Black Hat Bot Spoofing Brute force Cyber attack Social Media Linux Malware admin Next- Gen Root Hacking (as a verb) Domain White Hat Data Logs VPN Zero- Day Bug Keylogger Vulnerability Patch Trojan Phishing IP Tracker Machine Learning Exploit Breach 1337 Spam Nuclear Dark Web Intelligence Legacy Virus Cloud Cyber Gbps Anonymous End- User Unix Binary Script Extortion Chinese Ransom- ware Encryption AI Main Frame Penetration Black Hat Bot Spoofing Brute force Cyber attack Social Media Linux Malware admin Next- Gen Root Hacking (as a verb) Domain White Hat Data Logs VPN Zero- Day Bug Keylogger Vulnerability Patch Trojan Phishing IP Tracker Machine Learning Exploit Breach 1337 Spam Nuclear Dark Web Intelligence Legacy Virus Cloud Cyber Gbps Anonymous End- User Unix Binary Script Extortion Chinese Ransom- ware Encryption AI Main Frame Penetration
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Black Hat
Bot
Spoofing
Brute force
Cyber attack
Social Media
Linux
Malware
admin
Next-Gen
Root
Hacking (as a verb)
Domain
White Hat
Data Logs
VPN
Zero-Day
Bug
Keylogger
Vulnerability
Patch
Trojan
Phishing
IP Tracker
Machine Learning
Exploit
Breach
1337
Spam
Nuclear
Dark Web
Intelligence
Legacy
Virus
Cloud
Cyber
Gbps
Anonymous
End-User
Unix
Binary Script
Extortion
Chinese
Ransom-ware
Encryption
AI
Main Frame
Penetration