Dark Web End- User Chinese Linux Root 1337 admin Main Frame Brute force Domain Exploit Cyber attack Social Media Cloud Anonymous Unix Encryption White Hat Patch Trojan Binary Script Spam Spoofing Nuclear Intelligence Extortion Machine Learning Next- Gen VPN Breach Gbps Cyber AI Vulnerability Legacy Ransom- ware Black Hat Bug Virus Malware Data Logs Phishing Bot Hacking (as a verb) IP Tracker Keylogger Zero- Day Penetration Dark Web End- User Chinese Linux Root 1337 admin Main Frame Brute force Domain Exploit Cyber attack Social Media Cloud Anonymous Unix Encryption White Hat Patch Trojan Binary Script Spam Spoofing Nuclear Intelligence Extortion Machine Learning Next- Gen VPN Breach Gbps Cyber AI Vulnerability Legacy Ransom- ware Black Hat Bug Virus Malware Data Logs Phishing Bot Hacking (as a verb) IP Tracker Keylogger Zero- Day Penetration
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Dark Web
End-User
Chinese
Linux
Root
1337
admin
Main Frame
Brute force
Domain
Exploit
Cyber attack
Social Media
Cloud
Anonymous
Unix
Encryption
White Hat
Patch
Trojan
Binary Script
Spam
Spoofing
Nuclear
Intelligence
Extortion
Machine Learning
Next-Gen
VPN
Breach
Gbps
Cyber
AI
Vulnerability
Legacy
Ransom-ware
Black Hat
Bug
Virus
Malware
Data Logs
Phishing
Bot
Hacking (as a verb)
IP Tracker
Keylogger
Zero-Day
Penetration