Closed- Source Intelligence Nation- State Attackers Organized Crime Attackers Corporate Espionage Script Kiddie White- Hat Hackers Revenge Attacks Shadow IT Hacktivists Dark Web Disruption- Chaos Attacks OSINT TTPs Predictive Analysis Threat Intelligence ISACs Threat Vectors Espionage Attacks Threat Actors War Attacks Data Exfiltration Attacks Free! STIX APTs Zero- Day Attacks Service Disruption Attacks Attack Surfaces Financial Gain Attacks Ethical Attacks Philosophical- Political Belief Attacks Blackmail Attacks IoCs Insider Threat Gray- Hat Hackers Black- Hat Hackers Threat Maps Vulnerability Databases Closed- Source Intelligence Nation- State Attackers Organized Crime Attackers Corporate Espionage Script Kiddie White- Hat Hackers Revenge Attacks Shadow IT Hacktivists Dark Web Disruption- Chaos Attacks OSINT TTPs Predictive Analysis Threat Intelligence ISACs Threat Vectors Espionage Attacks Threat Actors War Attacks Data Exfiltration Attacks Free! STIX APTs Zero- Day Attacks Service Disruption Attacks Attack Surfaces Financial Gain Attacks Ethical Attacks Philosophical- Political Belief Attacks Blackmail Attacks IoCs Insider Threat Gray- Hat Hackers Black- Hat Hackers Threat Maps Vulnerability Databases
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Closed-Source Intelligence
Nation-State Attackers
Organized Crime Attackers
Corporate Espionage
Script Kiddie
White-Hat Hackers
Revenge Attacks
Shadow IT
Hacktivists
Dark Web
Disruption-Chaos Attacks
OSINT
TTPs
Predictive Analysis
Threat Intelligence
ISACs
Threat Vectors
Espionage Attacks
Threat Actors
War Attacks
Data Exfiltration Attacks
Free!
STIX
APTs
Zero-Day Attacks
Service Disruption Attacks
Attack Surfaces
Financial Gain Attacks
Ethical Attacks
Philosophical-Political Belief Attacks
Blackmail Attacks
IoCs
Insider Threat
Gray-Hat Hackers
Black-Hat Hackers
Threat Maps
Vulnerability Databases