Disruption- Chaos Attacks Revenge Attacks Shadow IT Financial Gain Attacks Script Kiddie Threat Intelligence Nation- State Attackers TTPs Data Exfiltration Attacks Blackmail Attacks Predictive Analysis Hacktivists Threat Maps Black- Hat Hackers Service Disruption Attacks Zero- Day Attacks Attack Surfaces Threat Vectors Dark Web IoCs Corporate Espionage ISACs Vulnerability Databases Closed- Source Intelligence Insider Threat Free! Organized Crime Attackers Espionage Attacks STIX Gray- Hat Hackers War Attacks Threat Actors APTs Ethical Attacks OSINT White- Hat Hackers Philosophical- Political Belief Attacks Disruption- Chaos Attacks Revenge Attacks Shadow IT Financial Gain Attacks Script Kiddie Threat Intelligence Nation- State Attackers TTPs Data Exfiltration Attacks Blackmail Attacks Predictive Analysis Hacktivists Threat Maps Black- Hat Hackers Service Disruption Attacks Zero- Day Attacks Attack Surfaces Threat Vectors Dark Web IoCs Corporate Espionage ISACs Vulnerability Databases Closed- Source Intelligence Insider Threat Free! Organized Crime Attackers Espionage Attacks STIX Gray- Hat Hackers War Attacks Threat Actors APTs Ethical Attacks OSINT White- Hat Hackers Philosophical- Political Belief Attacks
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Disruption-Chaos Attacks
Revenge Attacks
Shadow IT
Financial Gain Attacks
Script Kiddie
Threat Intelligence
Nation-State Attackers
TTPs
Data Exfiltration Attacks
Blackmail Attacks
Predictive Analysis
Hacktivists
Threat Maps
Black-Hat Hackers
Service Disruption Attacks
Zero-Day Attacks
Attack Surfaces
Threat Vectors
Dark Web
IoCs
Corporate Espionage
ISACs
Vulnerability Databases
Closed-Source Intelligence
Insider Threat
Free!
Organized Crime Attackers
Espionage Attacks
STIX
Gray-Hat Hackers
War Attacks
Threat Actors
APTs
Ethical Attacks
OSINT
White-Hat Hackers
Philosophical-Political Belief Attacks