Zero-daySpywareCIABotnetKeyloggerFirewallAIAuthenticationSpamDatabreachVPNVulnerabilitySteganographyBYODHacktivistCiphertextVishingWiFiHackerNon-repudiationFrameworkShadowITOSINTIoTDevicesPhishingStakeholderMalwareSmishingPatchDarkwebRiskSocialengineeringBruteforceattackPasswordCloudZero-daySpywareCIABotnetKeyloggerFirewallAIAuthenticationSpamDatabreachVPNVulnerabilitySteganographyBYODHacktivistCiphertextVishingWiFiHackerNon-repudiationFrameworkShadowITOSINTIoTDevicesPhishingStakeholderMalwareSmishingPatchDarkwebRiskSocialengineeringBruteforceattackPasswordCloud

Cyber Bingo! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
  1. Zero-day
  2. Spyware
  3. CIA
  4. Botnet
  5. Keylogger
  6. Firewall
  7. AI
  8. Authentication
  9. Spam
  10. Data breach
  11. VPN
  12. Vulnerability
  13. Steganography
  14. BYOD
  15. Hacktivist
  16. Ciphertext
  17. Vishing
  18. WiFi
  19. Hacker
  20. Non-repudiation
  21. Framework
  22. Shadow IT
  23. OSINT
  24. IoT Devices
  25. Phishing
  26. Stakeholder
  27. Malware
  28. Smishing
  29. Patch
  30. Dark web
  31. Risk
  32. Social engineering
  33. Brute force attack
  34. Password
  35. Cloud