Cross- Site Scripting DNS Amplification Network Sniffing Compromised Credentials Meltdown & Spectre Attack IoT Threats Simjacking Crypto Jacking Attack Spear Phishing Masquerade Attack Bill Fraud Account Takeover Whale Phishing Credential Dumping Malicious Powershell Man-in- the- Middle Attack Zero- Day Exploit Watering Hole Attack Web Session Cookie Theft Typo Squatting Supply Chain Attack Insider Threat Privileged User Compromise Malware Social Engineering Attack Pass the Hash Brute Force Attack Phishing Payloads Application Access Token Open Redirection SQL Injection Macro Viruses DoS Attack Amazon WS Attacks Shadow IT Ransomware Drive-by Download Attack Spyware Advanced Persistent Threat Cloud Cryptomining Cross- Site Scripting DNS Amplification Network Sniffing Compromised Credentials Meltdown & Spectre Attack IoT Threats Simjacking Crypto Jacking Attack Spear Phishing Masquerade Attack Bill Fraud Account Takeover Whale Phishing Credential Dumping Malicious Powershell Man-in- the- Middle Attack Zero- Day Exploit Watering Hole Attack Web Session Cookie Theft Typo Squatting Supply Chain Attack Insider Threat Privileged User Compromise Malware Social Engineering Attack Pass the Hash Brute Force Attack Phishing Payloads Application Access Token Open Redirection SQL Injection Macro Viruses DoS Attack Amazon WS Attacks Shadow IT Ransomware Drive-by Download Attack Spyware Advanced Persistent Threat Cloud Cryptomining
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Cross-Site Scripting
DNS Amplification
Network Sniffing
Compromised Credentials
Meltdown & Spectre Attack
IoT Threats
Simjacking
Crypto Jacking Attack
Spear Phishing
Masquerade Attack
Bill Fraud
Account Takeover
Whale Phishing
Credential Dumping
Malicious Powershell
Man-in-the-Middle Attack
Zero-Day Exploit
Watering Hole Attack
Web Session Cookie Theft
Typo Squatting
Supply Chain Attack
Insider Threat
Privileged User Compromise
Malware
Social Engineering Attack
Pass the Hash
Brute Force Attack
Phishing Payloads
Application Access Token
Open Redirection
SQL Injection
Macro Viruses
DoS Attack
Amazon WS Attacks
Shadow IT
Ransomware
Drive-by Download Attack
Spyware
Advanced Persistent Threat
Cloud Cryptomining