Major VideoGame CompanyHackedSource code oruser data isleakedNew MobileMalware StrainInfectsthousands ofAndroid or iOSdevicesCryptocurrencyExchangeHackedWith lossesexceeding $100Million USDNew APT Group isIdentifiedA previouslyunknownAdvancedPersistent Threatgroup is namedEthical HackerDiscloses a Flaw Receives a record-breaking bugbounty payoutMassive DDoSAttack Carried out bya botnet of IoT(smart) devicesPhysical IntrusionNews reports asuccessfulcorporate breachvia socialengineering (e.g.,tailgating)Supply ChainAttack A widely usedsoftware vendoris compromisedZero-DayVulnerabilityFound in a majorweb browser(Chrome, Safari,Edge, Firefox)Data Breach at aMajor Tech Firm Affecting > 1million userrecords"Passwordless"AuthenticationMethod Is successfullybypassed orbreachedAI-PoweredDeepfakeUsed in asuccessfulcorporate fraudcaseGovernmentAnnouncesNewCybersecurityRegulationsNew Strain of"Wiper"MalwareDesigned todestroy data isdiscoveredNation-StateActorPubliclyattributed to asignificantcyberattackCriticalVulnerability(CVSS > 9.0)Disclosed in apopular open-source libraryDarknetMarketplaceTakedownAnnounced byinternational lawenforcementMajor CloudProvider (AWS,Azure, GCP)Experiences asecurity-relatedoutageRansomwareAttack on CriticalInfrastructure(Hospital, PowerGrid, SchoolDistrict)FinancialInstitution HaltsTradingDue to a "cyberincident"New PhishingCampaign Leveraging amajor global event(e.g., Olympics,election)ElectionDisruptedBy a cyberattackor a majordisinformationcampaignSocial MediaPlatformUsed to spreadmalware at alarge scaleC-LevelExecutive(CEO/CISO)ResignsFollowing a majorsecurity breachMajor VideoGame CompanyHackedSource code oruser data isleakedNew MobileMalware StrainInfectsthousands ofAndroid or iOSdevicesCryptocurrencyExchangeHackedWith lossesexceeding $100Million USDNew APT Group isIdentifiedA previouslyunknownAdvancedPersistent Threatgroup is namedEthical HackerDiscloses a Flaw Receives a record-breaking bugbounty payoutMassive DDoSAttack Carried out bya botnet of IoT(smart) devicesPhysical IntrusionNews reports asuccessfulcorporate breachvia socialengineering (e.g.,tailgating)Supply ChainAttack A widely usedsoftware vendoris compromisedZero-DayVulnerabilityFound in a majorweb browser(Chrome, Safari,Edge, Firefox)Data Breach at aMajor Tech Firm Affecting > 1million userrecords"Passwordless"AuthenticationMethod Is successfullybypassed orbreachedAI-PoweredDeepfakeUsed in asuccessfulcorporate fraudcaseGovernmentAnnouncesNewCybersecurityRegulationsNew Strain of"Wiper"MalwareDesigned todestroy data isdiscoveredNation-StateActorPubliclyattributed to asignificantcyberattackCriticalVulnerability(CVSS > 9.0)Disclosed in apopular open-source libraryDarknetMarketplaceTakedownAnnounced byinternational lawenforcementMajor CloudProvider (AWS,Azure, GCP)Experiences asecurity-relatedoutageRansomwareAttack on CriticalInfrastructure(Hospital, PowerGrid, SchoolDistrict)FinancialInstitution HaltsTradingDue to a "cyberincident"New PhishingCampaign Leveraging amajor global event(e.g., Olympics,election)ElectionDisruptedBy a cyberattackor a majordisinformationcampaignSocial MediaPlatformUsed to spreadmalware at alarge scaleC-LevelExecutive(CEO/CISO)ResignsFollowing a majorsecurity breach

Information Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Major Video Game Company Hacked Source code or user data is leaked
  2. New Mobile Malware Strain Infects thousands of Android or iOS devices
  3. Cryptocurrency Exchange Hacked With losses exceeding $100 Million USD
  4. New APT Group is Identified A previously unknown Advanced Persistent Threat group is named
  5. Ethical Hacker Discloses a Flaw Receives a record-breaking bug bounty payout
  6. Massive DDoS Attack Carried out by a botnet of IoT (smart) devices
  7. Physical Intrusion News reports a successful corporate breach via social engineering (e.g., tailgating)
  8. Supply Chain Attack A widely used software vendor is compromised
  9. Zero-Day Vulnerability Found in a major web browser (Chrome, Safari, Edge, Firefox)
  10. Data Breach at a Major Tech Firm Affecting > 1 million user records
  11. "Passwordless" Authentication Method Is successfully bypassed or breached
  12. AI-Powered Deepfake Used in a successful corporate fraud case
  13. Government Announces New Cybersecurity Regulations
  14. New Strain of "Wiper" Malware Designed to destroy data is discovered
  15. Nation-State Actor Publicly attributed to a significant cyberattack
  16. Critical Vulnerability (CVSS > 9.0) Disclosed in a popular open-source library
  17. Darknet Marketplace Takedown Announced by international law enforcement
  18. Major Cloud Provider (AWS, Azure, GCP) Experiences a security-related outage
  19. Ransomware Attack on Critical Infrastructure (Hospital, Power Grid, School District)
  20. Financial Institution Halts Trading Due to a "cyber incident"
  21. New Phishing Campaign Leveraging a major global event (e.g., Olympics, election)
  22. Election Disrupted By a cyberattack or a major disinformation campaign
  23. Social Media Platform Used to spread malware at a large scale
  24. C-Level Executive (CEO/CISO) Resigns Following a major security breach