DDoSAttacksPhishingAttackSOSMITMAttacksPOSWi-FiVulnerabilitiesSocialEngineeringMaliciousAppsDataBreachesIotAttacksRansomwareCybersecurityThreatsCustomerDataTheftDark-HotelHackingAdwareComputerNetworksZero-DayExploitAICyberThreatsComputerVirusesBotnetMalwareInsiderThreatsSoftwareOutsiderThreatsDDoSAttacksPhishingAttackSOSMITMAttacksPOSWi-FiVulnerabilitiesSocialEngineeringMaliciousAppsDataBreachesIotAttacksRansomwareCybersecurityThreatsCustomerDataTheftDark-HotelHackingAdwareComputerNetworksZero-DayExploitAICyberThreatsComputerVirusesBotnetMalwareInsiderThreatsSoftwareOutsiderThreats

CYBERSECURITY THREATS - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. DDoS Attacks
  2. Phishing Attack
  3. SOS
  4. MITM Attacks
  5. POS
  6. Wi-Fi Vulnerabilities
  7. Social Engineering
  8. Malicious Apps
  9. Data Breaches
  10. Iot Attacks
  11. Ransomware
  12. Cybersecurity Threats
  13. Customer Data Theft
  14. Dark-Hotel Hacking
  15. Adware
  16. Computer Networks
  17. Zero-Day Exploit
  18. AI Cyber Threats
  19. Computer Viruses
  20. Botnet
  21. Malware
  22. Insider Threats
  23. Software
  24. Outsider Threats