Extortion Legacy VPN Cyber attack 1337 Brute force Gbps White Hat Encryption Dark Web Bot Chinese Virus Patch IP Tracker Breach Linux Exploit Spam admin Binary Script Nuclear Domain Data Logs Machine Learning Main Frame Spoofing Vulnerability Intelligence Next- Gen Penetration Root End- User Anonymous Cloud Keylogger Black Hat Social Media Unix Phishing Ransom- ware AI Malware Hacking (as a verb) Bug Trojan Cyber Zero- Day Extortion Legacy VPN Cyber attack 1337 Brute force Gbps White Hat Encryption Dark Web Bot Chinese Virus Patch IP Tracker Breach Linux Exploit Spam admin Binary Script Nuclear Domain Data Logs Machine Learning Main Frame Spoofing Vulnerability Intelligence Next- Gen Penetration Root End- User Anonymous Cloud Keylogger Black Hat Social Media Unix Phishing Ransom- ware AI Malware Hacking (as a verb) Bug Trojan Cyber Zero- Day
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Extortion
Legacy
VPN
Cyber attack
1337
Brute force
Gbps
White Hat
Encryption
Dark Web
Bot
Chinese
Virus
Patch
IP Tracker
Breach
Linux
Exploit
Spam
admin
Binary Script
Nuclear
Domain
Data Logs
Machine Learning
Main Frame
Spoofing
Vulnerability
Intelligence
Next-Gen
Penetration
Root
End-User
Anonymous
Cloud
Keylogger
Black Hat
Social Media
Unix
Phishing
Ransom-ware
AI
Malware
Hacking (as a verb)
Bug
Trojan
Cyber
Zero-Day