WhalePhishingDrive-byDownloadAttackMan-in-the-MiddleAttackPhishingPayloadsCryptoJackingAttackSQLInjectionZero-DayExploitWebSessionCookieTheftCompromisedCredentialsDoSAttackMaliciousPowershellBillFraudShadowITPasstheHashPrivilegedUserCompromiseAmazonWSAttacksNetworkSniffingSimjackingBruteForceAttackApplicationAccessTokenSupplyChainAttackCross-SiteScriptingOpenRedirectionSpywareMalwareRansomwareCloudCryptominingMeltdown& SpectreAttackSpearPhishingAccountTakeoverIoTThreatsMacroVirusesMasqueradeAttackDNSAmplificationSocialEngineeringAttackAdvancedPersistentThreatTypoSquattingWateringHoleAttackCredentialDumpingInsiderThreatWhalePhishingDrive-byDownloadAttackMan-in-the-MiddleAttackPhishingPayloadsCryptoJackingAttackSQLInjectionZero-DayExploitWebSessionCookieTheftCompromisedCredentialsDoSAttackMaliciousPowershellBillFraudShadowITPasstheHashPrivilegedUserCompromiseAmazonWSAttacksNetworkSniffingSimjackingBruteForceAttackApplicationAccessTokenSupplyChainAttackCross-SiteScriptingOpenRedirectionSpywareMalwareRansomwareCloudCryptominingMeltdown& SpectreAttackSpearPhishingAccountTakeoverIoTThreatsMacroVirusesMasqueradeAttackDNSAmplificationSocialEngineeringAttackAdvancedPersistentThreatTypoSquattingWateringHoleAttackCredentialDumpingInsiderThreat

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Whale Phishing
  2. Drive-by Download Attack
  3. Man-in-the-Middle Attack
  4. Phishing Payloads
  5. Crypto Jacking Attack
  6. SQL Injection
  7. Zero-Day Exploit
  8. Web Session Cookie Theft
  9. Compromised Credentials
  10. DoS Attack
  11. Malicious Powershell
  12. Bill Fraud
  13. Shadow IT
  14. Pass the Hash
  15. Privileged User Compromise
  16. Amazon WS Attacks
  17. Network Sniffing
  18. Simjacking
  19. Brute Force Attack
  20. Application Access Token
  21. Supply Chain Attack
  22. Cross-Site Scripting
  23. Open Redirection
  24. Spyware
  25. Malware
  26. Ransomware
  27. Cloud Cryptomining
  28. Meltdown & Spectre Attack
  29. Spear Phishing
  30. Account Takeover
  31. IoT Threats
  32. Macro Viruses
  33. Masquerade Attack
  34. DNS Amplification
  35. Social Engineering Attack
  36. Advanced Persistent Threat
  37. Typo Squatting
  38. Watering Hole Attack
  39. Credential Dumping
  40. Insider Threat