CloudPhishingSpoofingKeyloggerEnd-UserWhiteHatVirusLinuxVulnerability1337PatchTrojanRansom-wareUnixNuclearMainFramePenetrationBotIPTrackerSocialMediaBreachBugSpamGbpsDarkWebDomainAnonymousChineseExtortionBinaryScriptDataLogsZero-DayCyberattackRootMachineLearningEncryptionHacking(as averb)MalwareAIBruteforceBlackHatExploitCyberVPNadminLegacyIntelligenceNext-GenCloudPhishingSpoofingKeyloggerEnd-UserWhiteHatVirusLinuxVulnerability1337PatchTrojanRansom-wareUnixNuclearMainFramePenetrationBotIPTrackerSocialMediaBreachBugSpamGbpsDarkWebDomainAnonymousChineseExtortionBinaryScriptDataLogsZero-DayCyberattackRootMachineLearningEncryptionHacking(as averb)MalwareAIBruteforceBlackHatExploitCyberVPNadminLegacyIntelligenceNext-Gen

6969Boiiii!!!1!!1! Presents CSI:Cyber - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
  1. Cloud
  2. Phishing
  3. Spoofing
  4. Keylogger
  5. End-User
  6. White Hat
  7. Virus
  8. Linux
  9. Vulnerability
  10. 1337
  11. Patch
  12. Trojan
  13. Ransom-ware
  14. Unix
  15. Nuclear
  16. Main Frame
  17. Penetration
  18. Bot
  19. IP Tracker
  20. Social Media
  21. Breach
  22. Bug
  23. Spam
  24. Gbps
  25. Dark Web
  26. Domain
  27. Anonymous
  28. Chinese
  29. Extortion
  30. Binary Script
  31. Data Logs
  32. Zero-Day
  33. Cyber attack
  34. Root
  35. Machine Learning
  36. Encryption
  37. Hacking (as a verb)
  38. Malware
  39. AI
  40. Brute force
  41. Black Hat
  42. Exploit
  43. Cyber
  44. VPN
  45. admin
  46. Legacy
  47. Intelligence
  48. Next-Gen