Advanced Persistent Threat Cloud Cryptomining Watering Hole Attack Typo Squatting DoS Attack Shadow IT Amazon WS Attacks Insider Threat Macro Viruses Ransomware Account Takeover Social Engineering Attack Malware Meltdown & Spectre Attack Supply Chain Attack Cross- Site Scripting Application Access Token Simjacking Web Session Cookie Theft Drive-by Download Attack SQL Injection Whale Phishing Brute Force Attack Open Redirection Masquerade Attack Spear Phishing Privileged User Compromise Phishing Payloads Spyware Credential Dumping Compromised Credentials DNS Amplification Pass the Hash Crypto Jacking Attack Network Sniffing Man-in- the- Middle Attack IoT Threats Malicious Powershell Zero- Day Exploit Bill Fraud Advanced Persistent Threat Cloud Cryptomining Watering Hole Attack Typo Squatting DoS Attack Shadow IT Amazon WS Attacks Insider Threat Macro Viruses Ransomware Account Takeover Social Engineering Attack Malware Meltdown & Spectre Attack Supply Chain Attack Cross- Site Scripting Application Access Token Simjacking Web Session Cookie Theft Drive-by Download Attack SQL Injection Whale Phishing Brute Force Attack Open Redirection Masquerade Attack Spear Phishing Privileged User Compromise Phishing Payloads Spyware Credential Dumping Compromised Credentials DNS Amplification Pass the Hash Crypto Jacking Attack Network Sniffing Man-in- the- Middle Attack IoT Threats Malicious Powershell Zero- Day Exploit Bill Fraud
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Advanced Persistent Threat
Cloud Cryptomining
Watering Hole Attack
Typo Squatting
DoS Attack
Shadow IT
Amazon WS Attacks
Insider Threat
Macro Viruses
Ransomware
Account Takeover
Social Engineering Attack
Malware
Meltdown & Spectre Attack
Supply Chain Attack
Cross-Site Scripting
Application Access Token
Simjacking
Web Session Cookie Theft
Drive-by Download Attack
SQL Injection
Whale Phishing
Brute Force Attack
Open Redirection
Masquerade Attack
Spear Phishing
Privileged User Compromise
Phishing Payloads
Spyware
Credential Dumping
Compromised Credentials
DNS Amplification
Pass the Hash
Crypto Jacking Attack
Network Sniffing
Man-in-the-Middle Attack
IoT Threats
Malicious Powershell
Zero-Day Exploit
Bill Fraud