Black-HatHackersGray-HatHackersShadowITFree!OSINTBlackmailAttacksPhilosophical-Political BeliefAttacksIoCsPredictiveAnalysisThreatIntelligenceNation-StateAttackersCorporateEspionageWhite-HatHackersZero-DayAttacksDarkWebThreatActorsISACsClosed-SourceIntelligenceAttackSurfacesServiceDisruptionAttacksDataExfiltrationAttacksTTPsDisruption-ChaosAttacksWarAttacksThreatVectorsRevengeAttacksFinancialGainAttacksEspionageAttacksThreatMapsSTIXEthicalAttacksVulnerabilityDatabasesOrganizedCrimeAttackersScriptKiddieAPTsInsiderThreatHacktivistsBlack-HatHackersGray-HatHackersShadowITFree!OSINTBlackmailAttacksPhilosophical-Political BeliefAttacksIoCsPredictiveAnalysisThreatIntelligenceNation-StateAttackersCorporateEspionageWhite-HatHackersZero-DayAttacksDarkWebThreatActorsISACsClosed-SourceIntelligenceAttackSurfacesServiceDisruptionAttacksDataExfiltrationAttacksTTPsDisruption-ChaosAttacksWarAttacksThreatVectorsRevengeAttacksFinancialGainAttacksEspionageAttacksThreatMapsSTIXEthicalAttacksVulnerabilityDatabasesOrganizedCrimeAttackersScriptKiddieAPTsInsiderThreatHacktivists

CHAPTER 2 SEC+ - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. Black-Hat Hackers
  2. Gray-Hat Hackers
  3. Shadow IT
  4. Free!
  5. OSINT
  6. Blackmail Attacks
  7. Philosophical-Political Belief Attacks
  8. IoCs
  9. Predictive Analysis
  10. Threat Intelligence
  11. Nation-State Attackers
  12. Corporate Espionage
  13. White-Hat Hackers
  14. Zero-Day Attacks
  15. Dark Web
  16. Threat Actors
  17. ISACs
  18. Closed-Source Intelligence
  19. Attack Surfaces
  20. Service Disruption Attacks
  21. Data Exfiltration Attacks
  22. TTPs
  23. Disruption-Chaos Attacks
  24. War Attacks
  25. Threat Vectors
  26. Revenge Attacks
  27. Financial Gain Attacks
  28. Espionage Attacks
  29. Threat Maps
  30. STIX
  31. Ethical Attacks
  32. Vulnerability Databases
  33. Organized Crime Attackers
  34. Script Kiddie
  35. APTs
  36. Insider Threat
  37. Hacktivists