Cyber attack White Hat Zero- Day Anonymous Bot Gbps End- User Cloud Binary Script Phishing Virus Malware Intelligence Domain Linux admin Social Media Dark Web Patch Machine Learning Hacking (as a verb) Vulnerability Root Nuclear IP Tracker Penetration 1337 VPN Breach Black Hat Ransom- ware Bug Legacy Data Logs Unix Chinese Extortion Cyber Spam Exploit Spoofing Brute force Encryption Next- Gen Main Frame AI Keylogger Trojan Cyber attack White Hat Zero- Day Anonymous Bot Gbps End- User Cloud Binary Script Phishing Virus Malware Intelligence Domain Linux admin Social Media Dark Web Patch Machine Learning Hacking (as a verb) Vulnerability Root Nuclear IP Tracker Penetration 1337 VPN Breach Black Hat Ransom- ware Bug Legacy Data Logs Unix Chinese Extortion Cyber Spam Exploit Spoofing Brute force Encryption Next- Gen Main Frame AI Keylogger Trojan
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Cyber attack
White Hat
Zero-Day
Anonymous
Bot
Gbps
End-User
Cloud
Binary Script
Phishing
Virus
Malware
Intelligence
Domain
Linux
admin
Social Media
Dark Web
Patch
Machine Learning
Hacking (as a verb)
Vulnerability
Root
Nuclear
IP Tracker
Penetration
1337
VPN
Breach
Black Hat
Ransom-ware
Bug
Legacy
Data Logs
Unix
Chinese
Extortion
Cyber
Spam
Exploit
Spoofing
Brute force
Encryption
Next-Gen
Main Frame
AI
Keylogger
Trojan