Supply ChainAttack A widely usedsoftware vendoris compromisedDarknetMarketplaceTakedownAnnounced byinternational lawenforcementNew Strain of"Wiper"MalwareDesigned todestroy data isdiscoveredC-LevelExecutive(CEO/CISO)ResignsFollowing a majorsecurity breachNew APT Group isIdentifiedA previouslyunknownAdvancedPersistent Threatgroup is namedFinancialInstitution HaltsTradingDue to a "cyberincident"Massive DDoSAttack Carried out bya botnet of IoT(smart) devicesGovernmentAnnouncesNewCybersecurityRegulationsCryptocurrencyExchangeHackedWith lossesexceeding $100Million USDRansomwareAttack on CriticalInfrastructure(Hospital, PowerGrid, SchoolDistrict)Data Breach at aMajor Tech Firm Affecting > 1million userrecordsNew PhishingCampaign Leveraging amajor global event(e.g., Olympics,election)ElectionDisruptedBy a cyberattackor a majordisinformationcampaignNation-StateActorPubliclyattributed to asignificantcyberattackEthical HackerDiscloses a Flaw Receives a record-breaking bugbounty payoutCriticalVulnerability(CVSS > 9.0)Disclosed in apopular open-source libraryNew MobileMalware StrainInfectsthousands ofAndroid or iOSdevicesAI-PoweredDeepfakeUsed in asuccessfulcorporate fraudcasePhysical IntrusionNews reports asuccessfulcorporate breachvia socialengineering (e.g.,tailgating)"Passwordless"AuthenticationMethod Is successfullybypassed orbreachedSocial MediaPlatformUsed to spreadmalware at alarge scaleMajor CloudProvider (AWS,Azure, GCP)Experiences asecurity-relatedoutageMajor VideoGame CompanyHackedSource code oruser data isleakedZero-DayVulnerabilityFound in a majorweb browser(Chrome, Safari,Edge, Firefox)Supply ChainAttack A widely usedsoftware vendoris compromisedDarknetMarketplaceTakedownAnnounced byinternational lawenforcementNew Strain of"Wiper"MalwareDesigned todestroy data isdiscoveredC-LevelExecutive(CEO/CISO)ResignsFollowing a majorsecurity breachNew APT Group isIdentifiedA previouslyunknownAdvancedPersistent Threatgroup is namedFinancialInstitution HaltsTradingDue to a "cyberincident"Massive DDoSAttack Carried out bya botnet of IoT(smart) devicesGovernmentAnnouncesNewCybersecurityRegulationsCryptocurrencyExchangeHackedWith lossesexceeding $100Million USDRansomwareAttack on CriticalInfrastructure(Hospital, PowerGrid, SchoolDistrict)Data Breach at aMajor Tech Firm Affecting > 1million userrecordsNew PhishingCampaign Leveraging amajor global event(e.g., Olympics,election)ElectionDisruptedBy a cyberattackor a majordisinformationcampaignNation-StateActorPubliclyattributed to asignificantcyberattackEthical HackerDiscloses a Flaw Receives a record-breaking bugbounty payoutCriticalVulnerability(CVSS > 9.0)Disclosed in apopular open-source libraryNew MobileMalware StrainInfectsthousands ofAndroid or iOSdevicesAI-PoweredDeepfakeUsed in asuccessfulcorporate fraudcasePhysical IntrusionNews reports asuccessfulcorporate breachvia socialengineering (e.g.,tailgating)"Passwordless"AuthenticationMethod Is successfullybypassed orbreachedSocial MediaPlatformUsed to spreadmalware at alarge scaleMajor CloudProvider (AWS,Azure, GCP)Experiences asecurity-relatedoutageMajor VideoGame CompanyHackedSource code oruser data isleakedZero-DayVulnerabilityFound in a majorweb browser(Chrome, Safari,Edge, Firefox)

Information Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Supply Chain Attack A widely used software vendor is compromised
  2. Darknet Marketplace Takedown Announced by international law enforcement
  3. New Strain of "Wiper" Malware Designed to destroy data is discovered
  4. C-Level Executive (CEO/CISO) Resigns Following a major security breach
  5. New APT Group is Identified A previously unknown Advanced Persistent Threat group is named
  6. Financial Institution Halts Trading Due to a "cyber incident"
  7. Massive DDoS Attack Carried out by a botnet of IoT (smart) devices
  8. Government Announces New Cybersecurity Regulations
  9. Cryptocurrency Exchange Hacked With losses exceeding $100 Million USD
  10. Ransomware Attack on Critical Infrastructure (Hospital, Power Grid, School District)
  11. Data Breach at a Major Tech Firm Affecting > 1 million user records
  12. New Phishing Campaign Leveraging a major global event (e.g., Olympics, election)
  13. Election Disrupted By a cyberattack or a major disinformation campaign
  14. Nation-State Actor Publicly attributed to a significant cyberattack
  15. Ethical Hacker Discloses a Flaw Receives a record-breaking bug bounty payout
  16. Critical Vulnerability (CVSS > 9.0) Disclosed in a popular open-source library
  17. New Mobile Malware Strain Infects thousands of Android or iOS devices
  18. AI-Powered Deepfake Used in a successful corporate fraud case
  19. Physical Intrusion News reports a successful corporate breach via social engineering (e.g., tailgating)
  20. "Passwordless" Authentication Method Is successfully bypassed or breached
  21. Social Media Platform Used to spread malware at a large scale
  22. Major Cloud Provider (AWS, Azure, GCP) Experiences a security-related outage
  23. Major Video Game Company Hacked Source code or user data is leaked
  24. Zero-Day Vulnerability Found in a major web browser (Chrome, Safari, Edge, Firefox)