BotVirusCyberattackMainFrameIPTrackerSpoofingBlackHatPhishingNext-GenAIBinaryScriptUnixKeyloggerExtortionDarkWebExploitIntelligenceChineseSocialMediaZero-DaySpamBugMachineLearningLinuxDataLogsRansom-wareEnd-UserMalwareAnonymousWhiteHatVPNBruteforceRootCloudPenetrationTrojanVulnerabilityHacking(as averb)CyberBreachNuclearEncryptionPatchDomainLegacy1337adminGbpsBotVirusCyberattackMainFrameIPTrackerSpoofingBlackHatPhishingNext-GenAIBinaryScriptUnixKeyloggerExtortionDarkWebExploitIntelligenceChineseSocialMediaZero-DaySpamBugMachineLearningLinuxDataLogsRansom-wareEnd-UserMalwareAnonymousWhiteHatVPNBruteforceRootCloudPenetrationTrojanVulnerabilityHacking(as averb)CyberBreachNuclearEncryptionPatchDomainLegacy1337adminGbps

6969Boiiii!!!1!!!! Presents CSI:Cyber - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
  1. Bot
  2. Virus
  3. Cyber attack
  4. Main Frame
  5. IP Tracker
  6. Spoofing
  7. Black Hat
  8. Phishing
  9. Next-Gen
  10. AI
  11. Binary Script
  12. Unix
  13. Keylogger
  14. Extortion
  15. Dark Web
  16. Exploit
  17. Intelligence
  18. Chinese
  19. Social Media
  20. Zero-Day
  21. Spam
  22. Bug
  23. Machine Learning
  24. Linux
  25. Data Logs
  26. Ransom-ware
  27. End-User
  28. Malware
  29. Anonymous
  30. White Hat
  31. VPN
  32. Brute force
  33. Root
  34. Cloud
  35. Penetration
  36. Trojan
  37. Vulnerability
  38. Hacking (as a verb)
  39. Cyber
  40. Breach
  41. Nuclear
  42. Encryption
  43. Patch
  44. Domain
  45. Legacy
  46. 1337
  47. admin
  48. Gbps