Weak Passwords Unpatched Software Denial of Service (DoS) Buffer Overflow Session Hijacking SQL Injection Cryptojacking Insecure APIs Brute Force Attack Zero- Day Exploit Ransomware Trojan Horse Privilege Escalation Remote Code Execution (RCE) Social Engineering Insider Threat Man-in- the- Middle (MITM) Backdoor Directory Traversal Data Breach DDoS Attack Malware Phishing Cross- Site Scripting (XSS) Weak Passwords Unpatched Software Denial of Service (DoS) Buffer Overflow Session Hijacking SQL Injection Cryptojacking Insecure APIs Brute Force Attack Zero- Day Exploit Ransomware Trojan Horse Privilege Escalation Remote Code Execution (RCE) Social Engineering Insider Threat Man-in- the- Middle (MITM) Backdoor Directory Traversal Data Breach DDoS Attack Malware Phishing Cross- Site Scripting (XSS)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Weak Passwords
Unpatched Software
Denial of Service (DoS)
Buffer Overflow
Session Hijacking
SQL Injection
Cryptojacking
Insecure APIs
Brute Force Attack
Zero-Day Exploit
Ransomware
Trojan Horse
Privilege Escalation
Remote Code Execution (RCE)
Social Engineering
Insider Threat
Man-in-the-Middle (MITM)
Backdoor
Directory Traversal
Data Breach
DDoS Attack
Malware
Phishing
Cross-Site Scripting (XSS)