PrivilegedUserCompromiseMaliciousPowershellBruteForceAttackWebSessionCookieTheftCloudCryptominingOpenRedirectionWhalePhishingBillFraudTypoSquattingMan-in-the-MiddleAttackAdvancedPersistentThreatMacroVirusesZero-DayExploitMasqueradeAttackWateringHoleAttackShadowITAmazonWSAttacksIoTThreatsInsiderThreatDNSAmplificationMalwareSQLInjectionCryptoJackingAttackMeltdown& SpectreAttackSpearPhishingSimjackingAccountTakeoverRansomwareSocialEngineeringAttackCompromisedCredentialsApplicationAccessTokenDoSAttackPasstheHashCross-SiteScriptingSpywarePhishingPayloadsCredentialDumpingSupplyChainAttackNetworkSniffingDrive-byDownloadAttackPrivilegedUserCompromiseMaliciousPowershellBruteForceAttackWebSessionCookieTheftCloudCryptominingOpenRedirectionWhalePhishingBillFraudTypoSquattingMan-in-the-MiddleAttackAdvancedPersistentThreatMacroVirusesZero-DayExploitMasqueradeAttackWateringHoleAttackShadowITAmazonWSAttacksIoTThreatsInsiderThreatDNSAmplificationMalwareSQLInjectionCryptoJackingAttackMeltdown& SpectreAttackSpearPhishingSimjackingAccountTakeoverRansomwareSocialEngineeringAttackCompromisedCredentialsApplicationAccessTokenDoSAttackPasstheHashCross-SiteScriptingSpywarePhishingPayloadsCredentialDumpingSupplyChainAttackNetworkSniffingDrive-byDownloadAttack

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Privileged User Compromise
  2. Malicious Powershell
  3. Brute Force Attack
  4. Web Session Cookie Theft
  5. Cloud Cryptomining
  6. Open Redirection
  7. Whale Phishing
  8. Bill Fraud
  9. Typo Squatting
  10. Man-in-the-Middle Attack
  11. Advanced Persistent Threat
  12. Macro Viruses
  13. Zero-Day Exploit
  14. Masquerade Attack
  15. Watering Hole Attack
  16. Shadow IT
  17. Amazon WS Attacks
  18. IoT Threats
  19. Insider Threat
  20. DNS Amplification
  21. Malware
  22. SQL Injection
  23. Crypto Jacking Attack
  24. Meltdown & Spectre Attack
  25. Spear Phishing
  26. Simjacking
  27. Account Takeover
  28. Ransomware
  29. Social Engineering Attack
  30. Compromised Credentials
  31. Application Access Token
  32. DoS Attack
  33. Pass the Hash
  34. Cross-Site Scripting
  35. Spyware
  36. Phishing Payloads
  37. Credential Dumping
  38. Supply Chain Attack
  39. Network Sniffing
  40. Drive-by Download Attack