Whale Phishing Malicious Powershell Macro Viruses Ransomware Web Session Cookie Theft Pass the Hash Social Engineering Attack Crypto Jacking Attack Cloud Cryptomining IoT Threats Advanced Persistent Threat Simjacking DoS Attack Phishing Payloads Bill Fraud Shadow IT DNS Amplification Brute Force Attack Drive-by Download Attack Typo Squatting Spear Phishing Account Takeover Privileged User Compromise Watering Hole Attack SQL Injection Amazon WS Attacks Masquerade Attack Insider Threat Spyware Supply Chain Attack Malware Network Sniffing Meltdown & Spectre Attack Open Redirection Zero- Day Exploit Application Access Token Cross- Site Scripting Credential Dumping Man-in- the- Middle Attack Compromised Credentials Whale Phishing Malicious Powershell Macro Viruses Ransomware Web Session Cookie Theft Pass the Hash Social Engineering Attack Crypto Jacking Attack Cloud Cryptomining IoT Threats Advanced Persistent Threat Simjacking DoS Attack Phishing Payloads Bill Fraud Shadow IT DNS Amplification Brute Force Attack Drive-by Download Attack Typo Squatting Spear Phishing Account Takeover Privileged User Compromise Watering Hole Attack SQL Injection Amazon WS Attacks Masquerade Attack Insider Threat Spyware Supply Chain Attack Malware Network Sniffing Meltdown & Spectre Attack Open Redirection Zero- Day Exploit Application Access Token Cross- Site Scripting Credential Dumping Man-in- the- Middle Attack Compromised Credentials
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Whale Phishing
Malicious Powershell
Macro Viruses
Ransomware
Web Session Cookie Theft
Pass the Hash
Social Engineering Attack
Crypto Jacking Attack
Cloud Cryptomining
IoT Threats
Advanced Persistent Threat
Simjacking
DoS Attack
Phishing Payloads
Bill Fraud
Shadow IT
DNS Amplification
Brute Force Attack
Drive-by Download Attack
Typo Squatting
Spear Phishing
Account Takeover
Privileged User Compromise
Watering Hole Attack
SQL Injection
Amazon WS Attacks
Masquerade Attack
Insider Threat
Spyware
Supply Chain Attack
Malware
Network Sniffing
Meltdown & Spectre Attack
Open Redirection
Zero-Day Exploit
Application Access Token
Cross-Site Scripting
Credential Dumping
Man-in-the-Middle Attack
Compromised Credentials