Major CloudProvider (AWS,Azure, GCP)Experiences asecurity-relatedoutage"Passwordless"AuthenticationMethod Is successfullybypassed orbreachedRansomwareAttack on CriticalInfrastructure(Hospital, PowerGrid, SchoolDistrict)Ethical HackerDiscloses a Flaw Receives a record-breaking bugbounty payoutMassive DDoSAttack Carried out bya botnet of IoT(smart) devicesNew Strain of"Wiper"MalwareDesigned todestroy data isdiscoveredNew PhishingCampaign Leveraging amajor global event(e.g., Olympics,election)DarknetMarketplaceTakedownAnnounced byinternational lawenforcementElectionDisruptedBy a cyberattackor a majordisinformationcampaignPhysical IntrusionNews reports asuccessfulcorporate breachvia socialengineering (e.g.,tailgating)Nation-StateActorPubliclyattributed to asignificantcyberattackAI-PoweredDeepfakeUsed in asuccessfulcorporate fraudcaseCriticalVulnerability(CVSS > 9.0)Disclosed in apopular open-source librarySupply ChainAttack A widely usedsoftware vendoris compromisedCryptocurrencyExchangeHackedWith lossesexceeding $100Million USDGovernmentAnnouncesNewCybersecurityRegulationsC-LevelExecutive(CEO/CISO)ResignsFollowing a majorsecurity breachZero-DayVulnerabilityFound in a majorweb browser(Chrome, Safari,Edge, Firefox)Data Breach at aMajor Tech Firm Affecting > 1million userrecordsMajor VideoGame CompanyHackedSource code oruser data isleakedFinancialInstitution HaltsTradingDue to a "cyberincident"Social MediaPlatformUsed to spreadmalware at alarge scaleNew MobileMalware StrainInfectsthousands ofAndroid or iOSdevicesNew APT Group isIdentifiedA previouslyunknownAdvancedPersistent Threatgroup is namedMajor CloudProvider (AWS,Azure, GCP)Experiences asecurity-relatedoutage"Passwordless"AuthenticationMethod Is successfullybypassed orbreachedRansomwareAttack on CriticalInfrastructure(Hospital, PowerGrid, SchoolDistrict)Ethical HackerDiscloses a Flaw Receives a record-breaking bugbounty payoutMassive DDoSAttack Carried out bya botnet of IoT(smart) devicesNew Strain of"Wiper"MalwareDesigned todestroy data isdiscoveredNew PhishingCampaign Leveraging amajor global event(e.g., Olympics,election)DarknetMarketplaceTakedownAnnounced byinternational lawenforcementElectionDisruptedBy a cyberattackor a majordisinformationcampaignPhysical IntrusionNews reports asuccessfulcorporate breachvia socialengineering (e.g.,tailgating)Nation-StateActorPubliclyattributed to asignificantcyberattackAI-PoweredDeepfakeUsed in asuccessfulcorporate fraudcaseCriticalVulnerability(CVSS > 9.0)Disclosed in apopular open-source librarySupply ChainAttack A widely usedsoftware vendoris compromisedCryptocurrencyExchangeHackedWith lossesexceeding $100Million USDGovernmentAnnouncesNewCybersecurityRegulationsC-LevelExecutive(CEO/CISO)ResignsFollowing a majorsecurity breachZero-DayVulnerabilityFound in a majorweb browser(Chrome, Safari,Edge, Firefox)Data Breach at aMajor Tech Firm Affecting > 1million userrecordsMajor VideoGame CompanyHackedSource code oruser data isleakedFinancialInstitution HaltsTradingDue to a "cyberincident"Social MediaPlatformUsed to spreadmalware at alarge scaleNew MobileMalware StrainInfectsthousands ofAndroid or iOSdevicesNew APT Group isIdentifiedA previouslyunknownAdvancedPersistent Threatgroup is named

Information Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Major Cloud Provider (AWS, Azure, GCP) Experiences a security-related outage
  2. "Passwordless" Authentication Method Is successfully bypassed or breached
  3. Ransomware Attack on Critical Infrastructure (Hospital, Power Grid, School District)
  4. Ethical Hacker Discloses a Flaw Receives a record-breaking bug bounty payout
  5. Massive DDoS Attack Carried out by a botnet of IoT (smart) devices
  6. New Strain of "Wiper" Malware Designed to destroy data is discovered
  7. New Phishing Campaign Leveraging a major global event (e.g., Olympics, election)
  8. Darknet Marketplace Takedown Announced by international law enforcement
  9. Election Disrupted By a cyberattack or a major disinformation campaign
  10. Physical Intrusion News reports a successful corporate breach via social engineering (e.g., tailgating)
  11. Nation-State Actor Publicly attributed to a significant cyberattack
  12. AI-Powered Deepfake Used in a successful corporate fraud case
  13. Critical Vulnerability (CVSS > 9.0) Disclosed in a popular open-source library
  14. Supply Chain Attack A widely used software vendor is compromised
  15. Cryptocurrency Exchange Hacked With losses exceeding $100 Million USD
  16. Government Announces New Cybersecurity Regulations
  17. C-Level Executive (CEO/CISO) Resigns Following a major security breach
  18. Zero-Day Vulnerability Found in a major web browser (Chrome, Safari, Edge, Firefox)
  19. Data Breach at a Major Tech Firm Affecting > 1 million user records
  20. Major Video Game Company Hacked Source code or user data is leaked
  21. Financial Institution Halts Trading Due to a "cyber incident"
  22. Social Media Platform Used to spread malware at a large scale
  23. New Mobile Malware Strain Infects thousands of Android or iOS devices
  24. New APT Group is Identified A previously unknown Advanced Persistent Threat group is named