(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
Keylogger
Vulnerability
Exploit
Anti-Malware
WAFMan-in-theMiddle Attack
Cyberbullying
Zero-day Exploit
Botnet
Fileless Malware
Rootkit
Authentication
Honeypot
Spam
PII
Pen Testing
Backdoor
BYOL
Data Theft
Ransomware
Risktool
Dark Web
Anti-Phishing
Banker Trojan
White Hat - Black Hat
Malvertising
Whitelist, Allowlist
SIM Swapping
Process Hollowing
MITRE ATT&CK™ Framework
Brute Force Attack
Attack Vector
Data LossPrevention (DLP)Digital ForensicsSpear Phishing