DataBreachesAICyberThreatsMalwareDark-HotelHackingBotnetCybersecurityThreatsPhishingAttackAdwareSocialEngineeringComputerNetworksPOSMaliciousAppsZero-DayExploitInsiderThreatsRansomwareDDoSAttacksCustomerDataTheftSoftwareMITMAttacksSOSComputerVirusesIotAttacksOutsiderThreatsWi-FiVulnerabilitiesDataBreachesAICyberThreatsMalwareDark-HotelHackingBotnetCybersecurityThreatsPhishingAttackAdwareSocialEngineeringComputerNetworksPOSMaliciousAppsZero-DayExploitInsiderThreatsRansomwareDDoSAttacksCustomerDataTheftSoftwareMITMAttacksSOSComputerVirusesIotAttacksOutsiderThreatsWi-FiVulnerabilities

CYBERSECURITY THREATS - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Data Breaches
  2. AI Cyber Threats
  3. Malware
  4. Dark-Hotel Hacking
  5. Botnet
  6. Cybersecurity Threats
  7. Phishing Attack
  8. Adware
  9. Social Engineering
  10. Computer Networks
  11. POS
  12. Malicious Apps
  13. Zero-Day Exploit
  14. Insider Threats
  15. Ransomware
  16. DDoS Attacks
  17. Customer Data Theft
  18. Software
  19. MITM Attacks
  20. SOS
  21. Computer Viruses
  22. Iot Attacks
  23. Outsider Threats
  24. Wi-Fi Vulnerabilities