(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
Sandbox(ing)
Rootkit
Firewall
Data IntegrityParental Controls
BYOD
Secure Socket Layer (SSL)
SIM Swapping
Exploit
White Hat - Black Hat
Threat Assessment
Threat Intelligence
CAPTCHA
In-line Network Device
MITRE ATT&CK™ Framework
Decryption
BYOCIdentity
Botnet
Anti-Phishing
Whitelist, Allowlist
Phishing
Two-step Authentification
CybersecurityScareware
Anti-Virus
Fileless Malware
Insider Threat
Security Incident Response
Malvertising
Pen Testing
Critical InfrastructureSECaaS
Anti-Malware
Brute Force Attack
Anti-BotnetEncryption
Zero-day Exploit
Threat Hunting
Process Hollowing
Data Theft
Virus
Honeypot
Drive By Download Attack
BYOL
Risktool
Business Continuity Plan
Fast Identity Online (FIDO)
Dark Web
Ransomware
Attack Vector
Spyware
Cyberbullying
Patch
Spam
Authentication
Endpoint ProtectionSpoofing
Backdoor
Hacker
MalwareVPNBusiness Disruption
Keylogger
Greylist
Remote Desktop Protocol (RDP)
WAFMan-in-theMiddle Attack
IoT
Clickjacking
Clientless
Cryptojacking
AdwareDDoS
Data Breach
PII
Social Engineering
Data LossPrevention (DLP)Digital ForensicsSpear Phishing