SimjackingSupplyChainAttackDNSAmplificationOpenRedirectionMacroVirusesAdvancedPersistentThreatBillFraudTypoSquattingPrivilegedUserCompromiseDoSAttackMalwareCloudCryptominingWhalePhishingAmazonWSAttacksSQLInjectionShadowITIoTThreatsMasqueradeAttackCryptoJackingAttackDrive-byDownloadAttackApplicationAccessTokenCredentialDumpingZero-DayExploitPasstheHashSpearPhishingBruteForceAttackSpywarePhishingPayloadsWebSessionCookieTheftAccountTakeoverWateringHoleAttackMeltdown& SpectreAttackMan-in-the-MiddleAttackRansomwareNetworkSniffingInsiderThreatSocialEngineeringAttackMaliciousPowershellCompromisedCredentialsCross-SiteScriptingSimjackingSupplyChainAttackDNSAmplificationOpenRedirectionMacroVirusesAdvancedPersistentThreatBillFraudTypoSquattingPrivilegedUserCompromiseDoSAttackMalwareCloudCryptominingWhalePhishingAmazonWSAttacksSQLInjectionShadowITIoTThreatsMasqueradeAttackCryptoJackingAttackDrive-byDownloadAttackApplicationAccessTokenCredentialDumpingZero-DayExploitPasstheHashSpearPhishingBruteForceAttackSpywarePhishingPayloadsWebSessionCookieTheftAccountTakeoverWateringHoleAttackMeltdown& SpectreAttackMan-in-the-MiddleAttackRansomwareNetworkSniffingInsiderThreatSocialEngineeringAttackMaliciousPowershellCompromisedCredentialsCross-SiteScripting

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Simjacking
  2. Supply Chain Attack
  3. DNS Amplification
  4. Open Redirection
  5. Macro Viruses
  6. Advanced Persistent Threat
  7. Bill Fraud
  8. Typo Squatting
  9. Privileged User Compromise
  10. DoS Attack
  11. Malware
  12. Cloud Cryptomining
  13. Whale Phishing
  14. Amazon WS Attacks
  15. SQL Injection
  16. Shadow IT
  17. IoT Threats
  18. Masquerade Attack
  19. Crypto Jacking Attack
  20. Drive-by Download Attack
  21. Application Access Token
  22. Credential Dumping
  23. Zero-Day Exploit
  24. Pass the Hash
  25. Spear Phishing
  26. Brute Force Attack
  27. Spyware
  28. Phishing Payloads
  29. Web Session Cookie Theft
  30. Account Takeover
  31. Watering Hole Attack
  32. Meltdown & Spectre Attack
  33. Man-in-the-Middle Attack
  34. Ransomware
  35. Network Sniffing
  36. Insider Threat
  37. Social Engineering Attack
  38. Malicious Powershell
  39. Compromised Credentials
  40. Cross-Site Scripting