ComputerVirusesMaliciousAppsRansomwareOutsiderThreatsDataBreachesSOSPhishingAttackAdwareComputerNetworksAICyberThreatsCybersecurityThreatsDark-HotelHackingWi-FiVulnerabilitiesInsiderThreatsMalwareMITMAttacksPOSBotnetSocialEngineeringCustomerDataTheftSoftwareIotAttacksDDoSAttacksZero-DayExploitComputerVirusesMaliciousAppsRansomwareOutsiderThreatsDataBreachesSOSPhishingAttackAdwareComputerNetworksAICyberThreatsCybersecurityThreatsDark-HotelHackingWi-FiVulnerabilitiesInsiderThreatsMalwareMITMAttacksPOSBotnetSocialEngineeringCustomerDataTheftSoftwareIotAttacksDDoSAttacksZero-DayExploit

CYBERSECURITY THREATS - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Computer Viruses
  2. Malicious Apps
  3. Ransomware
  4. Outsider Threats
  5. Data Breaches
  6. SOS
  7. Phishing Attack
  8. Adware
  9. Computer Networks
  10. AI Cyber Threats
  11. Cybersecurity Threats
  12. Dark-Hotel Hacking
  13. Wi-Fi Vulnerabilities
  14. Insider Threats
  15. Malware
  16. MITM Attacks
  17. POS
  18. Botnet
  19. Social Engineering
  20. Customer Data Theft
  21. Software
  22. Iot Attacks
  23. DDoS Attacks
  24. Zero-Day Exploit