IoCs TTPs Philosophical- Political Belief Attacks Insider Threat Predictive Analysis Attack Surfaces STIX Blackmail Attacks Closed- Source Intelligence War Attacks Threat Actors Ethical Attacks Threat Vectors Organized Crime Attackers Black- Hat Hackers Vulnerability Databases Threat Maps Script Kiddie Dark Web Service Disruption Attacks Shadow IT Financial Gain Attacks Disruption- Chaos Attacks Corporate Espionage ISACs Nation- State Attackers APTs OSINT Zero- Day Attacks Threat Intelligence Data Exfiltration Attacks White- Hat Hackers Espionage Attacks Hacktivists Free! Gray- Hat Hackers Revenge Attacks IoCs TTPs Philosophical- Political Belief Attacks Insider Threat Predictive Analysis Attack Surfaces STIX Blackmail Attacks Closed- Source Intelligence War Attacks Threat Actors Ethical Attacks Threat Vectors Organized Crime Attackers Black- Hat Hackers Vulnerability Databases Threat Maps Script Kiddie Dark Web Service Disruption Attacks Shadow IT Financial Gain Attacks Disruption- Chaos Attacks Corporate Espionage ISACs Nation- State Attackers APTs OSINT Zero- Day Attacks Threat Intelligence Data Exfiltration Attacks White- Hat Hackers Espionage Attacks Hacktivists Free! Gray- Hat Hackers Revenge Attacks
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
IoCs
TTPs
Philosophical-Political Belief Attacks
Insider Threat
Predictive Analysis
Attack Surfaces
STIX
Blackmail Attacks
Closed-Source Intelligence
War Attacks
Threat Actors
Ethical Attacks
Threat Vectors
Organized Crime Attackers
Black-Hat Hackers
Vulnerability Databases
Threat Maps
Script Kiddie
Dark Web
Service Disruption Attacks
Shadow IT
Financial Gain Attacks
Disruption-Chaos Attacks
Corporate Espionage
ISACs
Nation-State Attackers
APTs
OSINT
Zero-Day Attacks
Threat Intelligence
Data Exfiltration Attacks
White-Hat Hackers
Espionage Attacks
Hacktivists
Free!
Gray-Hat Hackers
Revenge Attacks