Privileged User Compromise Malicious Powershell Brute Force Attack Web Session Cookie Theft Cloud Cryptomining Open Redirection Whale Phishing Bill Fraud Typo Squatting Man-in- the- Middle Attack Advanced Persistent Threat Macro Viruses Zero- Day Exploit Masquerade Attack Watering Hole Attack Shadow IT Amazon WS Attacks IoT Threats Insider Threat DNS Amplification Malware SQL Injection Crypto Jacking Attack Meltdown & Spectre Attack Spear Phishing Simjacking Account Takeover Ransomware Social Engineering Attack Compromised Credentials Application Access Token DoS Attack Pass the Hash Cross- Site Scripting Spyware Phishing Payloads Credential Dumping Supply Chain Attack Network Sniffing Drive-by Download Attack Privileged User Compromise Malicious Powershell Brute Force Attack Web Session Cookie Theft Cloud Cryptomining Open Redirection Whale Phishing Bill Fraud Typo Squatting Man-in- the- Middle Attack Advanced Persistent Threat Macro Viruses Zero- Day Exploit Masquerade Attack Watering Hole Attack Shadow IT Amazon WS Attacks IoT Threats Insider Threat DNS Amplification Malware SQL Injection Crypto Jacking Attack Meltdown & Spectre Attack Spear Phishing Simjacking Account Takeover Ransomware Social Engineering Attack Compromised Credentials Application Access Token DoS Attack Pass the Hash Cross- Site Scripting Spyware Phishing Payloads Credential Dumping Supply Chain Attack Network Sniffing Drive-by Download Attack
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Privileged User Compromise
Malicious Powershell
Brute Force Attack
Web Session Cookie Theft
Cloud Cryptomining
Open Redirection
Whale Phishing
Bill Fraud
Typo Squatting
Man-in-the-Middle Attack
Advanced Persistent Threat
Macro Viruses
Zero-Day Exploit
Masquerade Attack
Watering Hole Attack
Shadow IT
Amazon WS Attacks
IoT Threats
Insider Threat
DNS Amplification
Malware
SQL Injection
Crypto Jacking Attack
Meltdown & Spectre Attack
Spear Phishing
Simjacking
Account Takeover
Ransomware
Social Engineering Attack
Compromised Credentials
Application Access Token
DoS Attack
Pass the Hash
Cross-Site Scripting
Spyware
Phishing Payloads
Credential Dumping
Supply Chain Attack
Network Sniffing
Drive-by Download Attack