Malicious Powershell Compromised Credentials SQL Injection Drive-by Download Attack Supply Chain Attack Application Access Token Social Engineering Attack Malware Open Redirection Cross- Site Scripting Ransomware Spyware Cloud Cryptomining Macro Viruses Whale Phishing Privileged User Compromise Amazon WS Attacks DoS Attack Zero- Day Exploit Account Takeover Simjacking Credential Dumping Insider Threat Man-in- the- Middle Attack Masquerade Attack Brute Force Attack Advanced Persistent Threat IoT Threats Shadow IT Bill Fraud Typo Squatting Web Session Cookie Theft Spear Phishing DNS Amplification Meltdown & Spectre Attack Phishing Payloads Crypto Jacking Attack Pass the Hash Watering Hole Attack Network Sniffing Malicious Powershell Compromised Credentials SQL Injection Drive-by Download Attack Supply Chain Attack Application Access Token Social Engineering Attack Malware Open Redirection Cross- Site Scripting Ransomware Spyware Cloud Cryptomining Macro Viruses Whale Phishing Privileged User Compromise Amazon WS Attacks DoS Attack Zero- Day Exploit Account Takeover Simjacking Credential Dumping Insider Threat Man-in- the- Middle Attack Masquerade Attack Brute Force Attack Advanced Persistent Threat IoT Threats Shadow IT Bill Fraud Typo Squatting Web Session Cookie Theft Spear Phishing DNS Amplification Meltdown & Spectre Attack Phishing Payloads Crypto Jacking Attack Pass the Hash Watering Hole Attack Network Sniffing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Malicious Powershell
Compromised Credentials
SQL Injection
Drive-by Download Attack
Supply Chain Attack
Application Access Token
Social Engineering Attack
Malware
Open Redirection
Cross-Site Scripting
Ransomware
Spyware
Cloud Cryptomining
Macro Viruses
Whale Phishing
Privileged User Compromise
Amazon WS Attacks
DoS Attack
Zero-Day Exploit
Account Takeover
Simjacking
Credential Dumping
Insider Threat
Man-in-the-Middle Attack
Masquerade Attack
Brute Force Attack
Advanced Persistent Threat
IoT Threats
Shadow IT
Bill Fraud
Typo Squatting
Web Session Cookie Theft
Spear Phishing
DNS Amplification
Meltdown & Spectre Attack
Phishing Payloads
Crypto Jacking Attack
Pass the Hash
Watering Hole Attack
Network Sniffing