WhalePhishingWateringHoleAttackIoTThreatsOpenRedirectionPrivilegedUserCompromiseSupplyChainAttackInsiderThreatPhishingPayloadsMasqueradeAttackBruteForceAttackDrive-byDownloadAttackSpearPhishingCloudCryptominingSocialEngineeringAttackDNSAmplificationAccountTakeoverDoSAttackSpywareCompromisedCredentialsPasstheHashAdvancedPersistentThreatMacroVirusesCredentialDumpingApplicationAccessTokenMeltdown& SpectreAttackSQLInjectionAmazonWSAttacksCross-SiteScriptingRansomwareNetworkSniffingCryptoJackingAttackSimjackingShadowITZero-DayExploitMaliciousPowershellWebSessionCookieTheftBillFraudMalwareTypoSquattingMan-in-the-MiddleAttackWhalePhishingWateringHoleAttackIoTThreatsOpenRedirectionPrivilegedUserCompromiseSupplyChainAttackInsiderThreatPhishingPayloadsMasqueradeAttackBruteForceAttackDrive-byDownloadAttackSpearPhishingCloudCryptominingSocialEngineeringAttackDNSAmplificationAccountTakeoverDoSAttackSpywareCompromisedCredentialsPasstheHashAdvancedPersistentThreatMacroVirusesCredentialDumpingApplicationAccessTokenMeltdown& SpectreAttackSQLInjectionAmazonWSAttacksCross-SiteScriptingRansomwareNetworkSniffingCryptoJackingAttackSimjackingShadowITZero-DayExploitMaliciousPowershellWebSessionCookieTheftBillFraudMalwareTypoSquattingMan-in-the-MiddleAttack

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Whale Phishing
  2. Watering Hole Attack
  3. IoT Threats
  4. Open Redirection
  5. Privileged User Compromise
  6. Supply Chain Attack
  7. Insider Threat
  8. Phishing Payloads
  9. Masquerade Attack
  10. Brute Force Attack
  11. Drive-by Download Attack
  12. Spear Phishing
  13. Cloud Cryptomining
  14. Social Engineering Attack
  15. DNS Amplification
  16. Account Takeover
  17. DoS Attack
  18. Spyware
  19. Compromised Credentials
  20. Pass the Hash
  21. Advanced Persistent Threat
  22. Macro Viruses
  23. Credential Dumping
  24. Application Access Token
  25. Meltdown & Spectre Attack
  26. SQL Injection
  27. Amazon WS Attacks
  28. Cross-Site Scripting
  29. Ransomware
  30. Network Sniffing
  31. Crypto Jacking Attack
  32. Simjacking
  33. Shadow IT
  34. Zero-Day Exploit
  35. Malicious Powershell
  36. Web Session Cookie Theft
  37. Bill Fraud
  38. Malware
  39. Typo Squatting
  40. Man-in-the-Middle Attack