Gbps Chinese Cloud Legacy Main Frame Virus End- User Keylogger Domain Phishing Extortion Exploit White Hat Cyber attack Social Media Intelligence Binary Script Patch Vulnerability Machine Learning Anonymous Unix Spoofing Dark Web Linux Ransom- ware Zero- Day Bot Trojan Malware AI Brute force Penetration Black Hat IP Tracker Encryption admin Nuclear Bug VPN Cyber Hacking (as a verb) Root Next- Gen Data Logs 1337 Breach Spam Gbps Chinese Cloud Legacy Main Frame Virus End- User Keylogger Domain Phishing Extortion Exploit White Hat Cyber attack Social Media Intelligence Binary Script Patch Vulnerability Machine Learning Anonymous Unix Spoofing Dark Web Linux Ransom- ware Zero- Day Bot Trojan Malware AI Brute force Penetration Black Hat IP Tracker Encryption admin Nuclear Bug VPN Cyber Hacking (as a verb) Root Next- Gen Data Logs 1337 Breach Spam
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Gbps
Chinese
Cloud
Legacy
Main Frame
Virus
End-User
Keylogger
Domain
Phishing
Extortion
Exploit
White Hat
Cyber attack
Social Media
Intelligence
Binary Script
Patch
Vulnerability
Machine Learning
Anonymous
Unix
Spoofing
Dark Web
Linux
Ransom-ware
Zero-Day
Bot
Trojan
Malware
AI
Brute force
Penetration
Black Hat
IP Tracker
Encryption
admin
Nuclear
Bug
VPN
Cyber
Hacking (as a verb)
Root
Next-Gen
Data Logs
1337
Breach
Spam