Zero-DayExploit🚨InputValidationMan-in-the-MiddleAttack 👀PasswordManagers🔑IoTHacking🤖PhishingAttack🎣SQLInjection🖥Malwarein Email📧OSINTMonitoring🔍InsiderThreat👥EmailAuthenticationThreatIntelligenceFeeds 📡Dark WebDataLeak 🌑AdvancedPersistentThreat(APT) 🕵️‍♂️BotnetAttack🤖DDoSAttack🌊IntrusionDetectionSystem(IDS) 👀BruteForceAttack 🔨Fake Wi-Fi Attack📡Multi-FactorAuthentication(MFA) 🔐IncidentResponsePlan 📜NetworkSegmentation🏢Credentialsniffing🔑Ransomware💰Zero-DayExploit🚨InputValidationMan-in-the-MiddleAttack 👀PasswordManagers🔑IoTHacking🤖PhishingAttack🎣SQLInjection🖥Malwarein Email📧OSINTMonitoring🔍InsiderThreat👥EmailAuthenticationThreatIntelligenceFeeds 📡Dark WebDataLeak 🌑AdvancedPersistentThreat(APT) 🕵️‍♂️BotnetAttack🤖DDoSAttack🌊IntrusionDetectionSystem(IDS) 👀BruteForceAttack 🔨Fake Wi-Fi Attack📡Multi-FactorAuthentication(MFA) 🔐IncidentResponsePlan 📜NetworkSegmentation🏢Credentialsniffing🔑Ransomware💰

Cyber Threat Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
O
2
G
3
I
4
G
5
I
6
I
7
I
8
B
9
G
10
O
11
G
12
G
13
O
14
I
15
B
16
B
17
N
18
O
19
O
20
N
21
N
22
N
23
B
24
B
  1. O-Zero-Day Exploit 🚨
  2. G-Input Validation ✅
  3. I-Man-in-the-Middle Attack 👀
  4. G-Password Managers 🔑
  5. I-IoT Hacking 🤖
  6. I-Phishing Attack 🎣
  7. I-SQL Injection 🖥
  8. B-Malware in Email 📧
  9. G-OSINT Monitoring 🔍
  10. O-Insider Threat 👥
  11. G-Email Authentication ✔
  12. G-Threat Intelligence Feeds 📡
  13. O-Dark Web Data Leak 🌑
  14. I-Advanced Persistent Threat (APT) 🕵️‍♂️
  15. B-Botnet Attack 🤖
  16. B-DDoS Attack 🌊
  17. N-Intrusion Detection System (IDS) 👀
  18. O-Brute Force Attack 🔨
  19. O-Fake Wi-Fi Attack 📡
  20. N-Multi-Factor Authentication (MFA) 🔐
  21. N-Incident Response Plan 📜
  22. N-Network Segmentation 🏢
  23. B-Credential sniffing 🔑
  24. B-Ransomware 💰