SpearPhishingShadowITPrivilegedUserCompromisePasstheHashMacroVirusesBillFraudWebSessionCookieTheftWateringHoleAttackPhishingPayloadsAccountTakeoverCryptoJackingAttackZero-DayExploitIoTThreatsSimjackingCloudCryptominingCredentialDumpingMan-in-the-MiddleAttackMaliciousPowershellMalwareCompromisedCredentialsSocialEngineeringAttackTypoSquattingDrive-byDownloadAttackOpenRedirectionRansomwareCross-SiteScriptingMasqueradeAttackDoSAttackSpywareDNSAmplificationApplicationAccessTokenInsiderThreatAdvancedPersistentThreatSQLInjectionBruteForceAttackSupplyChainAttackNetworkSniffingAmazonWSAttacksMeltdown& SpectreAttackWhalePhishingSpearPhishingShadowITPrivilegedUserCompromisePasstheHashMacroVirusesBillFraudWebSessionCookieTheftWateringHoleAttackPhishingPayloadsAccountTakeoverCryptoJackingAttackZero-DayExploitIoTThreatsSimjackingCloudCryptominingCredentialDumpingMan-in-the-MiddleAttackMaliciousPowershellMalwareCompromisedCredentialsSocialEngineeringAttackTypoSquattingDrive-byDownloadAttackOpenRedirectionRansomwareCross-SiteScriptingMasqueradeAttackDoSAttackSpywareDNSAmplificationApplicationAccessTokenInsiderThreatAdvancedPersistentThreatSQLInjectionBruteForceAttackSupplyChainAttackNetworkSniffingAmazonWSAttacksMeltdown& SpectreAttackWhalePhishing

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Spear Phishing
  2. Shadow IT
  3. Privileged User Compromise
  4. Pass the Hash
  5. Macro Viruses
  6. Bill Fraud
  7. Web Session Cookie Theft
  8. Watering Hole Attack
  9. Phishing Payloads
  10. Account Takeover
  11. Crypto Jacking Attack
  12. Zero-Day Exploit
  13. IoT Threats
  14. Simjacking
  15. Cloud Cryptomining
  16. Credential Dumping
  17. Man-in-the-Middle Attack
  18. Malicious Powershell
  19. Malware
  20. Compromised Credentials
  21. Social Engineering Attack
  22. Typo Squatting
  23. Drive-by Download Attack
  24. Open Redirection
  25. Ransomware
  26. Cross-Site Scripting
  27. Masquerade Attack
  28. DoS Attack
  29. Spyware
  30. DNS Amplification
  31. Application Access Token
  32. Insider Threat
  33. Advanced Persistent Threat
  34. SQL Injection
  35. Brute Force Attack
  36. Supply Chain Attack
  37. Network Sniffing
  38. Amazon WS Attacks
  39. Meltdown & Spectre Attack
  40. Whale Phishing