AmazonWSAttacksPrivilegedUserCompromiseAdvancedPersistentThreatInsiderThreatSupplyChainAttackWateringHoleAttackMeltdown& SpectreAttackMaliciousPowershellBillFraudApplicationAccessTokenPasstheHashMan-in-the-MiddleAttackOpenRedirectionIoTThreatsZero-DayExploitSimjackingDoSAttackMacroVirusesAccountTakeoverRansomwareBruteForceAttackCloudCryptominingCryptoJackingAttackMalwareSpywareNetworkSniffingCross-SiteScriptingDNSAmplificationCompromisedCredentialsWhalePhishingTypoSquattingDrive-byDownloadAttackSQLInjectionPhishingPayloadsShadowITMasqueradeAttackSocialEngineeringAttackSpearPhishingWebSessionCookieTheftCredentialDumpingAmazonWSAttacksPrivilegedUserCompromiseAdvancedPersistentThreatInsiderThreatSupplyChainAttackWateringHoleAttackMeltdown& SpectreAttackMaliciousPowershellBillFraudApplicationAccessTokenPasstheHashMan-in-the-MiddleAttackOpenRedirectionIoTThreatsZero-DayExploitSimjackingDoSAttackMacroVirusesAccountTakeoverRansomwareBruteForceAttackCloudCryptominingCryptoJackingAttackMalwareSpywareNetworkSniffingCross-SiteScriptingDNSAmplificationCompromisedCredentialsWhalePhishingTypoSquattingDrive-byDownloadAttackSQLInjectionPhishingPayloadsShadowITMasqueradeAttackSocialEngineeringAttackSpearPhishingWebSessionCookieTheftCredentialDumping

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Amazon WS Attacks
  2. Privileged User Compromise
  3. Advanced Persistent Threat
  4. Insider Threat
  5. Supply Chain Attack
  6. Watering Hole Attack
  7. Meltdown & Spectre Attack
  8. Malicious Powershell
  9. Bill Fraud
  10. Application Access Token
  11. Pass the Hash
  12. Man-in-the-Middle Attack
  13. Open Redirection
  14. IoT Threats
  15. Zero-Day Exploit
  16. Simjacking
  17. DoS Attack
  18. Macro Viruses
  19. Account Takeover
  20. Ransomware
  21. Brute Force Attack
  22. Cloud Cryptomining
  23. Crypto Jacking Attack
  24. Malware
  25. Spyware
  26. Network Sniffing
  27. Cross-Site Scripting
  28. DNS Amplification
  29. Compromised Credentials
  30. Whale Phishing
  31. Typo Squatting
  32. Drive-by Download Attack
  33. SQL Injection
  34. Phishing Payloads
  35. Shadow IT
  36. Masquerade Attack
  37. Social Engineering Attack
  38. Spear Phishing
  39. Web Session Cookie Theft
  40. Credential Dumping