Amazon WS Attacks Privileged User Compromise Advanced Persistent Threat Insider Threat Supply Chain Attack Watering Hole Attack Meltdown & Spectre Attack Malicious Powershell Bill Fraud Application Access Token Pass the Hash Man-in- the- Middle Attack Open Redirection IoT Threats Zero- Day Exploit Simjacking DoS Attack Macro Viruses Account Takeover Ransomware Brute Force Attack Cloud Cryptomining Crypto Jacking Attack Malware Spyware Network Sniffing Cross- Site Scripting DNS Amplification Compromised Credentials Whale Phishing Typo Squatting Drive-by Download Attack SQL Injection Phishing Payloads Shadow IT Masquerade Attack Social Engineering Attack Spear Phishing Web Session Cookie Theft Credential Dumping Amazon WS Attacks Privileged User Compromise Advanced Persistent Threat Insider Threat Supply Chain Attack Watering Hole Attack Meltdown & Spectre Attack Malicious Powershell Bill Fraud Application Access Token Pass the Hash Man-in- the- Middle Attack Open Redirection IoT Threats Zero- Day Exploit Simjacking DoS Attack Macro Viruses Account Takeover Ransomware Brute Force Attack Cloud Cryptomining Crypto Jacking Attack Malware Spyware Network Sniffing Cross- Site Scripting DNS Amplification Compromised Credentials Whale Phishing Typo Squatting Drive-by Download Attack SQL Injection Phishing Payloads Shadow IT Masquerade Attack Social Engineering Attack Spear Phishing Web Session Cookie Theft Credential Dumping
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Amazon WS Attacks
Privileged User Compromise
Advanced Persistent Threat
Insider Threat
Supply Chain Attack
Watering Hole Attack
Meltdown & Spectre Attack
Malicious Powershell
Bill Fraud
Application Access Token
Pass the Hash
Man-in-the-Middle Attack
Open Redirection
IoT Threats
Zero-Day Exploit
Simjacking
DoS Attack
Macro Viruses
Account Takeover
Ransomware
Brute Force Attack
Cloud Cryptomining
Crypto Jacking Attack
Malware
Spyware
Network Sniffing
Cross-Site Scripting
DNS Amplification
Compromised Credentials
Whale Phishing
Typo Squatting
Drive-by Download Attack
SQL Injection
Phishing Payloads
Shadow IT
Masquerade Attack
Social Engineering Attack
Spear Phishing
Web Session Cookie Theft
Credential Dumping