DDoSAttack🌊PhishingAttack🎣OSINTMonitoring🔍AdvancedPersistentThreat(APT) 🕵️‍♂️BotnetAttack🤖Multi-FactorAuthentication(MFA) 🔐Credentialsniffing🔑Fake Wi-Fi Attack📡Zero-DayExploit🚨Malwarein Email📧Man-in-the-MiddleAttack 👀ThreatIntelligenceFeeds 📡IoTHacking🤖InputValidationInsiderThreat👥Dark WebDataLeak 🌑BruteForceAttack 🔨SQLInjection🖥PasswordManagers🔑IntrusionDetectionSystem(IDS) 👀IncidentResponsePlan 📜NetworkSegmentation🏢Ransomware💰EmailAuthenticationDDoSAttack🌊PhishingAttack🎣OSINTMonitoring🔍AdvancedPersistentThreat(APT) 🕵️‍♂️BotnetAttack🤖Multi-FactorAuthentication(MFA) 🔐Credentialsniffing🔑Fake Wi-Fi Attack📡Zero-DayExploit🚨Malwarein Email📧Man-in-the-MiddleAttack 👀ThreatIntelligenceFeeds 📡IoTHacking🤖InputValidationInsiderThreat👥Dark WebDataLeak 🌑BruteForceAttack 🔨SQLInjection🖥PasswordManagers🔑IntrusionDetectionSystem(IDS) 👀IncidentResponsePlan 📜NetworkSegmentation🏢Ransomware💰EmailAuthentication

Cyber Threat Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
B
2
I
3
G
4
I
5
B
6
N
7
B
8
O
9
O
10
B
11
I
12
G
13
I
14
G
15
O
16
O
17
O
18
I
19
G
20
N
21
N
22
N
23
B
24
G
  1. B-DDoS Attack 🌊
  2. I-Phishing Attack 🎣
  3. G-OSINT Monitoring 🔍
  4. I-Advanced Persistent Threat (APT) 🕵️‍♂️
  5. B-Botnet Attack 🤖
  6. N-Multi-Factor Authentication (MFA) 🔐
  7. B-Credential sniffing 🔑
  8. O-Fake Wi-Fi Attack 📡
  9. O-Zero-Day Exploit 🚨
  10. B-Malware in Email 📧
  11. I-Man-in-the-Middle Attack 👀
  12. G-Threat Intelligence Feeds 📡
  13. I-IoT Hacking 🤖
  14. G-Input Validation ✅
  15. O-Insider Threat 👥
  16. O-Dark Web Data Leak 🌑
  17. O-Brute Force Attack 🔨
  18. I-SQL Injection 🖥
  19. G-Password Managers 🔑
  20. N-Intrusion Detection System (IDS) 👀
  21. N-Incident Response Plan 📜
  22. N-Network Segmentation 🏢
  23. B-Ransomware 💰
  24. G-Email Authentication ✔