SQL Injection Compromised Credentials Open Redirection Application Access Token Simjacking Spear Phishing Shadow IT IoT Threats Account Takeover Spyware Brute Force Attack Phishing Payloads Network Sniffing Credential Dumping Pass the Hash Meltdown & Spectre Attack Cross- Site Scripting Typo Squatting Drive-by Download Attack DNS Amplification Whale Phishing Masquerade Attack Zero- Day Exploit Supply Chain Attack Ransomware Bill Fraud Malware Man-in- the- Middle Attack Social Engineering Attack DoS Attack Watering Hole Attack Privileged User Compromise Amazon WS Attacks Cloud Cryptomining Advanced Persistent Threat Malicious Powershell Web Session Cookie Theft Insider Threat Crypto Jacking Attack Macro Viruses SQL Injection Compromised Credentials Open Redirection Application Access Token Simjacking Spear Phishing Shadow IT IoT Threats Account Takeover Spyware Brute Force Attack Phishing Payloads Network Sniffing Credential Dumping Pass the Hash Meltdown & Spectre Attack Cross- Site Scripting Typo Squatting Drive-by Download Attack DNS Amplification Whale Phishing Masquerade Attack Zero- Day Exploit Supply Chain Attack Ransomware Bill Fraud Malware Man-in- the- Middle Attack Social Engineering Attack DoS Attack Watering Hole Attack Privileged User Compromise Amazon WS Attacks Cloud Cryptomining Advanced Persistent Threat Malicious Powershell Web Session Cookie Theft Insider Threat Crypto Jacking Attack Macro Viruses
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
SQL Injection
Compromised Credentials
Open Redirection
Application Access Token
Simjacking
Spear Phishing
Shadow IT
IoT Threats
Account Takeover
Spyware
Brute Force Attack
Phishing Payloads
Network Sniffing
Credential Dumping
Pass the Hash
Meltdown & Spectre Attack
Cross-Site Scripting
Typo Squatting
Drive-by Download Attack
DNS Amplification
Whale Phishing
Masquerade Attack
Zero-Day Exploit
Supply Chain Attack
Ransomware
Bill Fraud
Malware
Man-in-the-Middle Attack
Social Engineering Attack
DoS Attack
Watering Hole Attack
Privileged User Compromise
Amazon WS Attacks
Cloud Cryptomining
Advanced Persistent Threat
Malicious Powershell
Web Session Cookie Theft
Insider Threat
Crypto Jacking Attack
Macro Viruses