TypoSquattingSpearPhishingIoTThreatsAmazonWSAttacksPrivilegedUserCompromisePhishingPayloadsRansomwareBruteForceAttackCryptoJackingAttackCloudCryptominingDNSAmplificationDoSAttackMasqueradeAttackSQLInjectionSupplyChainAttackMaliciousPowershellMan-in-the-MiddleAttackAdvancedPersistentThreatMacroVirusesSpywareShadowITInsiderThreatCompromisedCredentialsSocialEngineeringAttackPasstheHashAccountTakeoverWebSessionCookieTheftCross-SiteScriptingMalwareWhalePhishingMeltdown& SpectreAttackWateringHoleAttackCredentialDumpingBillFraudNetworkSniffingSimjackingZero-DayExploitOpenRedirectionDrive-byDownloadAttackApplicationAccessTokenTypoSquattingSpearPhishingIoTThreatsAmazonWSAttacksPrivilegedUserCompromisePhishingPayloadsRansomwareBruteForceAttackCryptoJackingAttackCloudCryptominingDNSAmplificationDoSAttackMasqueradeAttackSQLInjectionSupplyChainAttackMaliciousPowershellMan-in-the-MiddleAttackAdvancedPersistentThreatMacroVirusesSpywareShadowITInsiderThreatCompromisedCredentialsSocialEngineeringAttackPasstheHashAccountTakeoverWebSessionCookieTheftCross-SiteScriptingMalwareWhalePhishingMeltdown& SpectreAttackWateringHoleAttackCredentialDumpingBillFraudNetworkSniffingSimjackingZero-DayExploitOpenRedirectionDrive-byDownloadAttackApplicationAccessToken

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Typo Squatting
  2. Spear Phishing
  3. IoT Threats
  4. Amazon WS Attacks
  5. Privileged User Compromise
  6. Phishing Payloads
  7. Ransomware
  8. Brute Force Attack
  9. Crypto Jacking Attack
  10. Cloud Cryptomining
  11. DNS Amplification
  12. DoS Attack
  13. Masquerade Attack
  14. SQL Injection
  15. Supply Chain Attack
  16. Malicious Powershell
  17. Man-in-the-Middle Attack
  18. Advanced Persistent Threat
  19. Macro Viruses
  20. Spyware
  21. Shadow IT
  22. Insider Threat
  23. Compromised Credentials
  24. Social Engineering Attack
  25. Pass the Hash
  26. Account Takeover
  27. Web Session Cookie Theft
  28. Cross-Site Scripting
  29. Malware
  30. Whale Phishing
  31. Meltdown & Spectre Attack
  32. Watering Hole Attack
  33. Credential Dumping
  34. Bill Fraud
  35. Network Sniffing
  36. Simjacking
  37. Zero-Day Exploit
  38. Open Redirection
  39. Drive-by Download Attack
  40. Application Access Token