Free! ISACs Black- Hat Hackers Organized Crime Attackers Hacktivists OSINT War Attacks Financial Gain Attacks Threat Intelligence Ethical Attacks Insider Threat Dark Web Threat Vectors Attack Surfaces Data Exfiltration Attacks IoCs Philosophical- Political Belief Attacks Corporate Espionage Zero- Day Attacks TTPs Shadow IT Espionage Attacks Service Disruption Attacks White- Hat Hackers APTs Nation- State Attackers Vulnerability Databases Closed- Source Intelligence Threat Maps Predictive Analysis Revenge Attacks Blackmail Attacks Script Kiddie STIX Gray- Hat Hackers Threat Actors Disruption- Chaos Attacks Free! ISACs Black- Hat Hackers Organized Crime Attackers Hacktivists OSINT War Attacks Financial Gain Attacks Threat Intelligence Ethical Attacks Insider Threat Dark Web Threat Vectors Attack Surfaces Data Exfiltration Attacks IoCs Philosophical- Political Belief Attacks Corporate Espionage Zero- Day Attacks TTPs Shadow IT Espionage Attacks Service Disruption Attacks White- Hat Hackers APTs Nation- State Attackers Vulnerability Databases Closed- Source Intelligence Threat Maps Predictive Analysis Revenge Attacks Blackmail Attacks Script Kiddie STIX Gray- Hat Hackers Threat Actors Disruption- Chaos Attacks
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Free!
ISACs
Black-Hat Hackers
Organized Crime Attackers
Hacktivists
OSINT
War Attacks
Financial Gain Attacks
Threat Intelligence
Ethical Attacks
Insider Threat
Dark Web
Threat Vectors
Attack Surfaces
Data Exfiltration Attacks
IoCs
Philosophical-Political Belief Attacks
Corporate Espionage
Zero-Day Attacks
TTPs
Shadow IT
Espionage Attacks
Service Disruption Attacks
White-Hat Hackers
APTs
Nation-State Attackers
Vulnerability Databases
Closed-Source Intelligence
Threat Maps
Predictive Analysis
Revenge Attacks
Blackmail Attacks
Script Kiddie
STIX
Gray-Hat Hackers
Threat Actors
Disruption-Chaos Attacks