IoCs Revenge Attacks Threat Actors Vulnerability Databases OSINT Free! White- Hat Hackers ISACs Ethical Attacks Blackmail Attacks Black- Hat Hackers Zero- Day Attacks Threat Maps APTs Philosophical- Political Belief Attacks Organized Crime Attackers War Attacks Predictive Analysis Threat Vectors Hacktivists Script Kiddie Attack Surfaces Gray- Hat Hackers Insider Threat Corporate Espionage Financial Gain Attacks Nation- State Attackers Disruption- Chaos Attacks Closed- Source Intelligence Threat Intelligence TTPs STIX Data Exfiltration Attacks Espionage Attacks Service Disruption Attacks Shadow IT Dark Web IoCs Revenge Attacks Threat Actors Vulnerability Databases OSINT Free! White- Hat Hackers ISACs Ethical Attacks Blackmail Attacks Black- Hat Hackers Zero- Day Attacks Threat Maps APTs Philosophical- Political Belief Attacks Organized Crime Attackers War Attacks Predictive Analysis Threat Vectors Hacktivists Script Kiddie Attack Surfaces Gray- Hat Hackers Insider Threat Corporate Espionage Financial Gain Attacks Nation- State Attackers Disruption- Chaos Attacks Closed- Source Intelligence Threat Intelligence TTPs STIX Data Exfiltration Attacks Espionage Attacks Service Disruption Attacks Shadow IT Dark Web
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
IoCs
Revenge Attacks
Threat Actors
Vulnerability Databases
OSINT
Free!
White-Hat Hackers
ISACs
Ethical Attacks
Blackmail Attacks
Black-Hat Hackers
Zero-Day Attacks
Threat Maps
APTs
Philosophical-Political Belief Attacks
Organized Crime Attackers
War Attacks
Predictive Analysis
Threat Vectors
Hacktivists
Script Kiddie
Attack Surfaces
Gray-Hat Hackers
Insider Threat
Corporate Espionage
Financial Gain Attacks
Nation-State Attackers
Disruption-Chaos Attacks
Closed-Source Intelligence
Threat Intelligence
TTPs
STIX
Data Exfiltration Attacks
Espionage Attacks
Service Disruption Attacks
Shadow IT
Dark Web