ApplicationAccessTokenSimjackingSupplyChainAttackWateringHoleAttackMaliciousPowershellNetworkSniffingCryptoJackingAttackOpenRedirectionMasqueradeAttackIoTThreatsWebSessionCookieTheftMacroVirusesBruteForceAttackCompromisedCredentialsDNSAmplificationShadowITAmazonWSAttacksSpywareWhalePhishingSpearPhishingBillFraudDoSAttackMan-in-the-MiddleAttackTypoSquattingSQLInjectionAccountTakeoverMalwareDrive-byDownloadAttackPrivilegedUserCompromiseCredentialDumpingCloudCryptominingZero-DayExploitPasstheHashCross-SiteScriptingMeltdown& SpectreAttackAdvancedPersistentThreatRansomwareInsiderThreatSocialEngineeringAttackPhishingPayloadsApplicationAccessTokenSimjackingSupplyChainAttackWateringHoleAttackMaliciousPowershellNetworkSniffingCryptoJackingAttackOpenRedirectionMasqueradeAttackIoTThreatsWebSessionCookieTheftMacroVirusesBruteForceAttackCompromisedCredentialsDNSAmplificationShadowITAmazonWSAttacksSpywareWhalePhishingSpearPhishingBillFraudDoSAttackMan-in-the-MiddleAttackTypoSquattingSQLInjectionAccountTakeoverMalwareDrive-byDownloadAttackPrivilegedUserCompromiseCredentialDumpingCloudCryptominingZero-DayExploitPasstheHashCross-SiteScriptingMeltdown& SpectreAttackAdvancedPersistentThreatRansomwareInsiderThreatSocialEngineeringAttackPhishingPayloads

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Application Access Token
  2. Simjacking
  3. Supply Chain Attack
  4. Watering Hole Attack
  5. Malicious Powershell
  6. Network Sniffing
  7. Crypto Jacking Attack
  8. Open Redirection
  9. Masquerade Attack
  10. IoT Threats
  11. Web Session Cookie Theft
  12. Macro Viruses
  13. Brute Force Attack
  14. Compromised Credentials
  15. DNS Amplification
  16. Shadow IT
  17. Amazon WS Attacks
  18. Spyware
  19. Whale Phishing
  20. Spear Phishing
  21. Bill Fraud
  22. DoS Attack
  23. Man-in-the-Middle Attack
  24. Typo Squatting
  25. SQL Injection
  26. Account Takeover
  27. Malware
  28. Drive-by Download Attack
  29. Privileged User Compromise
  30. Credential Dumping
  31. Cloud Cryptomining
  32. Zero-Day Exploit
  33. Pass the Hash
  34. Cross-Site Scripting
  35. Meltdown & Spectre Attack
  36. Advanced Persistent Threat
  37. Ransomware
  38. Insider Threat
  39. Social Engineering Attack
  40. Phishing Payloads