Bot Bug White Hat Gbps Chinese Social Media Vulnerability Spoofing Domain Patch Data Logs Encryption Extortion Cyber attack Unix Cloud 1337 admin AI Hacking (as a verb) Ransom- ware Phishing Anonymous IP Tracker Intelligence Breach VPN Brute force Cyber Linux Keylogger Spam Exploit Malware Next- Gen Virus Main Frame End- User Binary Script Root Penetration Trojan Dark Web Zero- Day Nuclear Black Hat Machine Learning Legacy Bot Bug White Hat Gbps Chinese Social Media Vulnerability Spoofing Domain Patch Data Logs Encryption Extortion Cyber attack Unix Cloud 1337 admin AI Hacking (as a verb) Ransom- ware Phishing Anonymous IP Tracker Intelligence Breach VPN Brute force Cyber Linux Keylogger Spam Exploit Malware Next- Gen Virus Main Frame End- User Binary Script Root Penetration Trojan Dark Web Zero- Day Nuclear Black Hat Machine Learning Legacy
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Bot
Bug
White Hat
Gbps
Chinese
Social Media
Vulnerability
Spoofing
Domain
Patch
Data Logs
Encryption
Extortion
Cyber attack
Unix
Cloud
1337
admin
AI
Hacking (as a verb)
Ransom-ware
Phishing
Anonymous
IP Tracker
Intelligence
Breach
VPN
Brute force
Cyber
Linux
Keylogger
Spam
Exploit
Malware
Next-Gen
Virus
Main Frame
End-User
Binary Script
Root
Penetration
Trojan
Dark Web
Zero-Day
Nuclear
Black Hat
Machine Learning
Legacy