Man-in-the-MiddleAttack 👀ThreatIntelligenceFeeds 📡InputValidationDark WebDataLeak 🌑BotnetAttack🤖InsiderThreat👥Malwarein Email📧Multi-FactorAuthentication(MFA) 🔐PasswordManagers🔑AdvancedPersistentThreat(APT) 🕵️‍♂️Ransomware💰DDoSAttack🌊IncidentResponsePlan 📜NetworkSegmentation🏢Fake Wi-Fi Attack📡IntrusionDetectionSystem(IDS) 👀BruteForceAttack 🔨Zero-DayExploit🚨SQLInjection🖥OSINTMonitoring🔍EmailAuthenticationIoTHacking🤖Credentialsniffing🔑PhishingAttack🎣Man-in-the-MiddleAttack 👀ThreatIntelligenceFeeds 📡InputValidationDark WebDataLeak 🌑BotnetAttack🤖InsiderThreat👥Malwarein Email📧Multi-FactorAuthentication(MFA) 🔐PasswordManagers🔑AdvancedPersistentThreat(APT) 🕵️‍♂️Ransomware💰DDoSAttack🌊IncidentResponsePlan 📜NetworkSegmentation🏢Fake Wi-Fi Attack📡IntrusionDetectionSystem(IDS) 👀BruteForceAttack 🔨Zero-DayExploit🚨SQLInjection🖥OSINTMonitoring🔍EmailAuthenticationIoTHacking🤖Credentialsniffing🔑PhishingAttack🎣

Cyber Threat Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
I
2
G
3
G
4
O
5
B
6
O
7
B
8
N
9
G
10
I
11
B
12
B
13
N
14
N
15
O
16
N
17
O
18
O
19
I
20
G
21
G
22
I
23
B
24
I
  1. I-Man-in-the-Middle Attack 👀
  2. G-Threat Intelligence Feeds 📡
  3. G-Input Validation ✅
  4. O-Dark Web Data Leak 🌑
  5. B-Botnet Attack 🤖
  6. O-Insider Threat 👥
  7. B-Malware in Email 📧
  8. N-Multi-Factor Authentication (MFA) 🔐
  9. G-Password Managers 🔑
  10. I-Advanced Persistent Threat (APT) 🕵️‍♂️
  11. B-Ransomware 💰
  12. B-DDoS Attack 🌊
  13. N-Incident Response Plan 📜
  14. N-Network Segmentation 🏢
  15. O-Fake Wi-Fi Attack 📡
  16. N-Intrusion Detection System (IDS) 👀
  17. O-Brute Force Attack 🔨
  18. O-Zero-Day Exploit 🚨
  19. I-SQL Injection 🖥
  20. G-OSINT Monitoring 🔍
  21. G-Email Authentication ✔
  22. I-IoT Hacking 🤖
  23. B-Credential sniffing 🔑
  24. I-Phishing Attack 🎣