Meltdown & Spectre Attack Bill Fraud Shadow IT Malicious Powershell Amazon WS Attacks Social Engineering Attack Zero- Day Exploit Compromised Credentials Insider Threat Spear Phishing Advanced Persistent Threat Spyware Phishing Payloads Malware Credential Dumping Pass the Hash Open Redirection Brute Force Attack Account Takeover Typo Squatting Cross- Site Scripting Masquerade Attack Man-in- the- Middle Attack Supply Chain Attack Drive-by Download Attack Privileged User Compromise Whale Phishing Cloud Cryptomining DoS Attack Application Access Token Crypto Jacking Attack IoT Threats SQL Injection Web Session Cookie Theft Ransomware DNS Amplification Macro Viruses Simjacking Network Sniffing Watering Hole Attack Meltdown & Spectre Attack Bill Fraud Shadow IT Malicious Powershell Amazon WS Attacks Social Engineering Attack Zero- Day Exploit Compromised Credentials Insider Threat Spear Phishing Advanced Persistent Threat Spyware Phishing Payloads Malware Credential Dumping Pass the Hash Open Redirection Brute Force Attack Account Takeover Typo Squatting Cross- Site Scripting Masquerade Attack Man-in- the- Middle Attack Supply Chain Attack Drive-by Download Attack Privileged User Compromise Whale Phishing Cloud Cryptomining DoS Attack Application Access Token Crypto Jacking Attack IoT Threats SQL Injection Web Session Cookie Theft Ransomware DNS Amplification Macro Viruses Simjacking Network Sniffing Watering Hole Attack
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Meltdown & Spectre Attack
Bill Fraud
Shadow IT
Malicious Powershell
Amazon WS Attacks
Social Engineering Attack
Zero-Day Exploit
Compromised Credentials
Insider Threat
Spear Phishing
Advanced Persistent Threat
Spyware
Phishing Payloads
Malware
Credential Dumping
Pass the Hash
Open Redirection
Brute Force Attack
Account Takeover
Typo Squatting
Cross-Site Scripting
Masquerade Attack
Man-in-the-Middle Attack
Supply Chain Attack
Drive-by Download Attack
Privileged User Compromise
Whale Phishing
Cloud Cryptomining
DoS Attack
Application Access Token
Crypto Jacking Attack
IoT Threats
SQL Injection
Web Session Cookie Theft
Ransomware
DNS Amplification
Macro Viruses
Simjacking
Network Sniffing
Watering Hole Attack