Legacy Bug admin 1337 Brute force Gbps Linux Vulnerability Extortion Next- Gen Intelligence Black Hat Domain Ransom- ware Cyber Encryption Spam Cyber attack Trojan Phishing Patch Zero- Day Binary Script VPN Main Frame Social Media Dark Web Hacking (as a verb) Anonymous Cloud Breach Bot White Hat Spoofing Malware Virus Keylogger Penetration IP Tracker Data Logs Chinese End- User AI Unix Nuclear Machine Learning Exploit Root Legacy Bug admin 1337 Brute force Gbps Linux Vulnerability Extortion Next- Gen Intelligence Black Hat Domain Ransom- ware Cyber Encryption Spam Cyber attack Trojan Phishing Patch Zero- Day Binary Script VPN Main Frame Social Media Dark Web Hacking (as a verb) Anonymous Cloud Breach Bot White Hat Spoofing Malware Virus Keylogger Penetration IP Tracker Data Logs Chinese End- User AI Unix Nuclear Machine Learning Exploit Root
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Legacy
Bug
admin
1337
Brute force
Gbps
Linux
Vulnerability
Extortion
Next-Gen
Intelligence
Black Hat
Domain
Ransom-ware
Cyber
Encryption
Spam
Cyber attack
Trojan
Phishing
Patch
Zero-Day
Binary Script
VPN
Main Frame
Social Media
Dark Web
Hacking (as a verb)
Anonymous
Cloud
Breach
Bot
White Hat
Spoofing
Malware
Virus
Keylogger
Penetration
IP Tracker
Data Logs
Chinese
End-User
AI
Unix
Nuclear
Machine Learning
Exploit
Root