Meltdown& SpectreAttackBillFraudShadowITMaliciousPowershellAmazonWSAttacksSocialEngineeringAttackZero-DayExploitCompromisedCredentialsInsiderThreatSpearPhishingAdvancedPersistentThreatSpywarePhishingPayloadsMalwareCredentialDumpingPasstheHashOpenRedirectionBruteForceAttackAccountTakeoverTypoSquattingCross-SiteScriptingMasqueradeAttackMan-in-the-MiddleAttackSupplyChainAttackDrive-byDownloadAttackPrivilegedUserCompromiseWhalePhishingCloudCryptominingDoSAttackApplicationAccessTokenCryptoJackingAttackIoTThreatsSQLInjectionWebSessionCookieTheftRansomwareDNSAmplificationMacroVirusesSimjackingNetworkSniffingWateringHoleAttackMeltdown& SpectreAttackBillFraudShadowITMaliciousPowershellAmazonWSAttacksSocialEngineeringAttackZero-DayExploitCompromisedCredentialsInsiderThreatSpearPhishingAdvancedPersistentThreatSpywarePhishingPayloadsMalwareCredentialDumpingPasstheHashOpenRedirectionBruteForceAttackAccountTakeoverTypoSquattingCross-SiteScriptingMasqueradeAttackMan-in-the-MiddleAttackSupplyChainAttackDrive-byDownloadAttackPrivilegedUserCompromiseWhalePhishingCloudCryptominingDoSAttackApplicationAccessTokenCryptoJackingAttackIoTThreatsSQLInjectionWebSessionCookieTheftRansomwareDNSAmplificationMacroVirusesSimjackingNetworkSniffingWateringHoleAttack

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Meltdown & Spectre Attack
  2. Bill Fraud
  3. Shadow IT
  4. Malicious Powershell
  5. Amazon WS Attacks
  6. Social Engineering Attack
  7. Zero-Day Exploit
  8. Compromised Credentials
  9. Insider Threat
  10. Spear Phishing
  11. Advanced Persistent Threat
  12. Spyware
  13. Phishing Payloads
  14. Malware
  15. Credential Dumping
  16. Pass the Hash
  17. Open Redirection
  18. Brute Force Attack
  19. Account Takeover
  20. Typo Squatting
  21. Cross-Site Scripting
  22. Masquerade Attack
  23. Man-in-the-Middle Attack
  24. Supply Chain Attack
  25. Drive-by Download Attack
  26. Privileged User Compromise
  27. Whale Phishing
  28. Cloud Cryptomining
  29. DoS Attack
  30. Application Access Token
  31. Crypto Jacking Attack
  32. IoT Threats
  33. SQL Injection
  34. Web Session Cookie Theft
  35. Ransomware
  36. DNS Amplification
  37. Macro Viruses
  38. Simjacking
  39. Network Sniffing
  40. Watering Hole Attack