Spam Ransom- ware Bug Domain End- User Social Media Next- Gen Cloud Binary Script Main Frame 1337 Encryption VPN Unix Linux Patch Dark Web Penetration Exploit Bot Brute force Spoofing Legacy Trojan Phishing Data Logs White Hat Intelligence Machine Learning Hacking (as a verb) Vulnerability Zero- Day Black Hat Chinese Gbps Cyber attack admin Breach Extortion AI Malware Cyber Anonymous Keylogger Nuclear Virus IP Tracker Root Spam Ransom- ware Bug Domain End- User Social Media Next- Gen Cloud Binary Script Main Frame 1337 Encryption VPN Unix Linux Patch Dark Web Penetration Exploit Bot Brute force Spoofing Legacy Trojan Phishing Data Logs White Hat Intelligence Machine Learning Hacking (as a verb) Vulnerability Zero- Day Black Hat Chinese Gbps Cyber attack admin Breach Extortion AI Malware Cyber Anonymous Keylogger Nuclear Virus IP Tracker Root
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Spam
Ransom-ware
Bug
Domain
End-User
Social Media
Next-Gen
Cloud
Binary Script
Main Frame
1337
Encryption
VPN
Unix
Linux
Patch
Dark Web
Penetration
Exploit
Bot
Brute force
Spoofing
Legacy
Trojan
Phishing
Data Logs
White Hat
Intelligence
Machine Learning
Hacking (as a verb)
Vulnerability
Zero-Day
Black Hat
Chinese
Gbps
Cyber attack
admin
Breach
Extortion
AI
Malware
Cyber
Anonymous
Keylogger
Nuclear
Virus
IP Tracker
Root