ComputerVirusesSoftwareWi-FiVulnerabilitiesOutsiderThreatsComputerNetworksAICyberThreatsCybersecurityThreatsDark-HotelHackingDataBreachesBotnetCustomerDataTheftMaliciousAppsPhishingAttackZero-DayExploitSocialEngineeringSOSAdwarePOSIotAttacksInsiderThreatsMalwareRansomwareDDoSAttacksMITMAttacksComputerVirusesSoftwareWi-FiVulnerabilitiesOutsiderThreatsComputerNetworksAICyberThreatsCybersecurityThreatsDark-HotelHackingDataBreachesBotnetCustomerDataTheftMaliciousAppsPhishingAttackZero-DayExploitSocialEngineeringSOSAdwarePOSIotAttacksInsiderThreatsMalwareRansomwareDDoSAttacksMITMAttacks

CYBERSECURITY THREATS - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Computer Viruses
  2. Software
  3. Wi-Fi Vulnerabilities
  4. Outsider Threats
  5. Computer Networks
  6. AI Cyber Threats
  7. Cybersecurity Threats
  8. Dark-Hotel Hacking
  9. Data Breaches
  10. Botnet
  11. Customer Data Theft
  12. Malicious Apps
  13. Phishing Attack
  14. Zero-Day Exploit
  15. Social Engineering
  16. SOS
  17. Adware
  18. POS
  19. Iot Attacks
  20. Insider Threats
  21. Malware
  22. Ransomware
  23. DDoS Attacks
  24. MITM Attacks