Masquerade Attack Drive-by Download Attack Malware Whale Phishing DNS Amplification Simjacking Meltdown & Spectre Attack Credential Dumping Spear Phishing IoT Threats Supply Chain Attack Watering Hole Attack Web Session Cookie Theft Ransomware Macro Viruses Advanced Persistent Threat Cloud Cryptomining Cross- Site Scripting Network Sniffing Shadow IT Application Access Token Open Redirection Spyware Brute Force Attack Compromised Credentials Bill Fraud DoS Attack Social Engineering Attack Typo Squatting Pass the Hash Phishing Payloads Malicious Powershell Crypto Jacking Attack Amazon WS Attacks SQL Injection Insider Threat Zero- Day Exploit Privileged User Compromise Account Takeover Man-in- the- Middle Attack Masquerade Attack Drive-by Download Attack Malware Whale Phishing DNS Amplification Simjacking Meltdown & Spectre Attack Credential Dumping Spear Phishing IoT Threats Supply Chain Attack Watering Hole Attack Web Session Cookie Theft Ransomware Macro Viruses Advanced Persistent Threat Cloud Cryptomining Cross- Site Scripting Network Sniffing Shadow IT Application Access Token Open Redirection Spyware Brute Force Attack Compromised Credentials Bill Fraud DoS Attack Social Engineering Attack Typo Squatting Pass the Hash Phishing Payloads Malicious Powershell Crypto Jacking Attack Amazon WS Attacks SQL Injection Insider Threat Zero- Day Exploit Privileged User Compromise Account Takeover Man-in- the- Middle Attack
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Masquerade Attack
Drive-by Download Attack
Malware
Whale Phishing
DNS Amplification
Simjacking
Meltdown & Spectre Attack
Credential Dumping
Spear Phishing
IoT Threats
Supply Chain Attack
Watering Hole Attack
Web Session Cookie Theft
Ransomware
Macro Viruses
Advanced Persistent Threat
Cloud Cryptomining
Cross-Site Scripting
Network Sniffing
Shadow IT
Application Access Token
Open Redirection
Spyware
Brute Force Attack
Compromised Credentials
Bill Fraud
DoS Attack
Social Engineering Attack
Typo Squatting
Pass the Hash
Phishing Payloads
Malicious Powershell
Crypto Jacking Attack
Amazon WS Attacks
SQL Injection
Insider Threat
Zero-Day Exploit
Privileged User Compromise
Account Takeover
Man-in-the-Middle Attack