Spyware Simjacking Account Takeover Network Sniffing Insider Threat Brute Force Attack DoS Attack Malware Malicious Powershell Man-in- the- Middle Attack Shadow IT Supply Chain Attack Meltdown & Spectre Attack IoT Threats Open Redirection Ransomware Watering Hole Attack Credential Dumping Spear Phishing Pass the Hash Drive-by Download Attack Privileged User Compromise Crypto Jacking Attack Masquerade Attack Compromised Credentials Social Engineering Attack Web Session Cookie Theft Bill Fraud SQL Injection Zero- Day Exploit Application Access Token Cloud Cryptomining DNS Amplification Advanced Persistent Threat Cross- Site Scripting Typo Squatting Macro Viruses Whale Phishing Amazon WS Attacks Phishing Payloads Spyware Simjacking Account Takeover Network Sniffing Insider Threat Brute Force Attack DoS Attack Malware Malicious Powershell Man-in- the- Middle Attack Shadow IT Supply Chain Attack Meltdown & Spectre Attack IoT Threats Open Redirection Ransomware Watering Hole Attack Credential Dumping Spear Phishing Pass the Hash Drive-by Download Attack Privileged User Compromise Crypto Jacking Attack Masquerade Attack Compromised Credentials Social Engineering Attack Web Session Cookie Theft Bill Fraud SQL Injection Zero- Day Exploit Application Access Token Cloud Cryptomining DNS Amplification Advanced Persistent Threat Cross- Site Scripting Typo Squatting Macro Viruses Whale Phishing Amazon WS Attacks Phishing Payloads
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Spyware
Simjacking
Account Takeover
Network Sniffing
Insider Threat
Brute Force Attack
DoS Attack
Malware
Malicious Powershell
Man-in-the-Middle Attack
Shadow IT
Supply Chain Attack
Meltdown & Spectre Attack
IoT Threats
Open Redirection
Ransomware
Watering Hole Attack
Credential Dumping
Spear Phishing
Pass the Hash
Drive-by Download Attack
Privileged User Compromise
Crypto Jacking Attack
Masquerade Attack
Compromised Credentials
Social Engineering Attack
Web Session Cookie Theft
Bill Fraud
SQL Injection
Zero-Day Exploit
Application Access Token
Cloud Cryptomining
DNS Amplification
Advanced Persistent Threat
Cross-Site Scripting
Typo Squatting
Macro Viruses
Whale Phishing
Amazon WS Attacks
Phishing Payloads