CloudPhishingVPNSpoofingHacking(as averb)PenetrationBinaryScriptDataLogsEnd-UserAIRansom-wareEncryptionGbpsUnixZero-DaySpamTrojanCyberMalwareBotMainFrameDarkWebAnonymousLinuxBugNext-GenMachineLearningChineseVirusExtortionSocialMediaBruteforceVulnerabilityadminIPTrackerRootWhiteHatIntelligenceLegacyBreachBlackHatCyberattackExploitDomainKeyloggerPatch1337NuclearCloudPhishingVPNSpoofingHacking(as averb)PenetrationBinaryScriptDataLogsEnd-UserAIRansom-wareEncryptionGbpsUnixZero-DaySpamTrojanCyberMalwareBotMainFrameDarkWebAnonymousLinuxBugNext-GenMachineLearningChineseVirusExtortionSocialMediaBruteforceVulnerabilityadminIPTrackerRootWhiteHatIntelligenceLegacyBreachBlackHatCyberattackExploitDomainKeyloggerPatch1337Nuclear

6969Boiiii!!!1!!1! Presents CSI:Cyber - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
  1. Cloud
  2. Phishing
  3. VPN
  4. Spoofing
  5. Hacking (as a verb)
  6. Penetration
  7. Binary Script
  8. Data Logs
  9. End-User
  10. AI
  11. Ransom-ware
  12. Encryption
  13. Gbps
  14. Unix
  15. Zero-Day
  16. Spam
  17. Trojan
  18. Cyber
  19. Malware
  20. Bot
  21. Main Frame
  22. Dark Web
  23. Anonymous
  24. Linux
  25. Bug
  26. Next-Gen
  27. Machine Learning
  28. Chinese
  29. Virus
  30. Extortion
  31. Social Media
  32. Brute force
  33. Vulnerability
  34. admin
  35. IP Tracker
  36. Root
  37. White Hat
  38. Intelligence
  39. Legacy
  40. Breach
  41. Black Hat
  42. Cyber attack
  43. Exploit
  44. Domain
  45. Keylogger
  46. Patch
  47. 1337
  48. Nuclear