SpywareSimjackingAccountTakeoverNetworkSniffingInsiderThreatBruteForceAttackDoSAttackMalwareMaliciousPowershellMan-in-the-MiddleAttackShadowITSupplyChainAttackMeltdown& SpectreAttackIoTThreatsOpenRedirectionRansomwareWateringHoleAttackCredentialDumpingSpearPhishingPasstheHashDrive-byDownloadAttackPrivilegedUserCompromiseCryptoJackingAttackMasqueradeAttackCompromisedCredentialsSocialEngineeringAttackWebSessionCookieTheftBillFraudSQLInjectionZero-DayExploitApplicationAccessTokenCloudCryptominingDNSAmplificationAdvancedPersistentThreatCross-SiteScriptingTypoSquattingMacroVirusesWhalePhishingAmazonWSAttacksPhishingPayloadsSpywareSimjackingAccountTakeoverNetworkSniffingInsiderThreatBruteForceAttackDoSAttackMalwareMaliciousPowershellMan-in-the-MiddleAttackShadowITSupplyChainAttackMeltdown& SpectreAttackIoTThreatsOpenRedirectionRansomwareWateringHoleAttackCredentialDumpingSpearPhishingPasstheHashDrive-byDownloadAttackPrivilegedUserCompromiseCryptoJackingAttackMasqueradeAttackCompromisedCredentialsSocialEngineeringAttackWebSessionCookieTheftBillFraudSQLInjectionZero-DayExploitApplicationAccessTokenCloudCryptominingDNSAmplificationAdvancedPersistentThreatCross-SiteScriptingTypoSquattingMacroVirusesWhalePhishingAmazonWSAttacksPhishingPayloads

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Spyware
  2. Simjacking
  3. Account Takeover
  4. Network Sniffing
  5. Insider Threat
  6. Brute Force Attack
  7. DoS Attack
  8. Malware
  9. Malicious Powershell
  10. Man-in-the-Middle Attack
  11. Shadow IT
  12. Supply Chain Attack
  13. Meltdown & Spectre Attack
  14. IoT Threats
  15. Open Redirection
  16. Ransomware
  17. Watering Hole Attack
  18. Credential Dumping
  19. Spear Phishing
  20. Pass the Hash
  21. Drive-by Download Attack
  22. Privileged User Compromise
  23. Crypto Jacking Attack
  24. Masquerade Attack
  25. Compromised Credentials
  26. Social Engineering Attack
  27. Web Session Cookie Theft
  28. Bill Fraud
  29. SQL Injection
  30. Zero-Day Exploit
  31. Application Access Token
  32. Cloud Cryptomining
  33. DNS Amplification
  34. Advanced Persistent Threat
  35. Cross-Site Scripting
  36. Typo Squatting
  37. Macro Viruses
  38. Whale Phishing
  39. Amazon WS Attacks
  40. Phishing Payloads