Attack Surfaces ISACs Service Disruption Attacks Financial Gain Attacks TTPs Script Kiddie White- Hat Hackers Hacktivists Threat Vectors Gray- Hat Hackers Philosophical- Political Belief Attacks Free! Revenge Attacks Corporate Espionage Closed- Source Intelligence IoCs Vulnerability Databases Ethical Attacks Shadow IT Nation- State Attackers Data Exfiltration Attacks Dark Web OSINT Disruption- Chaos Attacks Espionage Attacks APTs Organized Crime Attackers Threat Intelligence Insider Threat Predictive Analysis Zero- Day Attacks Black- Hat Hackers Threat Maps STIX War Attacks Threat Actors Blackmail Attacks Attack Surfaces ISACs Service Disruption Attacks Financial Gain Attacks TTPs Script Kiddie White- Hat Hackers Hacktivists Threat Vectors Gray- Hat Hackers Philosophical- Political Belief Attacks Free! Revenge Attacks Corporate Espionage Closed- Source Intelligence IoCs Vulnerability Databases Ethical Attacks Shadow IT Nation- State Attackers Data Exfiltration Attacks Dark Web OSINT Disruption- Chaos Attacks Espionage Attacks APTs Organized Crime Attackers Threat Intelligence Insider Threat Predictive Analysis Zero- Day Attacks Black- Hat Hackers Threat Maps STIX War Attacks Threat Actors Blackmail Attacks
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Attack Surfaces
ISACs
Service Disruption Attacks
Financial Gain Attacks
TTPs
Script Kiddie
White-Hat Hackers
Hacktivists
Threat Vectors
Gray-Hat Hackers
Philosophical-Political Belief Attacks
Free!
Revenge Attacks
Corporate Espionage
Closed-Source Intelligence
IoCs
Vulnerability Databases
Ethical Attacks
Shadow IT
Nation-State Attackers
Data Exfiltration Attacks
Dark Web
OSINT
Disruption-Chaos Attacks
Espionage Attacks
APTs
Organized Crime Attackers
Threat Intelligence
Insider Threat
Predictive Analysis
Zero-Day Attacks
Black-Hat Hackers
Threat Maps
STIX
War Attacks
Threat Actors
Blackmail Attacks