Cloud Phishing Spoofing Keylogger End- User White Hat Virus Linux Vulnerability 1337 Patch Trojan Ransom- ware Unix Nuclear Main Frame Penetration Bot IP Tracker Social Media Breach Bug Spam Gbps Dark Web Domain Anonymous Chinese Extortion Binary Script Data Logs Zero- Day Cyber attack Root Machine Learning Encryption Hacking (as a verb) Malware AI Brute force Black Hat Exploit Cyber VPN admin Legacy Intelligence Next- Gen Cloud Phishing Spoofing Keylogger End- User White Hat Virus Linux Vulnerability 1337 Patch Trojan Ransom- ware Unix Nuclear Main Frame Penetration Bot IP Tracker Social Media Breach Bug Spam Gbps Dark Web Domain Anonymous Chinese Extortion Binary Script Data Logs Zero- Day Cyber attack Root Machine Learning Encryption Hacking (as a verb) Malware AI Brute force Black Hat Exploit Cyber VPN admin Legacy Intelligence Next- Gen
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Cloud
Phishing
Spoofing
Keylogger
End-User
White Hat
Virus
Linux
Vulnerability
1337
Patch
Trojan
Ransom-ware
Unix
Nuclear
Main Frame
Penetration
Bot
IP Tracker
Social Media
Breach
Bug
Spam
Gbps
Dark Web
Domain
Anonymous
Chinese
Extortion
Binary Script
Data Logs
Zero-Day
Cyber attack
Root
Machine Learning
Encryption
Hacking (as a verb)
Malware
AI
Brute force
Black Hat
Exploit
Cyber
VPN
admin
Legacy
Intelligence
Next-Gen