Black- Hat Hackers Gray- Hat Hackers Shadow IT Free! OSINT Blackmail Attacks Philosophical- Political Belief Attacks IoCs Predictive Analysis Threat Intelligence Nation- State Attackers Corporate Espionage White- Hat Hackers Zero- Day Attacks Dark Web Threat Actors ISACs Closed- Source Intelligence Attack Surfaces Service Disruption Attacks Data Exfiltration Attacks TTPs Disruption- Chaos Attacks War Attacks Threat Vectors Revenge Attacks Financial Gain Attacks Espionage Attacks Threat Maps STIX Ethical Attacks Vulnerability Databases Organized Crime Attackers Script Kiddie APTs Insider Threat Hacktivists Black- Hat Hackers Gray- Hat Hackers Shadow IT Free! OSINT Blackmail Attacks Philosophical- Political Belief Attacks IoCs Predictive Analysis Threat Intelligence Nation- State Attackers Corporate Espionage White- Hat Hackers Zero- Day Attacks Dark Web Threat Actors ISACs Closed- Source Intelligence Attack Surfaces Service Disruption Attacks Data Exfiltration Attacks TTPs Disruption- Chaos Attacks War Attacks Threat Vectors Revenge Attacks Financial Gain Attacks Espionage Attacks Threat Maps STIX Ethical Attacks Vulnerability Databases Organized Crime Attackers Script Kiddie APTs Insider Threat Hacktivists
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Black-Hat Hackers
Gray-Hat Hackers
Shadow IT
Free!
OSINT
Blackmail Attacks
Philosophical-Political Belief Attacks
IoCs
Predictive Analysis
Threat Intelligence
Nation-State Attackers
Corporate Espionage
White-Hat Hackers
Zero-Day Attacks
Dark Web
Threat Actors
ISACs
Closed-Source Intelligence
Attack Surfaces
Service Disruption Attacks
Data Exfiltration Attacks
TTPs
Disruption-Chaos Attacks
War Attacks
Threat Vectors
Revenge Attacks
Financial Gain Attacks
Espionage Attacks
Threat Maps
STIX
Ethical Attacks
Vulnerability Databases
Organized Crime Attackers
Script Kiddie
APTs
Insider Threat
Hacktivists