CyberattackWhiteHatZero-DayAnonymousBotGbpsEnd-UserCloudBinaryScriptPhishingVirusMalwareIntelligenceDomainLinuxadminSocialMediaDarkWebPatchMachineLearningHacking(as averb)VulnerabilityRootNuclearIPTrackerPenetration1337VPNBreachBlackHatRansom-wareBugLegacyDataLogsUnixChineseExtortionCyberSpamExploitSpoofingBruteforceEncryptionNext-GenMainFrameAIKeyloggerTrojanCyberattackWhiteHatZero-DayAnonymousBotGbpsEnd-UserCloudBinaryScriptPhishingVirusMalwareIntelligenceDomainLinuxadminSocialMediaDarkWebPatchMachineLearningHacking(as averb)VulnerabilityRootNuclearIPTrackerPenetration1337VPNBreachBlackHatRansom-wareBugLegacyDataLogsUnixChineseExtortionCyberSpamExploitSpoofingBruteforceEncryptionNext-GenMainFrameAIKeyloggerTrojan

6969Boiiii!!!1!!1! Presents CSI:Cyber - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
  1. Cyber attack
  2. White Hat
  3. Zero-Day
  4. Anonymous
  5. Bot
  6. Gbps
  7. End-User
  8. Cloud
  9. Binary Script
  10. Phishing
  11. Virus
  12. Malware
  13. Intelligence
  14. Domain
  15. Linux
  16. admin
  17. Social Media
  18. Dark Web
  19. Patch
  20. Machine Learning
  21. Hacking (as a verb)
  22. Vulnerability
  23. Root
  24. Nuclear
  25. IP Tracker
  26. Penetration
  27. 1337
  28. VPN
  29. Breach
  30. Black Hat
  31. Ransom-ware
  32. Bug
  33. Legacy
  34. Data Logs
  35. Unix
  36. Chinese
  37. Extortion
  38. Cyber
  39. Spam
  40. Exploit
  41. Spoofing
  42. Brute force
  43. Encryption
  44. Next-Gen
  45. Main Frame
  46. AI
  47. Keylogger
  48. Trojan