BlackmailAttacksEspionageAttacksThreatActorsThreatMapsShadowITOSINTSTIXGray-HatHackersThreatVectorsTTPsDisruption-ChaosAttacksScriptKiddieWarAttacksCorporateEspionageDarkWebAttackSurfacesServiceDisruptionAttacksFree!Philosophical-Political BeliefAttacksNation-StateAttackersPredictiveAnalysisWhite-HatHackersClosed-SourceIntelligenceDataExfiltrationAttacksRevengeAttacksThreatIntelligenceISACsEthicalAttacksAPTsZero-DayAttacksInsiderThreatHacktivistsFinancialGainAttacksVulnerabilityDatabasesBlack-HatHackersOrganizedCrimeAttackersIoCsBlackmailAttacksEspionageAttacksThreatActorsThreatMapsShadowITOSINTSTIXGray-HatHackersThreatVectorsTTPsDisruption-ChaosAttacksScriptKiddieWarAttacksCorporateEspionageDarkWebAttackSurfacesServiceDisruptionAttacksFree!Philosophical-Political BeliefAttacksNation-StateAttackersPredictiveAnalysisWhite-HatHackersClosed-SourceIntelligenceDataExfiltrationAttacksRevengeAttacksThreatIntelligenceISACsEthicalAttacksAPTsZero-DayAttacksInsiderThreatHacktivistsFinancialGainAttacksVulnerabilityDatabasesBlack-HatHackersOrganizedCrimeAttackersIoCs

CHAPTER 2 SEC+ - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. Blackmail Attacks
  2. Espionage Attacks
  3. Threat Actors
  4. Threat Maps
  5. Shadow IT
  6. OSINT
  7. STIX
  8. Gray-Hat Hackers
  9. Threat Vectors
  10. TTPs
  11. Disruption-Chaos Attacks
  12. Script Kiddie
  13. War Attacks
  14. Corporate Espionage
  15. Dark Web
  16. Attack Surfaces
  17. Service Disruption Attacks
  18. Free!
  19. Philosophical-Political Belief Attacks
  20. Nation-State Attackers
  21. Predictive Analysis
  22. White-Hat Hackers
  23. Closed-Source Intelligence
  24. Data Exfiltration Attacks
  25. Revenge Attacks
  26. Threat Intelligence
  27. ISACs
  28. Ethical Attacks
  29. APTs
  30. Zero-Day Attacks
  31. Insider Threat
  32. Hacktivists
  33. Financial Gain Attacks
  34. Vulnerability Databases
  35. Black-Hat Hackers
  36. Organized Crime Attackers
  37. IoCs