POSIotAttacksComputerNetworksDDoSAttacksSocialEngineeringSOSDark-HotelHackingPhishingAttackComputerVirusesMalwareOutsiderThreatsRansomwareInsiderThreatsCustomerDataTheftSoftwareDataBreachesBotnetAdwareAICyberThreatsCybersecurityThreatsMITMAttacksMaliciousAppsZero-DayExploitWi-FiVulnerabilitiesPOSIotAttacksComputerNetworksDDoSAttacksSocialEngineeringSOSDark-HotelHackingPhishingAttackComputerVirusesMalwareOutsiderThreatsRansomwareInsiderThreatsCustomerDataTheftSoftwareDataBreachesBotnetAdwareAICyberThreatsCybersecurityThreatsMITMAttacksMaliciousAppsZero-DayExploitWi-FiVulnerabilities

CYBERSECURITY THREATS - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. POS
  2. Iot Attacks
  3. Computer Networks
  4. DDoS Attacks
  5. Social Engineering
  6. SOS
  7. Dark-Hotel Hacking
  8. Phishing Attack
  9. Computer Viruses
  10. Malware
  11. Outsider Threats
  12. Ransomware
  13. Insider Threats
  14. Customer Data Theft
  15. Software
  16. Data Breaches
  17. Botnet
  18. Adware
  19. AI Cyber Threats
  20. Cybersecurity Threats
  21. MITM Attacks
  22. Malicious Apps
  23. Zero-Day Exploit
  24. Wi-Fi Vulnerabilities