TTPs Black- Hat Hackers Ethical Attacks STIX Disruption- Chaos Attacks Gray- Hat Hackers Shadow IT Free! IoCs Dark Web Financial Gain Attacks War Attacks APTs Threat Maps Threat Vectors Attack Surfaces Corporate Espionage Insider Threat Revenge Attacks Vulnerability Databases OSINT Predictive Analysis ISACs Script Kiddie Blackmail Attacks Data Exfiltration Attacks Organized Crime Attackers Espionage Attacks White- Hat Hackers Zero- Day Attacks Service Disruption Attacks Closed- Source Intelligence Threat Intelligence Philosophical- Political Belief Attacks Hacktivists Nation- State Attackers Threat Actors TTPs Black- Hat Hackers Ethical Attacks STIX Disruption- Chaos Attacks Gray- Hat Hackers Shadow IT Free! IoCs Dark Web Financial Gain Attacks War Attacks APTs Threat Maps Threat Vectors Attack Surfaces Corporate Espionage Insider Threat Revenge Attacks Vulnerability Databases OSINT Predictive Analysis ISACs Script Kiddie Blackmail Attacks Data Exfiltration Attacks Organized Crime Attackers Espionage Attacks White- Hat Hackers Zero- Day Attacks Service Disruption Attacks Closed- Source Intelligence Threat Intelligence Philosophical- Political Belief Attacks Hacktivists Nation- State Attackers Threat Actors
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
TTPs
Black-Hat Hackers
Ethical Attacks
STIX
Disruption-Chaos Attacks
Gray-Hat Hackers
Shadow IT
Free!
IoCs
Dark Web
Financial Gain Attacks
War Attacks
APTs
Threat Maps
Threat Vectors
Attack Surfaces
Corporate Espionage
Insider Threat
Revenge Attacks
Vulnerability Databases
OSINT
Predictive Analysis
ISACs
Script Kiddie
Blackmail Attacks
Data Exfiltration Attacks
Organized Crime Attackers
Espionage Attacks
White-Hat Hackers
Zero-Day Attacks
Service Disruption Attacks
Closed-Source Intelligence
Threat Intelligence
Philosophical-Political Belief Attacks
Hacktivists
Nation-State Attackers
Threat Actors