Bug Anonymous Chinese Exploit End- User Brute force Intelligence Main Frame Virus admin White Hat Encryption Black Hat VPN Gbps Trojan Machine Learning Legacy 1337 Unix Social Media AI Cyber attack Data Logs Malware Patch Spoofing Hacking (as a verb) IP Tracker Ransom- ware Root Dark Web Bot Linux Zero- Day Binary Script Vulnerability Penetration Next- Gen Phishing Cloud Breach Domain Cyber Spam Keylogger Extortion Nuclear Bug Anonymous Chinese Exploit End- User Brute force Intelligence Main Frame Virus admin White Hat Encryption Black Hat VPN Gbps Trojan Machine Learning Legacy 1337 Unix Social Media AI Cyber attack Data Logs Malware Patch Spoofing Hacking (as a verb) IP Tracker Ransom- ware Root Dark Web Bot Linux Zero- Day Binary Script Vulnerability Penetration Next- Gen Phishing Cloud Breach Domain Cyber Spam Keylogger Extortion Nuclear
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Bug
Anonymous
Chinese
Exploit
End-User
Brute force
Intelligence
Main Frame
Virus
admin
White Hat
Encryption
Black Hat
VPN
Gbps
Trojan
Machine Learning
Legacy
1337
Unix
Social Media
AI
Cyber attack
Data Logs
Malware
Patch
Spoofing
Hacking (as a verb)
IP Tracker
Ransom-ware
Root
Dark Web
Bot
Linux
Zero-Day
Binary Script
Vulnerability
Penetration
Next-Gen
Phishing
Cloud
Breach
Domain
Cyber
Spam
Keylogger
Extortion
Nuclear