Simjacking Supply Chain Attack DNS Amplification Open Redirection Macro Viruses Advanced Persistent Threat Bill Fraud Typo Squatting Privileged User Compromise DoS Attack Malware Cloud Cryptomining Whale Phishing Amazon WS Attacks SQL Injection Shadow IT IoT Threats Masquerade Attack Crypto Jacking Attack Drive-by Download Attack Application Access Token Credential Dumping Zero- Day Exploit Pass the Hash Spear Phishing Brute Force Attack Spyware Phishing Payloads Web Session Cookie Theft Account Takeover Watering Hole Attack Meltdown & Spectre Attack Man-in- the- Middle Attack Ransomware Network Sniffing Insider Threat Social Engineering Attack Malicious Powershell Compromised Credentials Cross- Site Scripting Simjacking Supply Chain Attack DNS Amplification Open Redirection Macro Viruses Advanced Persistent Threat Bill Fraud Typo Squatting Privileged User Compromise DoS Attack Malware Cloud Cryptomining Whale Phishing Amazon WS Attacks SQL Injection Shadow IT IoT Threats Masquerade Attack Crypto Jacking Attack Drive-by Download Attack Application Access Token Credential Dumping Zero- Day Exploit Pass the Hash Spear Phishing Brute Force Attack Spyware Phishing Payloads Web Session Cookie Theft Account Takeover Watering Hole Attack Meltdown & Spectre Attack Man-in- the- Middle Attack Ransomware Network Sniffing Insider Threat Social Engineering Attack Malicious Powershell Compromised Credentials Cross- Site Scripting
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Simjacking
Supply Chain Attack
DNS Amplification
Open Redirection
Macro Viruses
Advanced Persistent Threat
Bill Fraud
Typo Squatting
Privileged User Compromise
DoS Attack
Malware
Cloud Cryptomining
Whale Phishing
Amazon WS Attacks
SQL Injection
Shadow IT
IoT Threats
Masquerade Attack
Crypto Jacking Attack
Drive-by Download Attack
Application Access Token
Credential Dumping
Zero-Day Exploit
Pass the Hash
Spear Phishing
Brute Force Attack
Spyware
Phishing Payloads
Web Session Cookie Theft
Account Takeover
Watering Hole Attack
Meltdown & Spectre Attack
Man-in-the-Middle Attack
Ransomware
Network Sniffing
Insider Threat
Social Engineering Attack
Malicious Powershell
Compromised Credentials
Cross-Site Scripting