DNSAmplificationSimjackingMeltdown& SpectreAttackBruteForceAttackMalwareMan-in-the-MiddleAttackDrive-byDownloadAttackOpenRedirectionRansomwareNetworkSniffingSQLInjectionTypoSquattingMasqueradeAttackDoSAttackPhishingPayloadsMacroVirusesSocialEngineeringAttackSupplyChainAttackShadowITAmazonWSAttacksAccountTakeoverWhalePhishingMaliciousPowershellCryptoJackingAttackCredentialDumpingInsiderThreatCloudCryptominingWateringHoleAttackZero-DayExploitBillFraudPrivilegedUserCompromiseCompromisedCredentialsApplicationAccessTokenSpywareIoTThreatsAdvancedPersistentThreatWebSessionCookieTheftSpearPhishingCross-SiteScriptingPasstheHashDNSAmplificationSimjackingMeltdown& SpectreAttackBruteForceAttackMalwareMan-in-the-MiddleAttackDrive-byDownloadAttackOpenRedirectionRansomwareNetworkSniffingSQLInjectionTypoSquattingMasqueradeAttackDoSAttackPhishingPayloadsMacroVirusesSocialEngineeringAttackSupplyChainAttackShadowITAmazonWSAttacksAccountTakeoverWhalePhishingMaliciousPowershellCryptoJackingAttackCredentialDumpingInsiderThreatCloudCryptominingWateringHoleAttackZero-DayExploitBillFraudPrivilegedUserCompromiseCompromisedCredentialsApplicationAccessTokenSpywareIoTThreatsAdvancedPersistentThreatWebSessionCookieTheftSpearPhishingCross-SiteScriptingPasstheHash

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. DNS Amplification
  2. Simjacking
  3. Meltdown & Spectre Attack
  4. Brute Force Attack
  5. Malware
  6. Man-in-the-Middle Attack
  7. Drive-by Download Attack
  8. Open Redirection
  9. Ransomware
  10. Network Sniffing
  11. SQL Injection
  12. Typo Squatting
  13. Masquerade Attack
  14. DoS Attack
  15. Phishing Payloads
  16. Macro Viruses
  17. Social Engineering Attack
  18. Supply Chain Attack
  19. Shadow IT
  20. Amazon WS Attacks
  21. Account Takeover
  22. Whale Phishing
  23. Malicious Powershell
  24. Crypto Jacking Attack
  25. Credential Dumping
  26. Insider Threat
  27. Cloud Cryptomining
  28. Watering Hole Attack
  29. Zero-Day Exploit
  30. Bill Fraud
  31. Privileged User Compromise
  32. Compromised Credentials
  33. Application Access Token
  34. Spyware
  35. IoT Threats
  36. Advanced Persistent Threat
  37. Web Session Cookie Theft
  38. Spear Phishing
  39. Cross-Site Scripting
  40. Pass the Hash