Gray- Hat Hackers IoCs Espionage Attacks TTPs Free! Threat Actors Vulnerability Databases Disruption- Chaos Attacks Threat Intelligence Insider Threat Nation- State Attackers Threat Vectors Closed- Source Intelligence Ethical Attacks Blackmail Attacks Corporate Espionage Data Exfiltration Attacks Attack Surfaces STIX Black- Hat Hackers Shadow IT Service Disruption Attacks Threat Maps Script Kiddie Zero- Day Attacks OSINT Financial Gain Attacks War Attacks Hacktivists ISACs Dark Web Predictive Analysis Revenge Attacks Organized Crime Attackers White- Hat Hackers Philosophical- Political Belief Attacks APTs Gray- Hat Hackers IoCs Espionage Attacks TTPs Free! Threat Actors Vulnerability Databases Disruption- Chaos Attacks Threat Intelligence Insider Threat Nation- State Attackers Threat Vectors Closed- Source Intelligence Ethical Attacks Blackmail Attacks Corporate Espionage Data Exfiltration Attacks Attack Surfaces STIX Black- Hat Hackers Shadow IT Service Disruption Attacks Threat Maps Script Kiddie Zero- Day Attacks OSINT Financial Gain Attacks War Attacks Hacktivists ISACs Dark Web Predictive Analysis Revenge Attacks Organized Crime Attackers White- Hat Hackers Philosophical- Political Belief Attacks APTs
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Gray-Hat Hackers
IoCs
Espionage Attacks
TTPs
Free!
Threat Actors
Vulnerability Databases
Disruption-Chaos Attacks
Threat Intelligence
Insider Threat
Nation-State Attackers
Threat Vectors
Closed-Source Intelligence
Ethical Attacks
Blackmail Attacks
Corporate Espionage
Data Exfiltration Attacks
Attack Surfaces
STIX
Black-Hat Hackers
Shadow IT
Service Disruption Attacks
Threat Maps
Script Kiddie
Zero-Day Attacks
OSINT
Financial Gain Attacks
War Attacks
Hacktivists
ISACs
Dark Web
Predictive Analysis
Revenge Attacks
Organized Crime Attackers
White-Hat Hackers
Philosophical-Political Belief Attacks
APTs