Bot Legacy Dark Web IP Tracker Main Frame Bug Exploit Spam Intelligence Unix Encryption Nuclear Ransom- ware Breach Penetration admin White Hat Hacking (as a verb) Cyber attack Zero- Day Linux Data Logs Black Hat AI Next- Gen Chinese Brute force End- User Cloud Machine Learning Cyber Patch Keylogger Trojan Binary Script Vulnerability Gbps Virus 1337 Phishing Extortion Anonymous Root Spoofing Social Media Domain VPN Malware Bot Legacy Dark Web IP Tracker Main Frame Bug Exploit Spam Intelligence Unix Encryption Nuclear Ransom- ware Breach Penetration admin White Hat Hacking (as a verb) Cyber attack Zero- Day Linux Data Logs Black Hat AI Next- Gen Chinese Brute force End- User Cloud Machine Learning Cyber Patch Keylogger Trojan Binary Script Vulnerability Gbps Virus 1337 Phishing Extortion Anonymous Root Spoofing Social Media Domain VPN Malware
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Bot
Legacy
Dark Web
IP Tracker
Main Frame
Bug
Exploit
Spam
Intelligence
Unix
Encryption
Nuclear
Ransom-ware
Breach
Penetration
admin
White Hat
Hacking (as a verb)
Cyber attack
Zero-Day
Linux
Data Logs
Black Hat
AI
Next-Gen
Chinese
Brute force
End-User
Cloud
Machine Learning
Cyber
Patch
Keylogger
Trojan
Binary Script
Vulnerability
Gbps
Virus
1337
Phishing
Extortion
Anonymous
Root
Spoofing
Social Media
Domain
VPN
Malware