Closed- Source Intelligence Zero- Day Attacks Free! Attack Surfaces APTs TTPs Threat Maps OSINT IoCs STIX Revenge Attacks Philosophical- Political Belief Attacks White- Hat Hackers War Attacks Espionage Attacks Hacktivists Predictive Analysis Threat Vectors Ethical Attacks Service Disruption Attacks Financial Gain Attacks Disruption- Chaos Attacks Dark Web ISACs Insider Threat Nation- State Attackers Black- Hat Hackers Gray- Hat Hackers Organized Crime Attackers Script Kiddie Corporate Espionage Threat Actors Threat Intelligence Data Exfiltration Attacks Shadow IT Vulnerability Databases Blackmail Attacks Closed- Source Intelligence Zero- Day Attacks Free! Attack Surfaces APTs TTPs Threat Maps OSINT IoCs STIX Revenge Attacks Philosophical- Political Belief Attacks White- Hat Hackers War Attacks Espionage Attacks Hacktivists Predictive Analysis Threat Vectors Ethical Attacks Service Disruption Attacks Financial Gain Attacks Disruption- Chaos Attacks Dark Web ISACs Insider Threat Nation- State Attackers Black- Hat Hackers Gray- Hat Hackers Organized Crime Attackers Script Kiddie Corporate Espionage Threat Actors Threat Intelligence Data Exfiltration Attacks Shadow IT Vulnerability Databases Blackmail Attacks
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Closed-Source Intelligence
Zero-Day Attacks
Free!
Attack Surfaces
APTs
TTPs
Threat Maps
OSINT
IoCs
STIX
Revenge Attacks
Philosophical-Political Belief Attacks
White-Hat Hackers
War Attacks
Espionage Attacks
Hacktivists
Predictive Analysis
Threat Vectors
Ethical Attacks
Service Disruption Attacks
Financial Gain Attacks
Disruption-Chaos Attacks
Dark Web
ISACs
Insider Threat
Nation-State Attackers
Black-Hat Hackers
Gray-Hat Hackers
Organized Crime Attackers
Script Kiddie
Corporate Espionage
Threat Actors
Threat Intelligence
Data Exfiltration Attacks
Shadow IT
Vulnerability Databases
Blackmail Attacks