Amazon WS Attacks Compromised Credentials Macro Viruses DNS Amplification Drive-by Download Attack DoS Attack Zero- Day Exploit Web Session Cookie Theft Simjacking Watering Hole Attack Crypto Jacking Attack Advanced Persistent Threat Cloud Cryptomining Whale Phishing Cross- Site Scripting Malicious Powershell Brute Force Attack Spyware Supply Chain Attack Masquerade Attack Open Redirection Account Takeover Application Access Token Network Sniffing Shadow IT Insider Threat Meltdown & Spectre Attack Credential Dumping Ransomware Man-in- the- Middle Attack Phishing Payloads SQL Injection Spear Phishing Social Engineering Attack Typo Squatting Bill Fraud IoT Threats Pass the Hash Malware Privileged User Compromise Amazon WS Attacks Compromised Credentials Macro Viruses DNS Amplification Drive-by Download Attack DoS Attack Zero- Day Exploit Web Session Cookie Theft Simjacking Watering Hole Attack Crypto Jacking Attack Advanced Persistent Threat Cloud Cryptomining Whale Phishing Cross- Site Scripting Malicious Powershell Brute Force Attack Spyware Supply Chain Attack Masquerade Attack Open Redirection Account Takeover Application Access Token Network Sniffing Shadow IT Insider Threat Meltdown & Spectre Attack Credential Dumping Ransomware Man-in- the- Middle Attack Phishing Payloads SQL Injection Spear Phishing Social Engineering Attack Typo Squatting Bill Fraud IoT Threats Pass the Hash Malware Privileged User Compromise
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Amazon WS Attacks
Compromised Credentials
Macro Viruses
DNS Amplification
Drive-by Download Attack
DoS Attack
Zero-Day Exploit
Web Session Cookie Theft
Simjacking
Watering Hole Attack
Crypto Jacking Attack
Advanced Persistent Threat
Cloud Cryptomining
Whale Phishing
Cross-Site Scripting
Malicious Powershell
Brute Force Attack
Spyware
Supply Chain Attack
Masquerade Attack
Open Redirection
Account Takeover
Application Access Token
Network Sniffing
Shadow IT
Insider Threat
Meltdown & Spectre Attack
Credential Dumping
Ransomware
Man-in-the-Middle Attack
Phishing Payloads
SQL Injection
Spear Phishing
Social Engineering Attack
Typo Squatting
Bill Fraud
IoT Threats
Pass the Hash
Malware
Privileged User Compromise