(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
Supply Chain Attack
A widely used software vendor is compromised
Darknet Marketplace Takedown
Announced by international law enforcement
New Strain of "Wiper" Malware
Designed to destroy data is discovered
C-Level Executive (CEO/CISO) Resigns
Following a major security breach
New APT Group is Identified
A previously unknown Advanced Persistent Threat group is named
Financial Institution Halts Trading
Due to a "cyber incident"
Massive DDoS Attack
Carried out by a botnet of IoT (smart) devices
Government Announces New Cybersecurity Regulations
Cryptocurrency Exchange Hacked
With losses exceeding $100 Million USD
Ransomware Attack on Critical Infrastructure
(Hospital, Power Grid, School District)
Data Breach at a Major Tech Firm
Affecting > 1 million user records
New Phishing Campaign
Leveraging a major global event (e.g., Olympics, election)
Election Disrupted
By a cyberattack or a major disinformation campaign
Nation-State Actor
Publicly attributed to a significant cyberattack
Ethical Hacker Discloses a Flaw
Receives a record-breaking bug bounty payout
Critical Vulnerability (CVSS > 9.0)
Disclosed in a popular open-source library
New Mobile Malware Strain
Infects thousands of Android or iOS devices
AI-Powered Deepfake
Used in a successful corporate fraud case
Physical Intrusion
News reports a successful corporate breach via social engineering (e.g., tailgating)
"Passwordless" Authentication Method
Is successfully bypassed or breached
Social Media Platform
Used to spread malware at a large scale
Major Cloud Provider (AWS, Azure, GCP)
Experiences a security-related outage
Major Video Game Company Hacked
Source code or user data is leaked
Zero-Day Vulnerability
Found in a major web browser (Chrome, Safari, Edge, Firefox)