Dark-HotelHackingAICyberThreatsPhishingAttackCybersecurityThreatsWi-FiVulnerabilitiesBotnetSOSMaliciousAppsZero-DayExploitCustomerDataTheftMalwareComputerNetworksDDoSAttacksRansomwareAdwareDataBreachesMITMAttacksSocialEngineeringPOSComputerVirusesIotAttacksInsiderThreatsOutsiderThreatsSoftwareDark-HotelHackingAICyberThreatsPhishingAttackCybersecurityThreatsWi-FiVulnerabilitiesBotnetSOSMaliciousAppsZero-DayExploitCustomerDataTheftMalwareComputerNetworksDDoSAttacksRansomwareAdwareDataBreachesMITMAttacksSocialEngineeringPOSComputerVirusesIotAttacksInsiderThreatsOutsiderThreatsSoftware

CYBERSECURITY THREATS - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Dark-Hotel Hacking
  2. AI Cyber Threats
  3. Phishing Attack
  4. Cybersecurity Threats
  5. Wi-Fi Vulnerabilities
  6. Botnet
  7. SOS
  8. Malicious Apps
  9. Zero-Day Exploit
  10. Customer Data Theft
  11. Malware
  12. Computer Networks
  13. DDoS Attacks
  14. Ransomware
  15. Adware
  16. Data Breaches
  17. MITM Attacks
  18. Social Engineering
  19. POS
  20. Computer Viruses
  21. Iot Attacks
  22. Insider Threats
  23. Outsider Threats
  24. Software