Threat Intelligence Espionage Attacks Corporate Espionage Zero- Day Attacks Dark Web Nation- State Attackers Predictive Analysis Gray- Hat Hackers Black- Hat Hackers Script Kiddie Organized Crime Attackers Financial Gain Attacks Threat Maps IoCs Ethical Attacks War Attacks TTPs Free! Blackmail Attacks Vulnerability Databases Data Exfiltration Attacks Attack Surfaces Closed- Source Intelligence ISACs APTs Revenge Attacks Service Disruption Attacks Insider Threat OSINT STIX Disruption- Chaos Attacks Threat Actors White- Hat Hackers Philosophical- Political Belief Attacks Threat Vectors Shadow IT Hacktivists Threat Intelligence Espionage Attacks Corporate Espionage Zero- Day Attacks Dark Web Nation- State Attackers Predictive Analysis Gray- Hat Hackers Black- Hat Hackers Script Kiddie Organized Crime Attackers Financial Gain Attacks Threat Maps IoCs Ethical Attacks War Attacks TTPs Free! Blackmail Attacks Vulnerability Databases Data Exfiltration Attacks Attack Surfaces Closed- Source Intelligence ISACs APTs Revenge Attacks Service Disruption Attacks Insider Threat OSINT STIX Disruption- Chaos Attacks Threat Actors White- Hat Hackers Philosophical- Political Belief Attacks Threat Vectors Shadow IT Hacktivists
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Threat Intelligence
Espionage Attacks
Corporate Espionage
Zero-Day Attacks
Dark Web
Nation-State Attackers
Predictive Analysis
Gray-Hat Hackers
Black-Hat Hackers
Script Kiddie
Organized Crime Attackers
Financial Gain Attacks
Threat Maps
IoCs
Ethical Attacks
War Attacks
TTPs
Free!
Blackmail Attacks
Vulnerability Databases
Data Exfiltration Attacks
Attack Surfaces
Closed-Source Intelligence
ISACs
APTs
Revenge Attacks
Service Disruption Attacks
Insider Threat
OSINT
STIX
Disruption-Chaos Attacks
Threat Actors
White-Hat Hackers
Philosophical-Political Belief Attacks
Threat Vectors
Shadow IT
Hacktivists