Predictive Analysis Script Kiddie IoCs Organized Crime Attackers Gray- Hat Hackers Disruption- Chaos Attacks Revenge Attacks Vulnerability Databases Ethical Attacks Closed- Source Intelligence TTPs Insider Threat Black- Hat Hackers Threat Maps Espionage Attacks OSINT White- Hat Hackers Corporate Espionage Financial Gain Attacks Data Exfiltration Attacks Shadow IT Threat Actors Blackmail Attacks Free! Attack Surfaces Hacktivists STIX Philosophical- Political Belief Attacks Nation- State Attackers War Attacks Dark Web Zero- Day Attacks APTs ISACs Threat Vectors Threat Intelligence Service Disruption Attacks Predictive Analysis Script Kiddie IoCs Organized Crime Attackers Gray- Hat Hackers Disruption- Chaos Attacks Revenge Attacks Vulnerability Databases Ethical Attacks Closed- Source Intelligence TTPs Insider Threat Black- Hat Hackers Threat Maps Espionage Attacks OSINT White- Hat Hackers Corporate Espionage Financial Gain Attacks Data Exfiltration Attacks Shadow IT Threat Actors Blackmail Attacks Free! Attack Surfaces Hacktivists STIX Philosophical- Political Belief Attacks Nation- State Attackers War Attacks Dark Web Zero- Day Attacks APTs ISACs Threat Vectors Threat Intelligence Service Disruption Attacks
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Predictive Analysis
Script Kiddie
IoCs
Organized Crime Attackers
Gray-Hat Hackers
Disruption-Chaos Attacks
Revenge Attacks
Vulnerability Databases
Ethical Attacks
Closed-Source Intelligence
TTPs
Insider Threat
Black-Hat Hackers
Threat Maps
Espionage Attacks
OSINT
White-Hat Hackers
Corporate Espionage
Financial Gain Attacks
Data Exfiltration Attacks
Shadow IT
Threat Actors
Blackmail Attacks
Free!
Attack Surfaces
Hacktivists
STIX
Philosophical-Political Belief Attacks
Nation-State Attackers
War Attacks
Dark Web
Zero-Day Attacks
APTs
ISACs
Threat Vectors
Threat Intelligence
Service Disruption Attacks