AdwareDark-HotelHackingDataBreachesPhishingAttackBotnetAICyberThreatsCustomerDataTheftZero-DayExploitRansomwareSOSMalwarePOSMITMAttacksCybersecurityThreatsSoftwareComputerNetworksIotAttacksWi-FiVulnerabilitiesSocialEngineeringMaliciousAppsInsiderThreatsDDoSAttacksComputerVirusesOutsiderThreatsAdwareDark-HotelHackingDataBreachesPhishingAttackBotnetAICyberThreatsCustomerDataTheftZero-DayExploitRansomwareSOSMalwarePOSMITMAttacksCybersecurityThreatsSoftwareComputerNetworksIotAttacksWi-FiVulnerabilitiesSocialEngineeringMaliciousAppsInsiderThreatsDDoSAttacksComputerVirusesOutsiderThreats

CYBERSECURITY THREATS - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Adware
  2. Dark-Hotel Hacking
  3. Data Breaches
  4. Phishing Attack
  5. Botnet
  6. AI Cyber Threats
  7. Customer Data Theft
  8. Zero-Day Exploit
  9. Ransomware
  10. SOS
  11. Malware
  12. POS
  13. MITM Attacks
  14. Cybersecurity Threats
  15. Software
  16. Computer Networks
  17. Iot Attacks
  18. Wi-Fi Vulnerabilities
  19. Social Engineering
  20. Malicious Apps
  21. Insider Threats
  22. DDoS Attacks
  23. Computer Viruses
  24. Outsider Threats