  25. Shadow IT
  26. Insider Threat
  27. Meltdown & Spectre Attack
  28. Credential Dumping
  29. Ransomware
  30. Man-in-the-Middle Attack
  31. Phishing Payloads
  32. SQL Injection
  33. Spear Phishing
  34. Social Engineering Attack
  35. Typo Squatting
  36. Bill Fraud
  37. IoT Threats
  38. Pass the Hash
  39. Malware
  40. Privileged User Compromise