Cross-SiteScriptingDNSAmplificationNetworkSniffingCompromisedCredentialsMeltdown& SpectreAttackIoTThreatsSimjackingCryptoJackingAttackSpearPhishingMasqueradeAttackBillFraudAccountTakeoverWhalePhishingCredentialDumpingMaliciousPowershellMan-in-the-MiddleAttackZero-DayExploitWateringHoleAttackWebSessionCookieTheftTypoSquattingSupplyChainAttackInsiderThreatPrivilegedUserCompromiseMalwareSocialEngineeringAttackPasstheHashBruteForceAttackPhishingPayloadsApplicationAccessTokenOpenRedirectionSQLInjectionMacroVirusesDoSAttackAmazonWSAttacksShadowITRansomwareDrive-byDownloadAttackSpywareAdvancedPersistentThreatCloudCryptominingCross-SiteScriptingDNSAmplificationNetworkSniffingCompromisedCredentialsMeltdown& SpectreAttackIoTThreatsSimjackingCryptoJackingAttackSpearPhishingMasqueradeAttackBillFraudAccountTakeoverWhalePhishingCredentialDumpingMaliciousPowershellMan-in-the-MiddleAttackZero-DayExploitWateringHoleAttackWebSessionCookieTheftTypoSquattingSupplyChainAttackInsiderThreatPrivilegedUserCompromiseMalwareSocialEngineeringAttackPasstheHashBruteForceAttackPhishingPayloadsApplicationAccessTokenOpenRedirectionSQLInjectionMacroVirusesDoSAttackAmazonWSAttacksShadowITRansomwareDrive-byDownloadAttackSpywareAdvancedPersistentThreatCloudCryptomining

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Cross-Site Scripting
  2. DNS Amplification
  3. Network Sniffing
  4. Compromised Credentials
  5. Meltdown & Spectre Attack
  6. IoT Threats
  7. Simjacking
  8. Crypto Jacking Attack
  9. Spear Phishing
  10. Masquerade Attack
  11. Bill Fraud
  12. Account Takeover
  13. Whale Phishing
  14. Credential Dumping
  15. Malicious Powershell
  16. Man-in-the-Middle Attack
  17. Zero-Day Exploit
  18. Watering Hole Attack
  19. Web Session Cookie Theft
  20. Typo Squatting
  21. Supply Chain Attack
  22. Insider Threat
  23. Privileged User Compromise
  24. Malware
  25. Social Engineering Attack
  26. Pass the Hash
  27. Brute Force Attack
  28. Phishing Payloads
  29. Application Access Token
  30. Open Redirection
  31. SQL Injection
  32. Macro Viruses
  33. DoS Attack
  34. Amazon WS Attacks
  35. Shadow IT
  36. Ransomware
  37. Drive-by Download Attack
  38. Spyware
  39. Advanced Persistent Threat
  40. Cloud Cryptomining