SQLInjectionCompromisedCredentialsOpenRedirectionApplicationAccessTokenSimjackingSpearPhishingShadowITIoTThreatsAccountTakeoverSpywareBruteForceAttackPhishingPayloadsNetworkSniffingCredentialDumpingPasstheHashMeltdown& SpectreAttackCross-SiteScriptingTypoSquattingDrive-byDownloadAttackDNSAmplificationWhalePhishingMasqueradeAttackZero-DayExploitSupplyChainAttackRansomwareBillFraudMalwareMan-in-the-MiddleAttackSocialEngineeringAttackDoSAttackWateringHoleAttackPrivilegedUserCompromiseAmazonWSAttacksCloudCryptominingAdvancedPersistentThreatMaliciousPowershellWebSessionCookieTheftInsiderThreatCryptoJackingAttackMacroVirusesSQLInjectionCompromisedCredentialsOpenRedirectionApplicationAccessTokenSimjackingSpearPhishingShadowITIoTThreatsAccountTakeoverSpywareBruteForceAttackPhishingPayloadsNetworkSniffingCredentialDumpingPasstheHashMeltdown& SpectreAttackCross-SiteScriptingTypoSquattingDrive-byDownloadAttackDNSAmplificationWhalePhishingMasqueradeAttackZero-DayExploitSupplyChainAttackRansomwareBillFraudMalwareMan-in-the-MiddleAttackSocialEngineeringAttackDoSAttackWateringHoleAttackPrivilegedUserCompromiseAmazonWSAttacksCloudCryptominingAdvancedPersistentThreatMaliciousPowershellWebSessionCookieTheftInsiderThreatCryptoJackingAttackMacroViruses

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. SQL Injection
  2. Compromised Credentials
  3. Open Redirection
  4. Application Access Token
  5. Simjacking
  6. Spear Phishing
  7. Shadow IT
  8. IoT Threats
  9. Account Takeover
  10. Spyware
  11. Brute Force Attack
  12. Phishing Payloads
  13. Network Sniffing
  14. Credential Dumping
  15. Pass the Hash
  16. Meltdown & Spectre Attack
  17. Cross-Site Scripting
  18. Typo Squatting
  19. Drive-by Download Attack
  20. DNS Amplification
  21. Whale Phishing
  22. Masquerade Attack
  23. Zero-Day Exploit
  24. Supply Chain Attack
  25. Ransomware
  26. Bill Fraud
  27. Malware
  28. Man-in-the-Middle Attack
  29. Social Engineering Attack
  30. DoS Attack
  31. Watering Hole Attack
  32. Privileged User Compromise
  33. Amazon WS Attacks
  34. Cloud Cryptomining
  35. Advanced Persistent Threat
  36. Malicious Powershell
  37. Web Session Cookie Theft
  38. Insider Threat
  39. Crypto Jacking Attack
  40. Macro Viruses