SQL Injection Insecure APIs Cryptojacking Unpatched Software Directory Traversal Cryptojacking Unpatched Software Social Engineering Directory Traversal Phishing Cross- Site Scripting (XSS) Backdoor Privilege Escalation Ransomware Weak Passwords Malware Trojan Horse Denial of Service (DoS) Insider Threat Phishing Data Breach Insider Threat Ransomware Man-in- the- Middle (MITM) Buffer Overflow Brute Force Attack DDoS Attack Cross- Site Scripting (XSS) Backdoor Session Hijacking Phishing Buffer Overflow Privilege Escalation Session Hijacking Weak Passwords Trojan Horse Zero- Day Exploit Social Engineering Data Breach SQL Injection Zero- Day Exploit Remote Code Execution (RCE) Brute Force Attack Denial of Service (DoS) Remote Code Execution (RCE) Man-in- the- Middle (MITM) DDoS Attack Insecure APIs Malware SQL Injection Insecure APIs Cryptojacking Unpatched Software Directory Traversal Cryptojacking Unpatched Software Social Engineering Directory Traversal Phishing Cross- Site Scripting (XSS) Backdoor Privilege Escalation Ransomware Weak Passwords Malware Trojan Horse Denial of Service (DoS) Insider Threat Phishing Data Breach Insider Threat Ransomware Man-in- the- Middle (MITM) Buffer Overflow Brute Force Attack DDoS Attack Cross- Site Scripting (XSS) Backdoor Session Hijacking Phishing Buffer Overflow Privilege Escalation Session Hijacking Weak Passwords Trojan Horse Zero- Day Exploit Social Engineering Data Breach SQL Injection Zero- Day Exploit Remote Code Execution (RCE) Brute Force Attack Denial of Service (DoS) Remote Code Execution (RCE) Man-in- the- Middle (MITM) DDoS Attack Insecure APIs Malware
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
SQL Injection
Insecure APIs
Cryptojacking
Unpatched Software
Directory Traversal
Cryptojacking
Unpatched Software
Social Engineering
Directory Traversal
Phishing
Cross-Site Scripting (XSS)
Backdoor
Privilege Escalation
Ransomware
Weak Passwords
Malware
Trojan Horse
Denial of Service (DoS)
Insider Threat
Phishing
Data Breach
Insider Threat
Ransomware
Man-in-the-Middle (MITM)
Buffer Overflow
Brute Force Attack
DDoS Attack
Cross-Site Scripting (XSS)
Backdoor
Session Hijacking
Phishing
Buffer Overflow
Privilege Escalation
Session Hijacking
Weak Passwords
Trojan Horse
Zero-Day Exploit
Social Engineering
Data Breach
SQL Injection
Zero-Day Exploit
Remote Code Execution (RCE)
Brute Force Attack
Denial of Service (DoS)
Remote Code Execution (RCE)
Man-in-the-Middle (MITM)
DDoS Attack
Insecure APIs
Malware