Compromised Credentials Ransomware Masquerade Attack Man-in- the- Middle Attack Bill Fraud Malware DoS Attack Spyware Cloud Cryptomining Insider Threat Meltdown & Spectre Attack Amazon WS Attacks Brute Force Attack SQL Injection Whale Phishing Advanced Persistent Threat Supply Chain Attack Watering Hole Attack Simjacking Open Redirection Shadow IT Credential Dumping Typo Squatting Macro Viruses Account Takeover Social Engineering Attack Cross- Site Scripting Zero- Day Exploit Spear Phishing Malicious Powershell Phishing Payloads Pass the Hash IoT Threats Crypto Jacking Attack DNS Amplification Network Sniffing Drive-by Download Attack Application Access Token Privileged User Compromise Web Session Cookie Theft Compromised Credentials Ransomware Masquerade Attack Man-in- the- Middle Attack Bill Fraud Malware DoS Attack Spyware Cloud Cryptomining Insider Threat Meltdown & Spectre Attack Amazon WS Attacks Brute Force Attack SQL Injection Whale Phishing Advanced Persistent Threat Supply Chain Attack Watering Hole Attack Simjacking Open Redirection Shadow IT Credential Dumping Typo Squatting Macro Viruses Account Takeover Social Engineering Attack Cross- Site Scripting Zero- Day Exploit Spear Phishing Malicious Powershell Phishing Payloads Pass the Hash IoT Threats Crypto Jacking Attack DNS Amplification Network Sniffing Drive-by Download Attack Application Access Token Privileged User Compromise Web Session Cookie Theft
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Compromised Credentials
Ransomware
Masquerade Attack
Man-in-the-Middle Attack
Bill Fraud
Malware
DoS Attack
Spyware
Cloud Cryptomining
Insider Threat
Meltdown & Spectre Attack
Amazon WS Attacks
Brute Force Attack
SQL Injection
Whale Phishing
Advanced Persistent Threat
Supply Chain Attack
Watering Hole Attack
Simjacking
Open Redirection
Shadow IT
Credential Dumping
Typo Squatting
Macro Viruses
Account Takeover
Social Engineering Attack
Cross-Site Scripting
Zero-Day Exploit
Spear Phishing
Malicious Powershell
Phishing Payloads
Pass the Hash
IoT Threats
Crypto Jacking Attack
DNS Amplification
Network Sniffing
Drive-by Download Attack
Application Access Token
Privileged User Compromise
Web Session Cookie Theft