AccountTakeoverSupplyChainAttackTypoSquattingMacroVirusesDrive-byDownloadAttackCloudCryptominingBillFraudMaliciousPowershellIoTThreatsApplicationAccessTokenWhalePhishingCompromisedCredentialsSpywareCross-SiteScriptingAdvancedPersistentThreatSimjackingWateringHoleAttackAmazonWSAttacksPhishingPayloadsPrivilegedUserCompromiseZero-DayExploitMeltdown& SpectreAttackMan-in-the-MiddleAttackShadowITSocialEngineeringAttackInsiderThreatSpearPhishingBruteForceAttackDNSAmplificationMalwareMasqueradeAttackNetworkSniffingOpenRedirectionCryptoJackingAttackPasstheHashWebSessionCookieTheftCredentialDumpingSQLInjectionDoSAttackRansomwareAccountTakeoverSupplyChainAttackTypoSquattingMacroVirusesDrive-byDownloadAttackCloudCryptominingBillFraudMaliciousPowershellIoTThreatsApplicationAccessTokenWhalePhishingCompromisedCredentialsSpywareCross-SiteScriptingAdvancedPersistentThreatSimjackingWateringHoleAttackAmazonWSAttacksPhishingPayloadsPrivilegedUserCompromiseZero-DayExploitMeltdown& SpectreAttackMan-in-the-MiddleAttackShadowITSocialEngineeringAttackInsiderThreatSpearPhishingBruteForceAttackDNSAmplificationMalwareMasqueradeAttackNetworkSniffingOpenRedirectionCryptoJackingAttackPasstheHashWebSessionCookieTheftCredentialDumpingSQLInjectionDoSAttackRansomware

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Account Takeover
  2. Supply Chain Attack
  3. Typo Squatting
  4. Macro Viruses
  5. Drive-by Download Attack
  6. Cloud Cryptomining
  7. Bill Fraud
  8. Malicious Powershell
  9. IoT Threats
  10. Application Access Token
  11. Whale Phishing
  12. Compromised Credentials
  13. Spyware
  14. Cross-Site Scripting
  15. Advanced Persistent Threat
  16. Simjacking
  17. Watering Hole Attack
  18. Amazon WS Attacks
  19. Phishing Payloads
  20. Privileged User Compromise
  21. Zero-Day Exploit
  22. Meltdown & Spectre Attack
  23. Man-in-the-Middle Attack
  24. Shadow IT
  25. Social Engineering Attack
  26. Insider Threat
  27. Spear Phishing
  28. Brute Force Attack
  29. DNS Amplification
  30. Malware
  31. Masquerade Attack
  32. Network Sniffing
  33. Open Redirection
  34. Crypto Jacking Attack
  35. Pass the Hash
  36. Web Session Cookie Theft
  37. Credential Dumping
  38. SQL Injection
  39. DoS Attack
  40. Ransomware