ExtortionLegacyVPNCyberattack1337BruteforceGbpsWhiteHatEncryptionDarkWebBotChineseVirusPatchIPTrackerBreachLinuxExploitSpamadminBinaryScriptNuclearDomainDataLogsMachineLearningMainFrameSpoofingVulnerabilityIntelligenceNext-GenPenetrationRootEnd-UserAnonymousCloudKeyloggerBlackHatSocialMediaUnixPhishingRansom-wareAIMalwareHacking(as averb)BugTrojanCyberZero-DayExtortionLegacyVPNCyberattack1337BruteforceGbpsWhiteHatEncryptionDarkWebBotChineseVirusPatchIPTrackerBreachLinuxExploitSpamadminBinaryScriptNuclearDomainDataLogsMachineLearningMainFrameSpoofingVulnerabilityIntelligenceNext-GenPenetrationRootEnd-UserAnonymousCloudKeyloggerBlackHatSocialMediaUnixPhishingRansom-wareAIMalwareHacking(as averb)BugTrojanCyberZero-Day

6969Boiiii!!!1!!!! Presents CSI:Cyber - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
  1. Extortion
  2. Legacy
  3. VPN
  4. Cyber attack
  5. 1337
  6. Brute force
  7. Gbps
  8. White Hat
  9. Encryption
  10. Dark Web
  11. Bot
  12. Chinese
  13. Virus
  14. Patch
  15. IP Tracker
  16. Breach
  17. Linux
  18. Exploit
  19. Spam
  20. admin
  21. Binary Script
  22. Nuclear
  23. Domain
  24. Data Logs
  25. Machine Learning
  26. Main Frame
  27. Spoofing
  28. Vulnerability
  29. Intelligence
  30. Next-Gen
  31. Penetration
  32. Root
  33. End-User
  34. Anonymous
  35. Cloud
  36. Keylogger
  37. Black Hat
  38. Social Media
  39. Unix
  40. Phishing
  41. Ransom-ware
  42. AI
  43. Malware
  44. Hacking (as a verb)
  45. Bug
  46. Trojan
  47. Cyber
  48. Zero-Day