MasqueradeAttackDrive-byDownloadAttackMalwareWhalePhishingDNSAmplificationSimjackingMeltdown& SpectreAttackCredentialDumpingSpearPhishingIoTThreatsSupplyChainAttackWateringHoleAttackWebSessionCookieTheftRansomwareMacroVirusesAdvancedPersistentThreatCloudCryptominingCross-SiteScriptingNetworkSniffingShadowITApplicationAccessTokenOpenRedirectionSpywareBruteForceAttackCompromisedCredentialsBillFraudDoSAttackSocialEngineeringAttackTypoSquattingPasstheHashPhishingPayloadsMaliciousPowershellCryptoJackingAttackAmazonWSAttacksSQLInjectionInsiderThreatZero-DayExploitPrivilegedUserCompromiseAccountTakeoverMan-in-the-MiddleAttackMasqueradeAttackDrive-byDownloadAttackMalwareWhalePhishingDNSAmplificationSimjackingMeltdown& SpectreAttackCredentialDumpingSpearPhishingIoTThreatsSupplyChainAttackWateringHoleAttackWebSessionCookieTheftRansomwareMacroVirusesAdvancedPersistentThreatCloudCryptominingCross-SiteScriptingNetworkSniffingShadowITApplicationAccessTokenOpenRedirectionSpywareBruteForceAttackCompromisedCredentialsBillFraudDoSAttackSocialEngineeringAttackTypoSquattingPasstheHashPhishingPayloadsMaliciousPowershellCryptoJackingAttackAmazonWSAttacksSQLInjectionInsiderThreatZero-DayExploitPrivilegedUserCompromiseAccountTakeoverMan-in-the-MiddleAttack

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Masquerade Attack
  2. Drive-by Download Attack
  3. Malware
  4. Whale Phishing
  5. DNS Amplification
  6. Simjacking
  7. Meltdown & Spectre Attack
  8. Credential Dumping
  9. Spear Phishing
  10. IoT Threats
  11. Supply Chain Attack
  12. Watering Hole Attack
  13. Web Session Cookie Theft
  14. Ransomware
  15. Macro Viruses
  16. Advanced Persistent Threat
  17. Cloud Cryptomining
  18. Cross-Site Scripting
  19. Network Sniffing
  20. Shadow IT
  21. Application Access Token
  22. Open Redirection
  23. Spyware
  24. Brute Force Attack
  25. Compromised Credentials
  26. Bill Fraud
  27. DoS Attack
  28. Social Engineering Attack
  29. Typo Squatting
  30. Pass the Hash
  31. Phishing Payloads
  32. Malicious Powershell
  33. Crypto Jacking Attack
  34. Amazon WS Attacks
  35. SQL Injection
  36. Insider Threat
  37. Zero-Day Exploit
  38. Privileged User Compromise
  39. Account Takeover
  40. Man-in-the-Middle Attack