CyberAnonymousDarkWebMachineLearningWhiteHatPatchCyberattackExploitBruteforceKeyloggerAISpoofingVulnerabilityMainFrameEnd-UserDomainMalwareLinuxLegacyRansom-warePhishingExtortionIntelligenceCloudSpamBlackHatUnixEncryption1337NuclearSocialMediaPenetrationVPNHacking(as averb)ChineseadminVirusTrojanIPTrackerDataLogsZero-DayRootNext-GenBreachGbpsBugBotBinaryScriptCyberAnonymousDarkWebMachineLearningWhiteHatPatchCyberattackExploitBruteforceKeyloggerAISpoofingVulnerabilityMainFrameEnd-UserDomainMalwareLinuxLegacyRansom-warePhishingExtortionIntelligenceCloudSpamBlackHatUnixEncryption1337NuclearSocialMediaPenetrationVPNHacking(as averb)ChineseadminVirusTrojanIPTrackerDataLogsZero-DayRootNext-GenBreachGbpsBugBotBinaryScript

6969Boiiii!!!1!!1! Presents CSI:Cyber - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
  1. Cyber
  2. Anonymous
  3. Dark Web
  4. Machine Learning
  5. White Hat
  6. Patch
  7. Cyber attack
  8. Exploit
  9. Brute force
  10. Keylogger
  11. AI
  12. Spoofing
  13. Vulnerability
  14. Main Frame
  15. End-User
  16. Domain
  17. Malware
  18. Linux
  19. Legacy
  20. Ransom-ware
  21. Phishing
  22. Extortion
  23. Intelligence
  24. Cloud
  25. Spam
  26. Black Hat
  27. Unix
  28. Encryption
  29. 1337
  30. Nuclear
  31. Social Media
  32. Penetration
  33. VPN
  34. Hacking (as a verb)
  35. Chinese
  36. admin
  37. Virus
  38. Trojan
  39. IP Tracker
  40. Data Logs
  41. Zero-Day
  42. Root
  43. Next-Gen
  44. Breach
  45. Gbps
  46. Bug
  47. Bot
  48. Binary Script