Blackmail Attacks TTPs Ethical Attacks APTs Gray- Hat Hackers Dark Web Attack Surfaces Disruption- Chaos Attacks OSINT Organized Crime Attackers ISACs Shadow IT IoCs Zero- Day Attacks Threat Intelligence Espionage Attacks Philosophical- Political Belief Attacks Revenge Attacks White- Hat Hackers Closed- Source Intelligence Threat Actors Financial Gain Attacks Free! Script Kiddie Service Disruption Attacks Threat Vectors Vulnerability Databases Black- Hat Hackers Predictive Analysis Data Exfiltration Attacks Nation- State Attackers Insider Threat Threat Maps Corporate Espionage STIX War Attacks Hacktivists Blackmail Attacks TTPs Ethical Attacks APTs Gray- Hat Hackers Dark Web Attack Surfaces Disruption- Chaos Attacks OSINT Organized Crime Attackers ISACs Shadow IT IoCs Zero- Day Attacks Threat Intelligence Espionage Attacks Philosophical- Political Belief Attacks Revenge Attacks White- Hat Hackers Closed- Source Intelligence Threat Actors Financial Gain Attacks Free! Script Kiddie Service Disruption Attacks Threat Vectors Vulnerability Databases Black- Hat Hackers Predictive Analysis Data Exfiltration Attacks Nation- State Attackers Insider Threat Threat Maps Corporate Espionage STIX War Attacks Hacktivists
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Blackmail Attacks
TTPs
Ethical Attacks
APTs
Gray-Hat Hackers
Dark Web
Attack Surfaces
Disruption-Chaos Attacks
OSINT
Organized Crime Attackers
ISACs
Shadow IT
IoCs
Zero-Day Attacks
Threat Intelligence
Espionage Attacks
Philosophical-Political Belief Attacks
Revenge Attacks
White-Hat Hackers
Closed-Source Intelligence
Threat Actors
Financial Gain Attacks
Free!
Script Kiddie
Service Disruption Attacks
Threat Vectors
Vulnerability Databases
Black-Hat Hackers
Predictive Analysis
Data Exfiltration Attacks
Nation-State Attackers
Insider Threat
Threat Maps
Corporate Espionage
STIX
War Attacks
Hacktivists