InputValidationMan-in-the-MiddleAttack 👀Dark WebDataLeak 🌑PhishingAttack🎣DDoSAttack🌊IntrusionDetectionSystem(IDS) 👀BruteForceAttack 🔨Malwarein Email📧IoTHacking🤖NetworkSegmentation🏢AdvancedPersistentThreat(APT) 🕵️‍♂️Zero-DayExploit🚨PasswordManagers🔑Ransomware💰InsiderThreat👥Fake Wi-Fi Attack📡ThreatIntelligenceFeeds 📡SQLInjection🖥IncidentResponsePlan 📜Multi-FactorAuthentication(MFA) 🔐EmailAuthenticationBotnetAttack🤖OSINTMonitoring🔍Credentialsniffing🔑InputValidationMan-in-the-MiddleAttack 👀Dark WebDataLeak 🌑PhishingAttack🎣DDoSAttack🌊IntrusionDetectionSystem(IDS) 👀BruteForceAttack 🔨Malwarein Email📧IoTHacking🤖NetworkSegmentation🏢AdvancedPersistentThreat(APT) 🕵️‍♂️Zero-DayExploit🚨PasswordManagers🔑Ransomware💰InsiderThreat👥Fake Wi-Fi Attack📡ThreatIntelligenceFeeds 📡SQLInjection🖥IncidentResponsePlan 📜Multi-FactorAuthentication(MFA) 🔐EmailAuthenticationBotnetAttack🤖OSINTMonitoring🔍Credentialsniffing🔑

Cyber Threat Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
G
2
I
3
O
4
I
5
B
6
N
7
O
8
B
9
I
10
N
11
I
12
O
13
G
14
B
15
O
16
O
17
G
18
I
19
N
20
N
21
G
22
B
23
G
24
B
  1. G-Input Validation ✅
  2. I-Man-in-the-Middle Attack 👀
  3. O-Dark Web Data Leak 🌑
  4. I-Phishing Attack 🎣
  5. B-DDoS Attack 🌊
  6. N-Intrusion Detection System (IDS) 👀
  7. O-Brute Force Attack 🔨
  8. B-Malware in Email 📧
  9. I-IoT Hacking 🤖
  10. N-Network Segmentation 🏢
  11. I-Advanced Persistent Threat (APT) 🕵️‍♂️
  12. O-Zero-Day Exploit 🚨
  13. G-Password Managers 🔑
  14. B-Ransomware 💰
  15. O-Insider Threat 👥
  16. O-Fake Wi-Fi Attack 📡
  17. G-Threat Intelligence Feeds 📡
  18. I-SQL Injection 🖥
  19. N-Incident Response Plan 📜
  20. N-Multi-Factor Authentication (MFA) 🔐
  21. G-Email Authentication ✔
  22. B-Botnet Attack 🤖
  23. G-OSINT Monitoring 🔍
  24. B-Credential sniffing 🔑