InputValidationOSINTMonitoring🔍Dark WebDataLeak 🌑Man-in-the-MiddleAttack 👀AdvancedPersistentThreat(APT) 🕵️‍♂️InsiderThreat👥EmailAuthenticationRansomware💰BotnetAttack🤖SQLInjection🖥BruteForceAttack 🔨PasswordManagers🔑DDoSAttack🌊IntrusionDetectionSystem(IDS) 👀Credentialsniffing🔑Malwarein Email📧Fake Wi-Fi Attack📡ThreatIntelligenceFeeds 📡PhishingAttack🎣Zero-DayExploit🚨NetworkSegmentation🏢IncidentResponsePlan 📜Multi-FactorAuthentication(MFA) 🔐IoTHacking🤖InputValidationOSINTMonitoring🔍Dark WebDataLeak 🌑Man-in-the-MiddleAttack 👀AdvancedPersistentThreat(APT) 🕵️‍♂️InsiderThreat👥EmailAuthenticationRansomware💰BotnetAttack🤖SQLInjection🖥BruteForceAttack 🔨PasswordManagers🔑DDoSAttack🌊IntrusionDetectionSystem(IDS) 👀Credentialsniffing🔑Malwarein Email📧Fake Wi-Fi Attack📡ThreatIntelligenceFeeds 📡PhishingAttack🎣Zero-DayExploit🚨NetworkSegmentation🏢IncidentResponsePlan 📜Multi-FactorAuthentication(MFA) 🔐IoTHacking🤖

Cyber Threat Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
G
2
G
3
O
4
I
5
I
6
O
7
G
8
B
9
B
10
I
11
O
12
G
13
B
14
N
15
B
16
B
17
O
18
G
19
I
20
O
21
N
22
N
23
N
24
I
  1. G-Input Validation ✅
  2. G-OSINT Monitoring 🔍
  3. O-Dark Web Data Leak 🌑
  4. I-Man-in-the-Middle Attack 👀
  5. I-Advanced Persistent Threat (APT) 🕵️‍♂️
  6. O-Insider Threat 👥
  7. G-Email Authentication ✔
  8. B-Ransomware 💰
  9. B-Botnet Attack 🤖
  10. I-SQL Injection 🖥
  11. O-Brute Force Attack 🔨
  12. G-Password Managers 🔑
  13. B-DDoS Attack 🌊
  14. N-Intrusion Detection System (IDS) 👀
  15. B-Credential sniffing 🔑
  16. B-Malware in Email 📧
  17. O-Fake Wi-Fi Attack 📡
  18. G-Threat Intelligence Feeds 📡
  19. I-Phishing Attack 🎣
  20. O-Zero-Day Exploit 🚨
  21. N-Network Segmentation 🏢
  22. N-Incident Response Plan 📜
  23. N-Multi-Factor Authentication (MFA) 🔐
  24. I-IoT Hacking 🤖