TTPs Financial Gain Attacks ISACs Nation- State Attackers War Attacks Espionage Attacks OSINT Organized Crime Attackers Philosophical- Political Belief Attacks Closed- Source Intelligence Script Kiddie Predictive Analysis Shadow IT Threat Vectors Revenge Attacks Corporate Espionage Insider Threat Gray- Hat Hackers Service Disruption Attacks STIX Threat Intelligence Threat Maps Data Exfiltration Attacks Hacktivists Vulnerability Databases Zero- Day Attacks Threat Actors Blackmail Attacks White- Hat Hackers Free! Black- Hat Hackers IoCs Dark Web Attack Surfaces Ethical Attacks Disruption- Chaos Attacks APTs TTPs Financial Gain Attacks ISACs Nation- State Attackers War Attacks Espionage Attacks OSINT Organized Crime Attackers Philosophical- Political Belief Attacks Closed- Source Intelligence Script Kiddie Predictive Analysis Shadow IT Threat Vectors Revenge Attacks Corporate Espionage Insider Threat Gray- Hat Hackers Service Disruption Attacks STIX Threat Intelligence Threat Maps Data Exfiltration Attacks Hacktivists Vulnerability Databases Zero- Day Attacks Threat Actors Blackmail Attacks White- Hat Hackers Free! Black- Hat Hackers IoCs Dark Web Attack Surfaces Ethical Attacks Disruption- Chaos Attacks APTs
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
TTPs
Financial Gain Attacks
ISACs
Nation-State Attackers
War Attacks
Espionage Attacks
OSINT
Organized Crime Attackers
Philosophical-Political Belief Attacks
Closed-Source Intelligence
Script Kiddie
Predictive Analysis
Shadow IT
Threat Vectors
Revenge Attacks
Corporate Espionage
Insider Threat
Gray-Hat Hackers
Service Disruption Attacks
STIX
Threat Intelligence
Threat Maps
Data Exfiltration Attacks
Hacktivists
Vulnerability Databases
Zero-Day Attacks
Threat Actors
Blackmail Attacks
White-Hat Hackers
Free!
Black-Hat Hackers
IoCs
Dark Web
Attack Surfaces
Ethical Attacks
Disruption-Chaos Attacks
APTs