PasstheHashMacroVirusesMan-in-the-MiddleAttackMasqueradeAttackSQLInjectionZero-DayExploitAdvancedPersistentThreatDrive-byDownloadAttackAmazonWSAttacksTypoSquattingDoSAttackShadowITMalwareCloudCryptominingPrivilegedUserCompromiseSpearPhishingWhalePhishingSpywareBillFraudSocialEngineeringAttackRansomwareInsiderThreatCryptoJackingAttackCross-SiteScriptingCredentialDumpingBruteForceAttackOpenRedirectionApplicationAccessTokenPhishingPayloadsWateringHoleAttackMeltdown& SpectreAttackSimjackingNetworkSniffingDNSAmplificationCompromisedCredentialsSupplyChainAttackAccountTakeoverMaliciousPowershellWebSessionCookieTheftIoTThreatsPasstheHashMacroVirusesMan-in-the-MiddleAttackMasqueradeAttackSQLInjectionZero-DayExploitAdvancedPersistentThreatDrive-byDownloadAttackAmazonWSAttacksTypoSquattingDoSAttackShadowITMalwareCloudCryptominingPrivilegedUserCompromiseSpearPhishingWhalePhishingSpywareBillFraudSocialEngineeringAttackRansomwareInsiderThreatCryptoJackingAttackCross-SiteScriptingCredentialDumpingBruteForceAttackOpenRedirectionApplicationAccessTokenPhishingPayloadsWateringHoleAttackMeltdown& SpectreAttackSimjackingNetworkSniffingDNSAmplificationCompromisedCredentialsSupplyChainAttackAccountTakeoverMaliciousPowershellWebSessionCookieTheftIoTThreats

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Pass the Hash
  2. Macro Viruses
  3. Man-in-the-Middle Attack
  4. Masquerade Attack
  5. SQL Injection
  6. Zero-Day Exploit
  7. Advanced Persistent Threat
  8. Drive-by Download Attack
  9. Amazon WS Attacks
  10. Typo Squatting
  11. DoS Attack
  12. Shadow IT
  13. Malware
  14. Cloud Cryptomining
  15. Privileged User Compromise
  16. Spear Phishing
  17. Whale Phishing
  18. Spyware
  19. Bill Fraud
  20. Social Engineering Attack
  21. Ransomware
  22. Insider Threat
  23. Crypto Jacking Attack
  24. Cross-Site Scripting
  25. Credential Dumping
  26. Brute Force Attack
  27. Open Redirection
  28. Application Access Token
  29. Phishing Payloads
  30. Watering Hole Attack
  31. Meltdown & Spectre Attack
  32. Simjacking
  33. Network Sniffing
  34. DNS Amplification
  35. Compromised Credentials
  36. Supply Chain Attack
  37. Account Takeover
  38. Malicious Powershell
  39. Web Session Cookie Theft
  40. IoT Threats