Cloud Cyber Black Hat Dark Web Bot Virus 1337 Main Frame Trojan Unix Next- Gen Patch Spoofing Intelligence Encryption Anonymous Exploit Hacking (as a verb) Vulnerability Malware AI Ransom- ware IP Tracker Chinese Machine Learning Brute force Keylogger Breach Nuclear Spam Legacy Bug Gbps Phishing Cyber attack Data Logs Binary Script Penetration Zero- Day End- User admin Linux Root Domain White Hat Social Media VPN Extortion Cloud Cyber Black Hat Dark Web Bot Virus 1337 Main Frame Trojan Unix Next- Gen Patch Spoofing Intelligence Encryption Anonymous Exploit Hacking (as a verb) Vulnerability Malware AI Ransom- ware IP Tracker Chinese Machine Learning Brute force Keylogger Breach Nuclear Spam Legacy Bug Gbps Phishing Cyber attack Data Logs Binary Script Penetration Zero- Day End- User admin Linux Root Domain White Hat Social Media VPN Extortion
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Cloud
Cyber
Black Hat
Dark Web
Bot
Virus
1337
Main Frame
Trojan
Unix
Next-Gen
Patch
Spoofing
Intelligence
Encryption
Anonymous
Exploit
Hacking (as a verb)
Vulnerability
Malware
AI
Ransom-ware
IP Tracker
Chinese
Machine Learning
Brute force
Keylogger
Breach
Nuclear
Spam
Legacy
Bug
Gbps
Phishing
Cyber attack
Data Logs
Binary Script
Penetration
Zero-Day
End-User
admin
Linux
Root
Domain
White Hat
Social Media
VPN
Extortion