Zero- Day Exploit Amazon WS Attacks Pass the Hash Advanced Persistent Threat Meltdown & Spectre Attack Shadow IT Malicious Powershell Simjacking Spyware Network Sniffing DoS Attack Credential Dumping Compromised Credentials Bill Fraud Account Takeover Cross- Site Scripting Drive-by Download Attack Supply Chain Attack Watering Hole Attack Whale Phishing Macro Viruses Social Engineering Attack Ransomware Privileged User Compromise Masquerade Attack Phishing Payloads Crypto Jacking Attack Web Session Cookie Theft Malware Typo Squatting DNS Amplification Application Access Token SQL Injection Open Redirection Cloud Cryptomining Brute Force Attack Insider Threat Man-in- the- Middle Attack IoT Threats Spear Phishing Zero- Day Exploit Amazon WS Attacks Pass the Hash Advanced Persistent Threat Meltdown & Spectre Attack Shadow IT Malicious Powershell Simjacking Spyware Network Sniffing DoS Attack Credential Dumping Compromised Credentials Bill Fraud Account Takeover Cross- Site Scripting Drive-by Download Attack Supply Chain Attack Watering Hole Attack Whale Phishing Macro Viruses Social Engineering Attack Ransomware Privileged User Compromise Masquerade Attack Phishing Payloads Crypto Jacking Attack Web Session Cookie Theft Malware Typo Squatting DNS Amplification Application Access Token SQL Injection Open Redirection Cloud Cryptomining Brute Force Attack Insider Threat Man-in- the- Middle Attack IoT Threats Spear Phishing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Zero-Day Exploit
Amazon WS Attacks
Pass the Hash
Advanced Persistent Threat
Meltdown & Spectre Attack
Shadow IT
Malicious Powershell
Simjacking
Spyware
Network Sniffing
DoS Attack
Credential Dumping
Compromised Credentials
Bill Fraud
Account Takeover
Cross-Site Scripting
Drive-by Download Attack
Supply Chain Attack
Watering Hole Attack
Whale Phishing
Macro Viruses
Social Engineering Attack
Ransomware
Privileged User Compromise
Masquerade Attack
Phishing Payloads
Crypto Jacking Attack
Web Session Cookie Theft
Malware
Typo Squatting
DNS Amplification
Application Access Token
SQL Injection
Open Redirection
Cloud Cryptomining
Brute Force Attack
Insider Threat
Man-in-the-Middle Attack
IoT Threats
Spear Phishing