SpywareMan-in-the-MiddleAttackDoSAttackDNSAmplificationCredentialDumpingAmazonWSAttacksSupplyChainAttackMaliciousPowershellSpearPhishingSocialEngineeringAttackPhishingPayloadsPasstheHashCryptoJackingAttackMeltdown& SpectreAttackShadowITMasqueradeAttackTypoSquattingOpenRedirectionDrive-byDownloadAttackZero-DayExploitBruteForceAttackSimjackingAccountTakeoverCompromisedCredentialsBillFraudWhalePhishingSQLInjectionPrivilegedUserCompromiseAdvancedPersistentThreatCloudCryptominingWateringHoleAttackMalwareNetworkSniffingMacroVirusesWebSessionCookieTheftIoTThreatsCross-SiteScriptingRansomwareApplicationAccessTokenInsiderThreatSpywareMan-in-the-MiddleAttackDoSAttackDNSAmplificationCredentialDumpingAmazonWSAttacksSupplyChainAttackMaliciousPowershellSpearPhishingSocialEngineeringAttackPhishingPayloadsPasstheHashCryptoJackingAttackMeltdown& SpectreAttackShadowITMasqueradeAttackTypoSquattingOpenRedirectionDrive-byDownloadAttackZero-DayExploitBruteForceAttackSimjackingAccountTakeoverCompromisedCredentialsBillFraudWhalePhishingSQLInjectionPrivilegedUserCompromiseAdvancedPersistentThreatCloudCryptominingWateringHoleAttackMalwareNetworkSniffingMacroVirusesWebSessionCookieTheftIoTThreatsCross-SiteScriptingRansomwareApplicationAccessTokenInsiderThreat

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Spyware
  2. Man-in-the-Middle Attack
  3. DoS Attack
  4. DNS Amplification
  5. Credential Dumping
  6. Amazon WS Attacks
  7. Supply Chain Attack
  8. Malicious Powershell
  9. Spear Phishing
  10. Social Engineering Attack
  11. Phishing Payloads
  12. Pass the Hash
  13. Crypto Jacking Attack
  14. Meltdown & Spectre Attack
  15. Shadow IT
  16. Masquerade Attack
  17. Typo Squatting
  18. Open Redirection
  19. Drive-by Download Attack
  20. Zero-Day Exploit
  21. Brute Force Attack
  22. Simjacking
  23. Account Takeover
  24. Compromised Credentials
  25. Bill Fraud
  26. Whale Phishing
  27. SQL Injection
  28. Privileged User Compromise
  29. Advanced Persistent Threat
  30. Cloud Cryptomining
  31. Watering Hole Attack
  32. Malware
  33. Network Sniffing
  34. Macro Viruses
  35. Web Session Cookie Theft
  36. IoT Threats
  37. Cross-Site Scripting
  38. Ransomware
  39. Application Access Token
  40. Insider Threat