MaliciousPowershellCompromisedCredentialsSQLInjectionDrive-byDownloadAttackSupplyChainAttackApplicationAccessTokenSocialEngineeringAttackMalwareOpenRedirectionCross-SiteScriptingRansomwareSpywareCloudCryptominingMacroVirusesWhalePhishingPrivilegedUserCompromiseAmazonWSAttacksDoSAttackZero-DayExploitAccountTakeoverSimjackingCredentialDumpingInsiderThreatMan-in-the-MiddleAttackMasqueradeAttackBruteForceAttackAdvancedPersistentThreatIoTThreatsShadowITBillFraudTypoSquattingWebSessionCookieTheftSpearPhishingDNSAmplificationMeltdown& SpectreAttackPhishingPayloadsCryptoJackingAttackPasstheHashWateringHoleAttackNetworkSniffingMaliciousPowershellCompromisedCredentialsSQLInjectionDrive-byDownloadAttackSupplyChainAttackApplicationAccessTokenSocialEngineeringAttackMalwareOpenRedirectionCross-SiteScriptingRansomwareSpywareCloudCryptominingMacroVirusesWhalePhishingPrivilegedUserCompromiseAmazonWSAttacksDoSAttackZero-DayExploitAccountTakeoverSimjackingCredentialDumpingInsiderThreatMan-in-the-MiddleAttackMasqueradeAttackBruteForceAttackAdvancedPersistentThreatIoTThreatsShadowITBillFraudTypoSquattingWebSessionCookieTheftSpearPhishingDNSAmplificationMeltdown& SpectreAttackPhishingPayloadsCryptoJackingAttackPasstheHashWateringHoleAttackNetworkSniffing

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Malicious Powershell
  2. Compromised Credentials
  3. SQL Injection
  4. Drive-by Download Attack
  5. Supply Chain Attack
  6. Application Access Token
  7. Social Engineering Attack
  8. Malware
  9. Open Redirection
  10. Cross-Site Scripting
  11. Ransomware
  12. Spyware
  13. Cloud Cryptomining
  14. Macro Viruses
  15. Whale Phishing
  16. Privileged User Compromise
  17. Amazon WS Attacks
  18. DoS Attack
  19. Zero-Day Exploit
  20. Account Takeover
  21. Simjacking
  22. Credential Dumping
  23. Insider Threat
  24. Man-in-the-Middle Attack
  25. Masquerade Attack
  26. Brute Force Attack
  27. Advanced Persistent Threat
  28. IoT Threats
  29. Shadow IT
  30. Bill Fraud
  31. Typo Squatting
  32. Web Session Cookie Theft
  33. Spear Phishing
  34. DNS Amplification
  35. Meltdown & Spectre Attack
  36. Phishing Payloads
  37. Crypto Jacking Attack
  38. Pass the Hash
  39. Watering Hole Attack
  40. Network Sniffing