BlackmailAttacksTTPsEthicalAttacksAPTsGray-HatHackersDarkWebAttackSurfacesDisruption-ChaosAttacksOSINTOrganizedCrimeAttackersISACsShadowITIoCsZero-DayAttacksThreatIntelligenceEspionageAttacksPhilosophical-Political BeliefAttacksRevengeAttacksWhite-HatHackersClosed-SourceIntelligenceThreatActorsFinancialGainAttacksFree!ScriptKiddieServiceDisruptionAttacksThreatVectorsVulnerabilityDatabasesBlack-HatHackersPredictiveAnalysisDataExfiltrationAttacksNation-StateAttackersInsiderThreatThreatMapsCorporateEspionageSTIXWarAttacksHacktivistsBlackmailAttacksTTPsEthicalAttacksAPTsGray-HatHackersDarkWebAttackSurfacesDisruption-ChaosAttacksOSINTOrganizedCrimeAttackersISACsShadowITIoCsZero-DayAttacksThreatIntelligenceEspionageAttacksPhilosophical-Political BeliefAttacksRevengeAttacksWhite-HatHackersClosed-SourceIntelligenceThreatActorsFinancialGainAttacksFree!ScriptKiddieServiceDisruptionAttacksThreatVectorsVulnerabilityDatabasesBlack-HatHackersPredictiveAnalysisDataExfiltrationAttacksNation-StateAttackersInsiderThreatThreatMapsCorporateEspionageSTIXWarAttacksHacktivists

CHAPTER 2 SEC+ - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. Blackmail Attacks
  2. TTPs
  3. Ethical Attacks
  4. APTs
  5. Gray-Hat Hackers
  6. Dark Web
  7. Attack Surfaces
  8. Disruption-Chaos Attacks
  9. OSINT
  10. Organized Crime Attackers
  11. ISACs
  12. Shadow IT
  13. IoCs
  14. Zero-Day Attacks
  15. Threat Intelligence
  16. Espionage Attacks
  17. Philosophical-Political Belief Attacks
  18. Revenge Attacks
  19. White-Hat Hackers
  20. Closed-Source Intelligence
  21. Threat Actors
  22. Financial Gain Attacks
  23. Free!
  24. Script Kiddie
  25. Service Disruption Attacks
  26. Threat Vectors
  27. Vulnerability Databases
  28. Black-Hat Hackers
  29. Predictive Analysis
  30. Data Exfiltration Attacks
  31. Nation-State Attackers
  32. Insider Threat
  33. Threat Maps
  34. Corporate Espionage
  35. STIX
  36. War Attacks
  37. Hacktivists