Legacy IP Tracker Malware Domain Black Hat Phishing Dark Web Root Zero- Day Cloud admin Patch Intelligence Exploit Data Logs Binary Script Encryption White Hat Brute force Virus Bug Spam Bot Hacking (as a verb) Linux Breach Social Media Trojan Unix VPN Vulnerability Main Frame 1337 Ransom- ware Chinese Gbps Spoofing End- User AI Nuclear Anonymous Cyber attack Machine Learning Penetration Extortion Cyber Keylogger Next- Gen Legacy IP Tracker Malware Domain Black Hat Phishing Dark Web Root Zero- Day Cloud admin Patch Intelligence Exploit Data Logs Binary Script Encryption White Hat Brute force Virus Bug Spam Bot Hacking (as a verb) Linux Breach Social Media Trojan Unix VPN Vulnerability Main Frame 1337 Ransom- ware Chinese Gbps Spoofing End- User AI Nuclear Anonymous Cyber attack Machine Learning Penetration Extortion Cyber Keylogger Next- Gen
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Legacy
IP Tracker
Malware
Domain
Black Hat
Phishing
Dark Web
Root
Zero-Day
Cloud
admin
Patch
Intelligence
Exploit
Data Logs
Binary Script
Encryption
White Hat
Brute force
Virus
Bug
Spam
Bot
Hacking (as a verb)
Linux
Breach
Social Media
Trojan
Unix
VPN
Vulnerability
Main Frame
1337
Ransom-ware
Chinese
Gbps
Spoofing
End-User
AI
Nuclear
Anonymous
Cyber attack
Machine Learning
Penetration
Extortion
Cyber
Keylogger
Next-Gen