CustomerDataTheftPOSPhishingAttackSOSIotAttacksMaliciousAppsRansomwareMalwareDDoSAttacksSoftwareInsiderThreatsMITMAttacksBotnetComputerVirusesDark-HotelHackingAICyberThreatsOutsiderThreatsDataBreachesComputerNetworksSocialEngineeringCybersecurityThreatsZero-DayExploitAdwareWi-FiVulnerabilitiesCustomerDataTheftPOSPhishingAttackSOSIotAttacksMaliciousAppsRansomwareMalwareDDoSAttacksSoftwareInsiderThreatsMITMAttacksBotnetComputerVirusesDark-HotelHackingAICyberThreatsOutsiderThreatsDataBreachesComputerNetworksSocialEngineeringCybersecurityThreatsZero-DayExploitAdwareWi-FiVulnerabilities

CYBERSECURITY THREATS - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Customer Data Theft
  2. POS
  3. Phishing Attack
  4. SOS
  5. Iot Attacks
  6. Malicious Apps
  7. Ransomware
  8. Malware
  9. DDoS Attacks
  10. Software
  11. Insider Threats
  12. MITM Attacks
  13. Botnet
  14. Computer Viruses
  15. Dark-Hotel Hacking
  16. AI Cyber Threats
  17. Outsider Threats
  18. Data Breaches
  19. Computer Networks
  20. Social Engineering
  21. Cybersecurity Threats
  22. Zero-Day Exploit
  23. Adware
  24. Wi-Fi Vulnerabilities