WhalePhishingMaliciousPowershellMacroVirusesRansomwareWebSessionCookieTheftPasstheHashSocialEngineeringAttackCryptoJackingAttackCloudCryptominingIoTThreatsAdvancedPersistentThreatSimjackingDoSAttackPhishingPayloadsBillFraudShadowITDNSAmplificationBruteForceAttackDrive-byDownloadAttackTypoSquattingSpearPhishingAccountTakeoverPrivilegedUserCompromiseWateringHoleAttackSQLInjectionAmazonWSAttacksMasqueradeAttackInsiderThreatSpywareSupplyChainAttackMalwareNetworkSniffingMeltdown& SpectreAttackOpenRedirectionZero-DayExploitApplicationAccessTokenCross-SiteScriptingCredentialDumpingMan-in-the-MiddleAttackCompromisedCredentialsWhalePhishingMaliciousPowershellMacroVirusesRansomwareWebSessionCookieTheftPasstheHashSocialEngineeringAttackCryptoJackingAttackCloudCryptominingIoTThreatsAdvancedPersistentThreatSimjackingDoSAttackPhishingPayloadsBillFraudShadowITDNSAmplificationBruteForceAttackDrive-byDownloadAttackTypoSquattingSpearPhishingAccountTakeoverPrivilegedUserCompromiseWateringHoleAttackSQLInjectionAmazonWSAttacksMasqueradeAttackInsiderThreatSpywareSupplyChainAttackMalwareNetworkSniffingMeltdown& SpectreAttackOpenRedirectionZero-DayExploitApplicationAccessTokenCross-SiteScriptingCredentialDumpingMan-in-the-MiddleAttackCompromisedCredentials

Cyber Threats - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Whale Phishing
  2. Malicious Powershell
  3. Macro Viruses
  4. Ransomware
  5. Web Session Cookie Theft
  6. Pass the Hash
  7. Social Engineering Attack
  8. Crypto Jacking Attack
  9. Cloud Cryptomining
  10. IoT Threats
  11. Advanced Persistent Threat
  12. Simjacking
  13. DoS Attack
  14. Phishing Payloads
  15. Bill Fraud
  16. Shadow IT
  17. DNS Amplification
  18. Brute Force Attack
  19. Drive-by Download Attack
  20. Typo Squatting
  21. Spear Phishing
  22. Account Takeover
  23. Privileged User Compromise
  24. Watering Hole Attack
  25. SQL Injection
  26. Amazon WS Attacks
  27. Masquerade Attack
  28. Insider Threat
  29. Spyware
  30. Supply Chain Attack
  31. Malware
  32. Network Sniffing
  33. Meltdown & Spectre Attack
  34. Open Redirection
  35. Zero-Day Exploit
  36. Application Access Token
  37. Cross-Site Scripting
  38. Credential Dumping
  39. Man-in-the-Middle Attack
  40. Compromised Credentials