APTs Closed- Source Intelligence Organized Crime Attackers Gray- Hat Hackers Nation- State Attackers Predictive Analysis Threat Intelligence Black- Hat Hackers Hacktivists Service Disruption Attacks Attack Surfaces War Attacks Ethical Attacks Blackmail Attacks Free! Revenge Attacks Corporate Espionage OSINT ISACs TTPs Threat Actors Threat Vectors Financial Gain Attacks Shadow IT Vulnerability Databases Philosophical- Political Belief Attacks Dark Web STIX IoCs Data Exfiltration Attacks Threat Maps Zero- Day Attacks White- Hat Hackers Insider Threat Disruption- Chaos Attacks Espionage Attacks Script Kiddie APTs Closed- Source Intelligence Organized Crime Attackers Gray- Hat Hackers Nation- State Attackers Predictive Analysis Threat Intelligence Black- Hat Hackers Hacktivists Service Disruption Attacks Attack Surfaces War Attacks Ethical Attacks Blackmail Attacks Free! Revenge Attacks Corporate Espionage OSINT ISACs TTPs Threat Actors Threat Vectors Financial Gain Attacks Shadow IT Vulnerability Databases Philosophical- Political Belief Attacks Dark Web STIX IoCs Data Exfiltration Attacks Threat Maps Zero- Day Attacks White- Hat Hackers Insider Threat Disruption- Chaos Attacks Espionage Attacks Script Kiddie
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
APTs
Closed-Source Intelligence
Organized Crime Attackers
Gray-Hat Hackers
Nation-State Attackers
Predictive Analysis
Threat Intelligence
Black-Hat Hackers
Hacktivists
Service Disruption Attacks
Attack Surfaces
War Attacks
Ethical Attacks
Blackmail Attacks
Free!
Revenge Attacks
Corporate Espionage
OSINT
ISACs
TTPs
Threat Actors
Threat Vectors
Financial Gain Attacks
Shadow IT
Vulnerability Databases
Philosophical-Political Belief Attacks
Dark Web
STIX
IoCs
Data Exfiltration Attacks
Threat Maps
Zero-Day Attacks
White-Hat Hackers
Insider Threat
Disruption-Chaos Attacks
Espionage Attacks
Script Kiddie