Hacktivists Predictive Analysis Blackmail Attacks TTPs Service Disruption Attacks Threat Vectors Vulnerability Databases Disruption- Chaos Attacks Corporate Espionage Nation- State Attackers Insider Threat ISACs Ethical Attacks Espionage Attacks Revenge Attacks Threat Maps Black- Hat Hackers Closed- Source Intelligence STIX Free! Philosophical- Political Belief Attacks Attack Surfaces Script Kiddie Data Exfiltration Attacks IoCs Dark Web Zero- Day Attacks War Attacks Shadow IT OSINT Threat Actors Organized Crime Attackers Threat Intelligence Financial Gain Attacks White- Hat Hackers Gray- Hat Hackers APTs Hacktivists Predictive Analysis Blackmail Attacks TTPs Service Disruption Attacks Threat Vectors Vulnerability Databases Disruption- Chaos Attacks Corporate Espionage Nation- State Attackers Insider Threat ISACs Ethical Attacks Espionage Attacks Revenge Attacks Threat Maps Black- Hat Hackers Closed- Source Intelligence STIX Free! Philosophical- Political Belief Attacks Attack Surfaces Script Kiddie Data Exfiltration Attacks IoCs Dark Web Zero- Day Attacks War Attacks Shadow IT OSINT Threat Actors Organized Crime Attackers Threat Intelligence Financial Gain Attacks White- Hat Hackers Gray- Hat Hackers APTs
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Hacktivists
Predictive Analysis
Blackmail Attacks
TTPs
Service Disruption Attacks
Threat Vectors
Vulnerability Databases
Disruption-Chaos Attacks
Corporate Espionage
Nation-State Attackers
Insider Threat
ISACs
Ethical Attacks
Espionage Attacks
Revenge Attacks
Threat Maps
Black-Hat Hackers
Closed-Source Intelligence
STIX
Free!
Philosophical-Political Belief Attacks
Attack Surfaces
Script Kiddie
Data Exfiltration Attacks
IoCs
Dark Web
Zero-Day Attacks
War Attacks
Shadow IT
OSINT
Threat Actors
Organized Crime Attackers
Threat Intelligence
Financial Gain Attacks
White-Hat Hackers
Gray-Hat Hackers
APTs