STIX Shadow IT OSINT Financial Gain Attacks Threat Intelligence Threat Actors Data Exfiltration Attacks Blackmail Attacks Vulnerability Databases Gray- Hat Hackers Script Kiddie Hacktivists Free! Disruption- Chaos Attacks War Attacks Insider Threat Black- Hat Hackers Philosophical- Political Belief Attacks Attack Surfaces Predictive Analysis Corporate Espionage Organized Crime Attackers White- Hat Hackers Closed- Source Intelligence Revenge Attacks Espionage Attacks Threat Vectors IoCs Threat Maps Dark Web Nation- State Attackers TTPs Service Disruption Attacks Ethical Attacks APTs Zero- Day Attacks ISACs STIX Shadow IT OSINT Financial Gain Attacks Threat Intelligence Threat Actors Data Exfiltration Attacks Blackmail Attacks Vulnerability Databases Gray- Hat Hackers Script Kiddie Hacktivists Free! Disruption- Chaos Attacks War Attacks Insider Threat Black- Hat Hackers Philosophical- Political Belief Attacks Attack Surfaces Predictive Analysis Corporate Espionage Organized Crime Attackers White- Hat Hackers Closed- Source Intelligence Revenge Attacks Espionage Attacks Threat Vectors IoCs Threat Maps Dark Web Nation- State Attackers TTPs Service Disruption Attacks Ethical Attacks APTs Zero- Day Attacks ISACs
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
STIX
Shadow IT
OSINT
Financial Gain Attacks
Threat Intelligence
Threat Actors
Data Exfiltration Attacks
Blackmail Attacks
Vulnerability Databases
Gray-Hat Hackers
Script Kiddie
Hacktivists
Free!
Disruption-Chaos Attacks
War Attacks
Insider Threat
Black-Hat Hackers
Philosophical-Political Belief Attacks
Attack Surfaces
Predictive Analysis
Corporate Espionage
Organized Crime Attackers
White-Hat Hackers
Closed-Source Intelligence
Revenge Attacks
Espionage Attacks
Threat Vectors
IoCs
Threat Maps
Dark Web
Nation-State Attackers
TTPs
Service Disruption Attacks
Ethical Attacks
APTs
Zero-Day Attacks
ISACs