Disruption- Chaos Attacks ISACs Attack Surfaces Espionage Attacks APTs Ethical Attacks OSINT Threat Vectors Revenge Attacks Corporate Espionage IoCs Data Exfiltration Attacks White- Hat Hackers Service Disruption Attacks STIX Organized Crime Attackers Closed- Source Intelligence Threat Actors Free! Gray- Hat Hackers War Attacks Predictive Analysis Zero- Day Attacks Philosophical- Political Belief Attacks Hacktivists Insider Threat Financial Gain Attacks Threat Maps Threat Intelligence Dark Web Blackmail Attacks Nation- State Attackers TTPs Shadow IT Script Kiddie Vulnerability Databases Black- Hat Hackers Disruption- Chaos Attacks ISACs Attack Surfaces Espionage Attacks APTs Ethical Attacks OSINT Threat Vectors Revenge Attacks Corporate Espionage IoCs Data Exfiltration Attacks White- Hat Hackers Service Disruption Attacks STIX Organized Crime Attackers Closed- Source Intelligence Threat Actors Free! Gray- Hat Hackers War Attacks Predictive Analysis Zero- Day Attacks Philosophical- Political Belief Attacks Hacktivists Insider Threat Financial Gain Attacks Threat Maps Threat Intelligence Dark Web Blackmail Attacks Nation- State Attackers TTPs Shadow IT Script Kiddie Vulnerability Databases Black- Hat Hackers
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Disruption-Chaos Attacks
ISACs
Attack Surfaces
Espionage Attacks
APTs
Ethical Attacks
OSINT
Threat Vectors
Revenge Attacks
Corporate Espionage
IoCs
Data Exfiltration Attacks
White-Hat Hackers
Service Disruption Attacks
STIX
Organized Crime Attackers
Closed-Source Intelligence
Threat Actors
Free!
Gray-Hat Hackers
War Attacks
Predictive Analysis
Zero-Day Attacks
Philosophical-Political Belief Attacks
Hacktivists
Insider Threat
Financial Gain Attacks
Threat Maps
Threat Intelligence
Dark Web
Blackmail Attacks
Nation-State Attackers
TTPs
Shadow IT
Script Kiddie
Vulnerability Databases
Black-Hat Hackers