(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
AdwareDDoS
WAFMan-in-theMiddle Attack
Exploit
Vulnerability
Decryption
Remote Desktop Protocol (RDP)
MalwareVPNBusiness Disruption
Fileless Malware
Whitelist, Allowlist
IoT
Anti-Phishing
Spam
Virus
Anti-BotnetEncryption
Business Continuity Plan
Insider Threat
Malvertising
Clientless
Drive By Download Attack
Risktool
Endpoint ProtectionSpoofing
BYOD
Honeypot
White Hat - Black Hat
Firewall
Threat Intelligence
Brute Force Attack
Two-step Authentification
Anti-Malware
Backdoor
SIM Swapping
Attack Vector
Clickjacking
Cyberbullying
Data IntegrityParental Controls
BYOL
Pen Testing
Digital Transformation
Ransomware
Botnet
Anti-Virus
Data Theft
CAPTCHA
MITRE ATT&CK™ Framework
Zero-day Exploit
Greylist
Sandbox(ing)
Phishing
Social Engineering
Data LossPrevention (DLP)Digital ForensicsSpear Phishing