ThreatIntelligenceFeeds 📡Malwarein Email📧IntrusionDetectionSystem(IDS) 👀OSINTMonitoring🔍InsiderThreat👥DDoSAttack🌊AdvancedPersistentThreat(APT) 🕵️‍♂️IncidentResponsePlan 📜InputValidationDark WebDataLeak 🌑BotnetAttack🤖PhishingAttack🎣NetworkSegmentation🏢Credentialsniffing🔑PasswordManagers🔑EmailAuthenticationFake Wi-Fi Attack📡Zero-DayExploit🚨Man-in-the-MiddleAttack 👀Ransomware💰BruteForceAttack 🔨Multi-FactorAuthentication(MFA) 🔐IoTHacking🤖SQLInjection🖥ThreatIntelligenceFeeds 📡Malwarein Email📧IntrusionDetectionSystem(IDS) 👀OSINTMonitoring🔍InsiderThreat👥DDoSAttack🌊AdvancedPersistentThreat(APT) 🕵️‍♂️IncidentResponsePlan 📜InputValidationDark WebDataLeak 🌑BotnetAttack🤖PhishingAttack🎣NetworkSegmentation🏢Credentialsniffing🔑PasswordManagers🔑EmailAuthenticationFake Wi-Fi Attack📡Zero-DayExploit🚨Man-in-the-MiddleAttack 👀Ransomware💰BruteForceAttack 🔨Multi-FactorAuthentication(MFA) 🔐IoTHacking🤖SQLInjection🖥

Cyber Threat Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
G
2
B
3
N
4
G
5
O
6
B
7
I
8
N
9
G
10
O
11
B
12
I
13
N
14
B
15
G
16
G
17
O
18
O
19
I
20
B
21
O
22
N
23
I
24
I
  1. G-Threat Intelligence Feeds 📡
  2. B-Malware in Email 📧
  3. N-Intrusion Detection System (IDS) 👀
  4. G-OSINT Monitoring 🔍
  5. O-Insider Threat 👥
  6. B-DDoS Attack 🌊
  7. I-Advanced Persistent Threat (APT) 🕵️‍♂️
  8. N-Incident Response Plan 📜
  9. G-Input Validation ✅
  10. O-Dark Web Data Leak 🌑
  11. B-Botnet Attack 🤖
  12. I-Phishing Attack 🎣
  13. N-Network Segmentation 🏢
  14. B-Credential sniffing 🔑
  15. G-Password Managers 🔑
  16. G-Email Authentication ✔
  17. O-Fake Wi-Fi Attack 📡
  18. O-Zero-Day Exploit 🚨
  19. I-Man-in-the-Middle Attack 👀
  20. B-Ransomware 💰
  21. O-Brute Force Attack 🔨
  22. N-Multi-Factor Authentication (MFA) 🔐
  23. I-IoT Hacking 🤖
  24. I-SQL Injection 🖥