CompromisedCredentialsWateringHoleAttackBillFraudSQLInjectionSimjackingApplicationAccessTokenSocialEngineeringAttackShadowITAmazonWSAttacksWhalePhishingDNSAmplificationPrivilegedUserCompromisePhishingPayloadsSupplyChainAttackSpearPhishingDrive-byDownloadAttackCloudCryptominingRansomwareAccountTakeoverInsiderThreatBruteForceAttackMaliciousPowershellDoSAttackMasqueradeAttackCross-SiteScriptingPasstheHashMacroVirusesMeltdown& SpectreAttackMan-in-the-MiddleAttackMalwareZero-DayExploitWebSessionCookieTheftOpenRedirectionTypoSquattingSpywareIoTThreatsAdvancedPersistentThreatNetworkSniffingCryptoJackingAttackCredentialDumpingCompromisedCredentialsWateringHoleAttackBillFraudSQLInjectionSimjackingApplicationAccessTokenSocialEngineeringAttackShadowITAmazonWSAttacksWhalePhishingDNSAmplificationPrivilegedUserCompromisePhishingPayloadsSupplyChainAttackSpearPhishingDrive-byDownloadAttackCloudCryptominingRansomwareAccountTakeoverInsiderThreatBruteForceAttackMaliciousPowershellDoSAttackMasqueradeAttackCross-SiteScriptingPasstheHashMacroVirusesMeltdown& SpectreAttackMan-in-the-MiddleAttackMalwareZero-DayExploitWebSessionCookieTheftOpenRedirectionTypoSquattingSpywareIoTThreatsAdvancedPersistentThreatNetworkSniffingCryptoJackingAttackCredentialDumping

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Compromised Credentials
  2. Watering Hole Attack
  3. Bill Fraud
  4. SQL Injection
  5. Simjacking
  6. Application Access Token
  7. Social Engineering Attack
  8. Shadow IT
  9. Amazon WS Attacks
  10. Whale Phishing
  11. DNS Amplification
  12. Privileged User Compromise
  13. Phishing Payloads
  14. Supply Chain Attack
  15. Spear Phishing
  16. Drive-by Download Attack
  17. Cloud Cryptomining
  18. Ransomware
  19. Account Takeover
  20. Insider Threat
  21. Brute Force Attack
  22. Malicious Powershell
  23. DoS Attack
  24. Masquerade Attack
  25. Cross-Site Scripting
  26. Pass the Hash
  27. Macro Viruses
  28. Meltdown & Spectre Attack
  29. Man-in-the-Middle Attack
  30. Malware
  31. Zero-Day Exploit
  32. Web Session Cookie Theft
  33. Open Redirection
  34. Typo Squatting
  35. Spyware
  36. IoT Threats
  37. Advanced Persistent Threat
  38. Network Sniffing
  39. Crypto Jacking Attack
  40. Credential Dumping