Whale Phishing Drive-by Download Attack Man-in- the- Middle Attack Phishing Payloads Crypto Jacking Attack SQL Injection Zero- Day Exploit Web Session Cookie Theft Compromised Credentials DoS Attack Malicious Powershell Bill Fraud Shadow IT Pass the Hash Privileged User Compromise Amazon WS Attacks Network Sniffing Simjacking Brute Force Attack Application Access Token Supply Chain Attack Cross- Site Scripting Open Redirection Spyware Malware Ransomware Cloud Cryptomining Meltdown & Spectre Attack Spear Phishing Account Takeover IoT Threats Macro Viruses Masquerade Attack DNS Amplification Social Engineering Attack Advanced Persistent Threat Typo Squatting Watering Hole Attack Credential Dumping Insider Threat Whale Phishing Drive-by Download Attack Man-in- the- Middle Attack Phishing Payloads Crypto Jacking Attack SQL Injection Zero- Day Exploit Web Session Cookie Theft Compromised Credentials DoS Attack Malicious Powershell Bill Fraud Shadow IT Pass the Hash Privileged User Compromise Amazon WS Attacks Network Sniffing Simjacking Brute Force Attack Application Access Token Supply Chain Attack Cross- Site Scripting Open Redirection Spyware Malware Ransomware Cloud Cryptomining Meltdown & Spectre Attack Spear Phishing Account Takeover IoT Threats Macro Viruses Masquerade Attack DNS Amplification Social Engineering Attack Advanced Persistent Threat Typo Squatting Watering Hole Attack Credential Dumping Insider Threat
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Whale Phishing
Drive-by Download Attack
Man-in-the-Middle Attack
Phishing Payloads
Crypto Jacking Attack
SQL Injection
Zero-Day Exploit
Web Session Cookie Theft
Compromised Credentials
DoS Attack
Malicious Powershell
Bill Fraud
Shadow IT
Pass the Hash
Privileged User Compromise
Amazon WS Attacks
Network Sniffing
Simjacking
Brute Force Attack
Application Access Token
Supply Chain Attack
Cross-Site Scripting
Open Redirection
Spyware
Malware
Ransomware
Cloud Cryptomining
Meltdown & Spectre Attack
Spear Phishing
Account Takeover
IoT Threats
Macro Viruses
Masquerade Attack
DNS Amplification
Social Engineering Attack
Advanced Persistent Threat
Typo Squatting
Watering Hole Attack
Credential Dumping
Insider Threat