Dark Web ISACs Corporate Espionage Attack Surfaces Threat Vectors Closed- Source Intelligence Hacktivists Zero- Day Attacks Shadow IT IoCs Vulnerability Databases Service Disruption Attacks STIX Financial Gain Attacks Black- Hat Hackers Nation- State Attackers Threat Maps TTPs War Attacks Insider Threat OSINT Threat Actors Organized Crime Attackers Espionage Attacks APTs Script Kiddie Disruption- Chaos Attacks Gray- Hat Hackers Ethical Attacks Predictive Analysis Blackmail Attacks Philosophical- Political Belief Attacks Threat Intelligence Free! Data Exfiltration Attacks White- Hat Hackers Revenge Attacks Dark Web ISACs Corporate Espionage Attack Surfaces Threat Vectors Closed- Source Intelligence Hacktivists Zero- Day Attacks Shadow IT IoCs Vulnerability Databases Service Disruption Attacks STIX Financial Gain Attacks Black- Hat Hackers Nation- State Attackers Threat Maps TTPs War Attacks Insider Threat OSINT Threat Actors Organized Crime Attackers Espionage Attacks APTs Script Kiddie Disruption- Chaos Attacks Gray- Hat Hackers Ethical Attacks Predictive Analysis Blackmail Attacks Philosophical- Political Belief Attacks Threat Intelligence Free! Data Exfiltration Attacks White- Hat Hackers Revenge Attacks
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Dark Web
ISACs
Corporate Espionage
Attack Surfaces
Threat Vectors
Closed-Source Intelligence
Hacktivists
Zero-Day Attacks
Shadow IT
IoCs
Vulnerability Databases
Service Disruption Attacks
STIX
Financial Gain Attacks
Black-Hat Hackers
Nation-State Attackers
Threat Maps
TTPs
War Attacks
Insider Threat
OSINT
Threat Actors
Organized Crime Attackers
Espionage Attacks
APTs
Script Kiddie
Disruption-Chaos Attacks
Gray-Hat Hackers
Ethical Attacks
Predictive Analysis
Blackmail Attacks
Philosophical-Political Belief Attacks
Threat Intelligence
Free!
Data Exfiltration Attacks
White-Hat Hackers
Revenge Attacks