Trojan Dark Web Phishing Extortion VPN Hacking (as a verb) Next- Gen IP Tracker Social Media Brute force Cyber Bot Nuclear Data Logs Cloud AI Machine Learning Ransom- ware Encryption Patch Domain Black Hat Legacy Main Frame Penetration Bug Keylogger Intelligence Anonymous Chinese Gbps admin Spam 1337 Cyber attack Breach Spoofing Zero- Day White Hat Virus Exploit Root Unix End- User Binary Script Malware Linux Vulnerability Trojan Dark Web Phishing Extortion VPN Hacking (as a verb) Next- Gen IP Tracker Social Media Brute force Cyber Bot Nuclear Data Logs Cloud AI Machine Learning Ransom- ware Encryption Patch Domain Black Hat Legacy Main Frame Penetration Bug Keylogger Intelligence Anonymous Chinese Gbps admin Spam 1337 Cyber attack Breach Spoofing Zero- Day White Hat Virus Exploit Root Unix End- User Binary Script Malware Linux Vulnerability
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Trojan
Dark Web
Phishing
Extortion
VPN
Hacking (as a verb)
Next-Gen
IP Tracker
Social Media
Brute force
Cyber
Bot
Nuclear
Data Logs
Cloud
AI
Machine Learning
Ransom-ware
Encryption
Patch
Domain
Black Hat
Legacy
Main Frame
Penetration
Bug
Keylogger
Intelligence
Anonymous
Chinese
Gbps
admin
Spam
1337
Cyber attack
Breach
Spoofing
Zero-Day
White Hat
Virus
Exploit
Root
Unix
End-User
Binary Script
Malware
Linux
Vulnerability