AICyberThreatsPhishingAttackCustomerDataTheftSOSMITMAttacksCybersecurityThreatsMalwareDark-HotelHackingDDoSAttacksBotnetWi-FiVulnerabilitiesComputerVirusesAdwareOutsiderThreatsSocialEngineeringRansomwareMaliciousAppsPOSIotAttacksDataBreachesComputerNetworksSoftwareInsiderThreatsZero-DayExploitAICyberThreatsPhishingAttackCustomerDataTheftSOSMITMAttacksCybersecurityThreatsMalwareDark-HotelHackingDDoSAttacksBotnetWi-FiVulnerabilitiesComputerVirusesAdwareOutsiderThreatsSocialEngineeringRansomwareMaliciousAppsPOSIotAttacksDataBreachesComputerNetworksSoftwareInsiderThreatsZero-DayExploit

CYBERSECURITY THREATS - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. AI Cyber Threats
  2. Phishing Attack
  3. Customer Data Theft
  4. SOS
  5. MITM Attacks
  6. Cybersecurity Threats
  7. Malware
  8. Dark-Hotel Hacking
  9. DDoS Attacks
  10. Botnet
  11. Wi-Fi Vulnerabilities
  12. Computer Viruses
  13. Adware
  14. Outsider Threats
  15. Social Engineering
  16. Ransomware
  17. Malicious Apps
  18. POS
  19. Iot Attacks
  20. Data Breaches
  21. Computer Networks
  22. Software
  23. Insider Threats
  24. Zero-Day Exploit