AdvancedPersistentThreatCloudCryptominingWateringHoleAttackTypoSquattingDoSAttackShadowITAmazonWSAttacksInsiderThreatMacroVirusesRansomwareAccountTakeoverSocialEngineeringAttackMalwareMeltdown& SpectreAttackSupplyChainAttackCross-SiteScriptingApplicationAccessTokenSimjackingWebSessionCookieTheftDrive-byDownloadAttackSQLInjectionWhalePhishingBruteForceAttackOpenRedirectionMasqueradeAttackSpearPhishingPrivilegedUserCompromisePhishingPayloadsSpywareCredentialDumpingCompromisedCredentialsDNSAmplificationPasstheHashCryptoJackingAttackNetworkSniffingMan-in-the-MiddleAttackIoTThreatsMaliciousPowershellZero-DayExploitBillFraudAdvancedPersistentThreatCloudCryptominingWateringHoleAttackTypoSquattingDoSAttackShadowITAmazonWSAttacksInsiderThreatMacroVirusesRansomwareAccountTakeoverSocialEngineeringAttackMalwareMeltdown& SpectreAttackSupplyChainAttackCross-SiteScriptingApplicationAccessTokenSimjackingWebSessionCookieTheftDrive-byDownloadAttackSQLInjectionWhalePhishingBruteForceAttackOpenRedirectionMasqueradeAttackSpearPhishingPrivilegedUserCompromisePhishingPayloadsSpywareCredentialDumpingCompromisedCredentialsDNSAmplificationPasstheHashCryptoJackingAttackNetworkSniffingMan-in-the-MiddleAttackIoTThreatsMaliciousPowershellZero-DayExploitBillFraud

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Advanced Persistent Threat
  2. Cloud Cryptomining
  3. Watering Hole Attack
  4. Typo Squatting
  5. DoS Attack
  6. Shadow IT
  7. Amazon WS Attacks
  8. Insider Threat
  9. Macro Viruses
  10. Ransomware
  11. Account Takeover
  12. Social Engineering Attack
  13. Malware
  14. Meltdown & Spectre Attack
  15. Supply Chain Attack
  16. Cross-Site Scripting
  17. Application Access Token
  18. Simjacking
  19. Web Session Cookie Theft
  20. Drive-by Download Attack
  21. SQL Injection
  22. Whale Phishing
  23. Brute Force Attack
  24. Open Redirection
  25. Masquerade Attack
  26. Spear Phishing
  27. Privileged User Compromise
  28. Phishing Payloads
  29. Spyware
  30. Credential Dumping
  31. Compromised Credentials
  32. DNS Amplification
  33. Pass the Hash
  34. Crypto Jacking Attack
  35. Network Sniffing
  36. Man-in-the-Middle Attack
  37. IoT Threats
  38. Malicious Powershell
  39. Zero-Day Exploit
  40. Bill Fraud