TrojanDarkWebPhishingExtortionVPNHacking(as averb)Next-GenIPTrackerSocialMediaBruteforceCyberBotNuclearDataLogsCloudAIMachineLearningRansom-wareEncryptionPatchDomainBlackHatLegacyMainFramePenetrationBugKeyloggerIntelligenceAnonymousChineseGbpsadminSpam1337CyberattackBreachSpoofingZero-DayWhiteHatVirusExploitRootUnixEnd-UserBinaryScriptMalwareLinuxVulnerabilityTrojanDarkWebPhishingExtortionVPNHacking(as averb)Next-GenIPTrackerSocialMediaBruteforceCyberBotNuclearDataLogsCloudAIMachineLearningRansom-wareEncryptionPatchDomainBlackHatLegacyMainFramePenetrationBugKeyloggerIntelligenceAnonymousChineseGbpsadminSpam1337CyberattackBreachSpoofingZero-DayWhiteHatVirusExploitRootUnixEnd-UserBinaryScriptMalwareLinuxVulnerability

6969Boiiii!!!1!!1! Presents CSI:Cyber - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
  1. Trojan
  2. Dark Web
  3. Phishing
  4. Extortion
  5. VPN
  6. Hacking (as a verb)
  7. Next-Gen
  8. IP Tracker
  9. Social Media
  10. Brute force
  11. Cyber
  12. Bot
  13. Nuclear
  14. Data Logs
  15. Cloud
  16. AI
  17. Machine Learning
  18. Ransom-ware
  19. Encryption
  20. Patch
  21. Domain
  22. Black Hat
  23. Legacy
  24. Main Frame
  25. Penetration
  26. Bug
  27. Keylogger
  28. Intelligence
  29. Anonymous
  30. Chinese
  31. Gbps
  32. admin
  33. Spam
  34. 1337
  35. Cyber attack
  36. Breach
  37. Spoofing
  38. Zero-Day
  39. White Hat
  40. Virus
  41. Exploit
  42. Root
  43. Unix
  44. End-User
  45. Binary Script
  46. Malware
  47. Linux
  48. Vulnerability