Philosophical- Political Belief Attacks IoCs Threat Actors OSINT White- Hat Hackers Attack Surfaces Gray- Hat Hackers APTs TTPs Espionage Attacks Threat Vectors Threat Maps Blackmail Attacks War Attacks STIX Shadow IT Hacktivists Revenge Attacks Corporate Espionage Organized Crime Attackers Threat Intelligence Zero- Day Attacks Data Exfiltration Attacks Black- Hat Hackers Dark Web ISACs Insider Threat Ethical Attacks Disruption- Chaos Attacks Nation- State Attackers Financial Gain Attacks Free! Vulnerability Databases Script Kiddie Closed- Source Intelligence Predictive Analysis Service Disruption Attacks Philosophical- Political Belief Attacks IoCs Threat Actors OSINT White- Hat Hackers Attack Surfaces Gray- Hat Hackers APTs TTPs Espionage Attacks Threat Vectors Threat Maps Blackmail Attacks War Attacks STIX Shadow IT Hacktivists Revenge Attacks Corporate Espionage Organized Crime Attackers Threat Intelligence Zero- Day Attacks Data Exfiltration Attacks Black- Hat Hackers Dark Web ISACs Insider Threat Ethical Attacks Disruption- Chaos Attacks Nation- State Attackers Financial Gain Attacks Free! Vulnerability Databases Script Kiddie Closed- Source Intelligence Predictive Analysis Service Disruption Attacks
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Philosophical-Political Belief Attacks
IoCs
Threat Actors
OSINT
White-Hat Hackers
Attack Surfaces
Gray-Hat Hackers
APTs
TTPs
Espionage Attacks
Threat Vectors
Threat Maps
Blackmail Attacks
War Attacks
STIX
Shadow IT
Hacktivists
Revenge Attacks
Corporate Espionage
Organized Crime Attackers
Threat Intelligence
Zero-Day Attacks
Data Exfiltration Attacks
Black-Hat Hackers
Dark Web
ISACs
Insider Threat
Ethical Attacks
Disruption-Chaos Attacks
Nation-State Attackers
Financial Gain Attacks
Free!
Vulnerability Databases
Script Kiddie
Closed-Source Intelligence
Predictive Analysis
Service Disruption Attacks