War Attacks Gray- Hat Hackers Hacktivists Predictive Analysis Blackmail Attacks OSINT Revenge Attacks Shadow IT TTPs Threat Actors Free! ISACs Service Disruption Attacks Financial Gain Attacks Espionage Attacks IoCs Threat Intelligence Ethical Attacks Disruption- Chaos Attacks White- Hat Hackers Corporate Espionage Zero- Day Attacks Threat Maps STIX Dark Web APTs Data Exfiltration Attacks Insider Threat Script Kiddie Nation- State Attackers Closed- Source Intelligence Vulnerability Databases Black- Hat Hackers Philosophical- Political Belief Attacks Organized Crime Attackers Attack Surfaces Threat Vectors War Attacks Gray- Hat Hackers Hacktivists Predictive Analysis Blackmail Attacks OSINT Revenge Attacks Shadow IT TTPs Threat Actors Free! ISACs Service Disruption Attacks Financial Gain Attacks Espionage Attacks IoCs Threat Intelligence Ethical Attacks Disruption- Chaos Attacks White- Hat Hackers Corporate Espionage Zero- Day Attacks Threat Maps STIX Dark Web APTs Data Exfiltration Attacks Insider Threat Script Kiddie Nation- State Attackers Closed- Source Intelligence Vulnerability Databases Black- Hat Hackers Philosophical- Political Belief Attacks Organized Crime Attackers Attack Surfaces Threat Vectors
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
War Attacks
Gray-Hat Hackers
Hacktivists
Predictive Analysis
Blackmail Attacks
OSINT
Revenge Attacks
Shadow IT
TTPs
Threat Actors
Free!
ISACs
Service Disruption Attacks
Financial Gain Attacks
Espionage Attacks
IoCs
Threat Intelligence
Ethical Attacks
Disruption-Chaos Attacks
White-Hat Hackers
Corporate Espionage
Zero-Day Attacks
Threat Maps
STIX
Dark Web
APTs
Data Exfiltration Attacks
Insider Threat
Script Kiddie
Nation-State Attackers
Closed-Source Intelligence
Vulnerability Databases
Black-Hat Hackers
Philosophical-Political Belief Attacks
Organized Crime Attackers
Attack Surfaces
Threat Vectors