Unpatched Software Trojan Horse Phishing SQL Injection Weak Passwords Zero- Day Exploit Man-in- the- Middle (MITM) Remote Code Execution (RCE) Insider Threat Insecure APIs Brute Force Attack Directory Traversal Privilege Escalation Buffer Overflow Cryptojacking Session Hijacking Denial of Service (DoS) DDoS Attack Backdoor Cross- Site Scripting (XSS) Social Engineering Ransomware Data Breach Malware Unpatched Software Trojan Horse Phishing SQL Injection Weak Passwords Zero- Day Exploit Man-in- the- Middle (MITM) Remote Code Execution (RCE) Insider Threat Insecure APIs Brute Force Attack Directory Traversal Privilege Escalation Buffer Overflow Cryptojacking Session Hijacking Denial of Service (DoS) DDoS Attack Backdoor Cross- Site Scripting (XSS) Social Engineering Ransomware Data Breach Malware
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Unpatched Software
Trojan Horse
Phishing
SQL Injection
Weak Passwords
Zero-Day Exploit
Man-in-the-Middle (MITM)
Remote Code Execution (RCE)
Insider Threat
Insecure APIs
Brute Force Attack
Directory Traversal
Privilege Escalation
Buffer Overflow
Cryptojacking
Session Hijacking
Denial of Service (DoS)
DDoS Attack
Backdoor
Cross-Site Scripting (XSS)
Social Engineering
Ransomware
Data Breach
Malware