DNS Amplification Simjacking Meltdown & Spectre Attack Brute Force Attack Malware Man-in- the- Middle Attack Drive-by Download Attack Open Redirection Ransomware Network Sniffing SQL Injection Typo Squatting Masquerade Attack DoS Attack Phishing Payloads Macro Viruses Social Engineering Attack Supply Chain Attack Shadow IT Amazon WS Attacks Account Takeover Whale Phishing Malicious Powershell Crypto Jacking Attack Credential Dumping Insider Threat Cloud Cryptomining Watering Hole Attack Zero- Day Exploit Bill Fraud Privileged User Compromise Compromised Credentials Application Access Token Spyware IoT Threats Advanced Persistent Threat Web Session Cookie Theft Spear Phishing Cross- Site Scripting Pass the Hash DNS Amplification Simjacking Meltdown & Spectre Attack Brute Force Attack Malware Man-in- the- Middle Attack Drive-by Download Attack Open Redirection Ransomware Network Sniffing SQL Injection Typo Squatting Masquerade Attack DoS Attack Phishing Payloads Macro Viruses Social Engineering Attack Supply Chain Attack Shadow IT Amazon WS Attacks Account Takeover Whale Phishing Malicious Powershell Crypto Jacking Attack Credential Dumping Insider Threat Cloud Cryptomining Watering Hole Attack Zero- Day Exploit Bill Fraud Privileged User Compromise Compromised Credentials Application Access Token Spyware IoT Threats Advanced Persistent Threat Web Session Cookie Theft Spear Phishing Cross- Site Scripting Pass the Hash
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
DNS Amplification
Simjacking
Meltdown & Spectre Attack
Brute Force Attack
Malware
Man-in-the-Middle Attack
Drive-by Download Attack
Open Redirection
Ransomware
Network Sniffing
SQL Injection
Typo Squatting
Masquerade Attack
DoS Attack
Phishing Payloads
Macro Viruses
Social Engineering Attack
Supply Chain Attack
Shadow IT
Amazon WS Attacks
Account Takeover
Whale Phishing
Malicious Powershell
Crypto Jacking Attack
Credential Dumping
Insider Threat
Cloud Cryptomining
Watering Hole Attack
Zero-Day Exploit
Bill Fraud
Privileged User Compromise
Compromised Credentials
Application Access Token
Spyware
IoT Threats
Advanced Persistent Threat
Web Session Cookie Theft
Spear Phishing
Cross-Site Scripting
Pass the Hash