Nation-StateActorPubliclyattributed to asignificantcyberattackZero-DayVulnerabilityFound in a majorweb browser(Chrome, Safari,Edge, Firefox)DarknetMarketplaceTakedownAnnounced byinternational lawenforcement"Passwordless"AuthenticationMethod Is successfullybypassed orbreachedMajor CloudProvider (AWS,Azure, GCP)Experiences asecurity-relatedoutageNew Strain of"Wiper"MalwareDesigned todestroy data isdiscoveredRansomwareAttack on CriticalInfrastructure(Hospital, PowerGrid, SchoolDistrict)Massive DDoSAttack Carried out bya botnet of IoT(smart) devicesCriticalVulnerability(CVSS > 9.0)Disclosed in apopular open-source libraryPhysical IntrusionNews reports asuccessfulcorporate breachvia socialengineering (e.g.,tailgating)Social MediaPlatformUsed to spreadmalware at alarge scaleNew MobileMalware StrainInfectsthousands ofAndroid or iOSdevicesC-LevelExecutive(CEO/CISO)ResignsFollowing a majorsecurity breachAI-PoweredDeepfakeUsed in asuccessfulcorporate fraudcaseNew APT Group isIdentifiedA previouslyunknownAdvancedPersistent Threatgroup is namedNew PhishingCampaign Leveraging amajor global event(e.g., Olympics,election)Supply ChainAttack A widely usedsoftware vendoris compromisedMajor VideoGame CompanyHackedSource code oruser data isleakedCryptocurrencyExchangeHackedWith lossesexceeding $100Million USDGovernmentAnnouncesNewCybersecurityRegulationsEthical HackerDiscloses a Flaw Receives a record-breaking bugbounty payoutElectionDisruptedBy a cyberattackor a majordisinformationcampaignData Breach at aMajor Tech Firm Affecting > 1million userrecordsFinancialInstitution HaltsTradingDue to a "cyberincident"Nation-StateActorPubliclyattributed to asignificantcyberattackZero-DayVulnerabilityFound in a majorweb browser(Chrome, Safari,Edge, Firefox)DarknetMarketplaceTakedownAnnounced byinternational lawenforcement"Passwordless"AuthenticationMethod Is successfullybypassed orbreachedMajor CloudProvider (AWS,Azure, GCP)Experiences asecurity-relatedoutageNew Strain of"Wiper"MalwareDesigned todestroy data isdiscoveredRansomwareAttack on CriticalInfrastructure(Hospital, PowerGrid, SchoolDistrict)Massive DDoSAttack Carried out bya botnet of IoT(smart) devicesCriticalVulnerability(CVSS > 9.0)Disclosed in apopular open-source libraryPhysical IntrusionNews reports asuccessfulcorporate breachvia socialengineering (e.g.,tailgating)Social MediaPlatformUsed to spreadmalware at alarge scaleNew MobileMalware StrainInfectsthousands ofAndroid or iOSdevicesC-LevelExecutive(CEO/CISO)ResignsFollowing a majorsecurity breachAI-PoweredDeepfakeUsed in asuccessfulcorporate fraudcaseNew APT Group isIdentifiedA previouslyunknownAdvancedPersistent Threatgroup is namedNew PhishingCampaign Leveraging amajor global event(e.g., Olympics,election)Supply ChainAttack A widely usedsoftware vendoris compromisedMajor VideoGame CompanyHackedSource code oruser data isleakedCryptocurrencyExchangeHackedWith lossesexceeding $100Million USDGovernmentAnnouncesNewCybersecurityRegulationsEthical HackerDiscloses a Flaw Receives a record-breaking bugbounty payoutElectionDisruptedBy a cyberattackor a majordisinformationcampaignData Breach at aMajor Tech Firm Affecting > 1million userrecordsFinancialInstitution HaltsTradingDue to a "cyberincident"

Information Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Nation-State Actor Publicly attributed to a significant cyberattack
  2. Zero-Day Vulnerability Found in a major web browser (Chrome, Safari, Edge, Firefox)
  3. Darknet Marketplace Takedown Announced by international law enforcement
  4. "Passwordless" Authentication Method Is successfully bypassed or breached
  5. Major Cloud Provider (AWS, Azure, GCP) Experiences a security-related outage
  6. New Strain of "Wiper" Malware Designed to destroy data is discovered
  7. Ransomware Attack on Critical Infrastructure (Hospital, Power Grid, School District)
  8. Massive DDoS Attack Carried out by a botnet of IoT (smart) devices
  9. Critical Vulnerability (CVSS > 9.0) Disclosed in a popular open-source library
  10. Physical Intrusion News reports a successful corporate breach via social engineering (e.g., tailgating)
  11. Social Media Platform Used to spread malware at a large scale
  12. New Mobile Malware Strain Infects thousands of Android or iOS devices
  13. C-Level Executive (CEO/CISO) Resigns Following a major security breach
  14. AI-Powered Deepfake Used in a successful corporate fraud case
  15. New APT Group is Identified A previously unknown Advanced Persistent Threat group is named
  16. New Phishing Campaign Leveraging a major global event (e.g., Olympics, election)
  17. Supply Chain Attack A widely used software vendor is compromised
  18. Major Video Game Company Hacked Source code or user data is leaked
  19. Cryptocurrency Exchange Hacked With losses exceeding $100 Million USD
  20. Government Announces New Cybersecurity Regulations
  21. Ethical Hacker Discloses a Flaw Receives a record-breaking bug bounty payout
  22. Election Disrupted By a cyberattack or a major disinformation campaign
  23. Data Breach at a Major Tech Firm Affecting > 1 million user records
  24. Financial Institution Halts Trading Due to a "cyber incident"