CompromisedCredentialsRansomwareMasqueradeAttackMan-in-the-MiddleAttackBillFraudMalwareDoSAttackSpywareCloudCryptominingInsiderThreatMeltdown& SpectreAttackAmazonWSAttacksBruteForceAttackSQLInjectionWhalePhishingAdvancedPersistentThreatSupplyChainAttackWateringHoleAttackSimjackingOpenRedirectionShadowITCredentialDumpingTypoSquattingMacroVirusesAccountTakeoverSocialEngineeringAttackCross-SiteScriptingZero-DayExploitSpearPhishingMaliciousPowershellPhishingPayloadsPasstheHashIoTThreatsCryptoJackingAttackDNSAmplificationNetworkSniffingDrive-byDownloadAttackApplicationAccessTokenPrivilegedUserCompromiseWebSessionCookieTheftCompromisedCredentialsRansomwareMasqueradeAttackMan-in-the-MiddleAttackBillFraudMalwareDoSAttackSpywareCloudCryptominingInsiderThreatMeltdown& SpectreAttackAmazonWSAttacksBruteForceAttackSQLInjectionWhalePhishingAdvancedPersistentThreatSupplyChainAttackWateringHoleAttackSimjackingOpenRedirectionShadowITCredentialDumpingTypoSquattingMacroVirusesAccountTakeoverSocialEngineeringAttackCross-SiteScriptingZero-DayExploitSpearPhishingMaliciousPowershellPhishingPayloadsPasstheHashIoTThreatsCryptoJackingAttackDNSAmplificationNetworkSniffingDrive-byDownloadAttackApplicationAccessTokenPrivilegedUserCompromiseWebSessionCookieTheft

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Compromised Credentials
  2. Ransomware
  3. Masquerade Attack
  4. Man-in-the-Middle Attack
  5. Bill Fraud
  6. Malware
  7. DoS Attack
  8. Spyware
  9. Cloud Cryptomining
  10. Insider Threat
  11. Meltdown & Spectre Attack
  12. Amazon WS Attacks
  13. Brute Force Attack
  14. SQL Injection
  15. Whale Phishing
  16. Advanced Persistent Threat
  17. Supply Chain Attack
  18. Watering Hole Attack
  19. Simjacking
  20. Open Redirection
  21. Shadow IT
  22. Credential Dumping
  23. Typo Squatting
  24. Macro Viruses
  25. Account Takeover
  26. Social Engineering Attack
  27. Cross-Site Scripting
  28. Zero-Day Exploit
  29. Spear Phishing
  30. Malicious Powershell
  31. Phishing Payloads
  32. Pass the Hash
  33. IoT Threats
  34. Crypto Jacking Attack
  35. DNS Amplification
  36. Network Sniffing
  37. Drive-by Download Attack
  38. Application Access Token
  39. Privileged User Compromise
  40. Web Session Cookie Theft