Script Kiddie Closed- Source Intelligence Ethical Attacks Attack Surfaces Threat Actors Dark Web Disruption- Chaos Attacks TTPs Gray- Hat Hackers Nation- State Attackers War Attacks Service Disruption Attacks Espionage Attacks Threat Vectors Corporate Espionage STIX Financial Gain Attacks IoCs Threat Maps ISACs Black- Hat Hackers Data Exfiltration Attacks White- Hat Hackers OSINT Revenge Attacks Hacktivists Zero- Day Attacks Threat Intelligence Insider Threat Philosophical- Political Belief Attacks Predictive Analysis Organized Crime Attackers Blackmail Attacks Shadow IT APTs Vulnerability Databases Free! Script Kiddie Closed- Source Intelligence Ethical Attacks Attack Surfaces Threat Actors Dark Web Disruption- Chaos Attacks TTPs Gray- Hat Hackers Nation- State Attackers War Attacks Service Disruption Attacks Espionage Attacks Threat Vectors Corporate Espionage STIX Financial Gain Attacks IoCs Threat Maps ISACs Black- Hat Hackers Data Exfiltration Attacks White- Hat Hackers OSINT Revenge Attacks Hacktivists Zero- Day Attacks Threat Intelligence Insider Threat Philosophical- Political Belief Attacks Predictive Analysis Organized Crime Attackers Blackmail Attacks Shadow IT APTs Vulnerability Databases Free!
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Script Kiddie
Closed-Source Intelligence
Ethical Attacks
Attack Surfaces
Threat Actors
Dark Web
Disruption-Chaos Attacks
TTPs
Gray-Hat Hackers
Nation-State Attackers
War Attacks
Service Disruption Attacks
Espionage Attacks
Threat Vectors
Corporate Espionage
STIX
Financial Gain Attacks
IoCs
Threat Maps
ISACs
Black-Hat Hackers
Data Exfiltration Attacks
White-Hat Hackers
OSINT
Revenge Attacks
Hacktivists
Zero-Day Attacks
Threat Intelligence
Insider Threat
Philosophical-Political Belief Attacks
Predictive Analysis
Organized Crime Attackers
Blackmail Attacks
Shadow IT
APTs
Vulnerability Databases
Free!