Threat Vectors Shadow IT Disruption- Chaos Attacks Free! TTPs Financial Gain Attacks APTs Zero- Day Attacks ISACs Dark Web Revenge Attacks Hacktivists Attack Surfaces Threat Maps STIX Ethical Attacks Data Exfiltration Attacks Script Kiddie Closed- Source Intelligence War Attacks Threat Actors Espionage Attacks Predictive Analysis Nation- State Attackers Corporate Espionage OSINT Insider Threat Service Disruption Attacks White- Hat Hackers Black- Hat Hackers IoCs Organized Crime Attackers Vulnerability Databases Threat Intelligence Philosophical- Political Belief Attacks Blackmail Attacks Gray- Hat Hackers Threat Vectors Shadow IT Disruption- Chaos Attacks Free! TTPs Financial Gain Attacks APTs Zero- Day Attacks ISACs Dark Web Revenge Attacks Hacktivists Attack Surfaces Threat Maps STIX Ethical Attacks Data Exfiltration Attacks Script Kiddie Closed- Source Intelligence War Attacks Threat Actors Espionage Attacks Predictive Analysis Nation- State Attackers Corporate Espionage OSINT Insider Threat Service Disruption Attacks White- Hat Hackers Black- Hat Hackers IoCs Organized Crime Attackers Vulnerability Databases Threat Intelligence Philosophical- Political Belief Attacks Blackmail Attacks Gray- Hat Hackers
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Threat Vectors
Shadow IT
Disruption-Chaos Attacks
Free!
TTPs
Financial Gain Attacks
APTs
Zero-Day Attacks
ISACs
Dark Web
Revenge Attacks
Hacktivists
Attack Surfaces
Threat Maps
STIX
Ethical Attacks
Data Exfiltration Attacks
Script Kiddie
Closed-Source Intelligence
War Attacks
Threat Actors
Espionage Attacks
Predictive Analysis
Nation-State Attackers
Corporate Espionage
OSINT
Insider Threat
Service Disruption Attacks
White-Hat Hackers
Black-Hat Hackers
IoCs
Organized Crime Attackers
Vulnerability Databases
Threat Intelligence
Philosophical-Political Belief Attacks
Blackmail Attacks
Gray-Hat Hackers