POSCustomerDataTheftDark-HotelHackingComputerVirusesWi-FiVulnerabilitiesCybersecurityThreatsDDoSAttacksAdwareMITMAttacksComputerNetworksMalwareSocialEngineeringMaliciousAppsRansomwareAICyberThreatsDataBreachesSoftwareBotnetZero-DayExploitSOSInsiderThreatsOutsiderThreatsPhishingAttackIotAttacksPOSCustomerDataTheftDark-HotelHackingComputerVirusesWi-FiVulnerabilitiesCybersecurityThreatsDDoSAttacksAdwareMITMAttacksComputerNetworksMalwareSocialEngineeringMaliciousAppsRansomwareAICyberThreatsDataBreachesSoftwareBotnetZero-DayExploitSOSInsiderThreatsOutsiderThreatsPhishingAttackIotAttacks

CYBERSECURITY THREATS - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. POS
  2. Customer Data Theft
  3. Dark-Hotel Hacking
  4. Computer Viruses
  5. Wi-Fi Vulnerabilities
  6. Cybersecurity Threats
  7. DDoS Attacks
  8. Adware
  9. MITM Attacks
  10. Computer Networks
  11. Malware
  12. Social Engineering
  13. Malicious Apps
  14. Ransomware
  15. AI Cyber Threats
  16. Data Breaches
  17. Software
  18. Botnet
  19. Zero-Day Exploit
  20. SOS
  21. Insider Threats
  22. Outsider Threats
  23. Phishing Attack
  24. Iot Attacks