Service Disruption Attacks Espionage Attacks ISACs Closed- Source Intelligence Insider Threat Blackmail Attacks Threat Maps Zero- Day Attacks Hacktivists IoCs Threat Actors Organized Crime Attackers Disruption- Chaos Attacks Revenge Attacks War Attacks Philosophical- Political Belief Attacks Threat Vectors Dark Web Shadow IT APTs Predictive Analysis Data Exfiltration Attacks Attack Surfaces STIX TTPs Ethical Attacks Threat Intelligence Gray- Hat Hackers Script Kiddie OSINT Financial Gain Attacks Free! Vulnerability Databases Nation- State Attackers White- Hat Hackers Corporate Espionage Black- Hat Hackers Service Disruption Attacks Espionage Attacks ISACs Closed- Source Intelligence Insider Threat Blackmail Attacks Threat Maps Zero- Day Attacks Hacktivists IoCs Threat Actors Organized Crime Attackers Disruption- Chaos Attacks Revenge Attacks War Attacks Philosophical- Political Belief Attacks Threat Vectors Dark Web Shadow IT APTs Predictive Analysis Data Exfiltration Attacks Attack Surfaces STIX TTPs Ethical Attacks Threat Intelligence Gray- Hat Hackers Script Kiddie OSINT Financial Gain Attacks Free! Vulnerability Databases Nation- State Attackers White- Hat Hackers Corporate Espionage Black- Hat Hackers
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Service Disruption Attacks
Espionage Attacks
ISACs
Closed-Source Intelligence
Insider Threat
Blackmail Attacks
Threat Maps
Zero-Day Attacks
Hacktivists
IoCs
Threat Actors
Organized Crime Attackers
Disruption-Chaos Attacks
Revenge Attacks
War Attacks
Philosophical-Political Belief Attacks
Threat Vectors
Dark Web
Shadow IT
APTs
Predictive Analysis
Data Exfiltration Attacks
Attack Surfaces
STIX
TTPs
Ethical Attacks
Threat Intelligence
Gray-Hat Hackers
Script Kiddie
OSINT
Financial Gain Attacks
Free!
Vulnerability Databases
Nation-State Attackers
White-Hat Hackers
Corporate Espionage
Black-Hat Hackers