Cloud Phishing VPN Spoofing Hacking (as a verb) Penetration Binary Script Data Logs End- User AI Ransom- ware Encryption Gbps Unix Zero- Day Spam Trojan Cyber Malware Bot Main Frame Dark Web Anonymous Linux Bug Next- Gen Machine Learning Chinese Virus Extortion Social Media Brute force Vulnerability admin IP Tracker Root White Hat Intelligence Legacy Breach Black Hat Cyber attack Exploit Domain Keylogger Patch 1337 Nuclear Cloud Phishing VPN Spoofing Hacking (as a verb) Penetration Binary Script Data Logs End- User AI Ransom- ware Encryption Gbps Unix Zero- Day Spam Trojan Cyber Malware Bot Main Frame Dark Web Anonymous Linux Bug Next- Gen Machine Learning Chinese Virus Extortion Social Media Brute force Vulnerability admin IP Tracker Root White Hat Intelligence Legacy Breach Black Hat Cyber attack Exploit Domain Keylogger Patch 1337 Nuclear
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Cloud
Phishing
VPN
Spoofing
Hacking (as a verb)
Penetration
Binary Script
Data Logs
End-User
AI
Ransom-ware
Encryption
Gbps
Unix
Zero-Day
Spam
Trojan
Cyber
Malware
Bot
Main Frame
Dark Web
Anonymous
Linux
Bug
Next-Gen
Machine Learning
Chinese
Virus
Extortion
Social Media
Brute force
Vulnerability
admin
IP Tracker
Root
White Hat
Intelligence
Legacy
Breach
Black Hat
Cyber attack
Exploit
Domain
Keylogger
Patch
1337
Nuclear