Pass the Hash Macro Viruses Man-in- the- Middle Attack Masquerade Attack SQL Injection Zero- Day Exploit Advanced Persistent Threat Drive-by Download Attack Amazon WS Attacks Typo Squatting DoS Attack Shadow IT Malware Cloud Cryptomining Privileged User Compromise Spear Phishing Whale Phishing Spyware Bill Fraud Social Engineering Attack Ransomware Insider Threat Crypto Jacking Attack Cross- Site Scripting Credential Dumping Brute Force Attack Open Redirection Application Access Token Phishing Payloads Watering Hole Attack Meltdown & Spectre Attack Simjacking Network Sniffing DNS Amplification Compromised Credentials Supply Chain Attack Account Takeover Malicious Powershell Web Session Cookie Theft IoT Threats Pass the Hash Macro Viruses Man-in- the- Middle Attack Masquerade Attack SQL Injection Zero- Day Exploit Advanced Persistent Threat Drive-by Download Attack Amazon WS Attacks Typo Squatting DoS Attack Shadow IT Malware Cloud Cryptomining Privileged User Compromise Spear Phishing Whale Phishing Spyware Bill Fraud Social Engineering Attack Ransomware Insider Threat Crypto Jacking Attack Cross- Site Scripting Credential Dumping Brute Force Attack Open Redirection Application Access Token Phishing Payloads Watering Hole Attack Meltdown & Spectre Attack Simjacking Network Sniffing DNS Amplification Compromised Credentials Supply Chain Attack Account Takeover Malicious Powershell Web Session Cookie Theft IoT Threats
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Pass the Hash
Macro Viruses
Man-in-the-Middle Attack
Masquerade Attack
SQL Injection
Zero-Day Exploit
Advanced Persistent Threat
Drive-by Download Attack
Amazon WS Attacks
Typo Squatting
DoS Attack
Shadow IT
Malware
Cloud Cryptomining
Privileged User Compromise
Spear Phishing
Whale Phishing
Spyware
Bill Fraud
Social Engineering Attack
Ransomware
Insider Threat
Crypto Jacking Attack
Cross-Site Scripting
Credential Dumping
Brute Force Attack
Open Redirection
Application Access Token
Phishing Payloads
Watering Hole Attack
Meltdown & Spectre Attack
Simjacking
Network Sniffing
DNS Amplification
Compromised Credentials
Supply Chain Attack
Account Takeover
Malicious Powershell
Web Session Cookie Theft
IoT Threats