OSINT Nation- State Attackers White- Hat Hackers APTs Service Disruption Attacks Gray- Hat Hackers Threat Actors IoCs Ethical Attacks Black- Hat Hackers Data Exfiltration Attacks ISACs Espionage Attacks Blackmail Attacks Predictive Analysis Free! Insider Threat Zero- Day Attacks Revenge Attacks Closed- Source Intelligence Dark Web Financial Gain Attacks Attack Surfaces Organized Crime Attackers Threat Intelligence War Attacks TTPs Vulnerability Databases Corporate Espionage Philosophical- Political Belief Attacks Disruption- Chaos Attacks Shadow IT STIX Hacktivists Threat Maps Script Kiddie Threat Vectors OSINT Nation- State Attackers White- Hat Hackers APTs Service Disruption Attacks Gray- Hat Hackers Threat Actors IoCs Ethical Attacks Black- Hat Hackers Data Exfiltration Attacks ISACs Espionage Attacks Blackmail Attacks Predictive Analysis Free! Insider Threat Zero- Day Attacks Revenge Attacks Closed- Source Intelligence Dark Web Financial Gain Attacks Attack Surfaces Organized Crime Attackers Threat Intelligence War Attacks TTPs Vulnerability Databases Corporate Espionage Philosophical- Political Belief Attacks Disruption- Chaos Attacks Shadow IT STIX Hacktivists Threat Maps Script Kiddie Threat Vectors
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
OSINT
Nation-State Attackers
White-Hat Hackers
APTs
Service Disruption Attacks
Gray-Hat Hackers
Threat Actors
IoCs
Ethical Attacks
Black-Hat Hackers
Data Exfiltration Attacks
ISACs
Espionage Attacks
Blackmail Attacks
Predictive Analysis
Free!
Insider Threat
Zero-Day Attacks
Revenge Attacks
Closed-Source Intelligence
Dark Web
Financial Gain Attacks
Attack Surfaces
Organized Crime Attackers
Threat Intelligence
War Attacks
TTPs
Vulnerability Databases
Corporate Espionage
Philosophical-Political Belief Attacks
Disruption-Chaos Attacks
Shadow IT
STIX
Hacktivists
Threat Maps
Script Kiddie
Threat Vectors